Zubek, Julian; Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz
2017-01-01
This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.
Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz
2017-01-01
This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems. PMID:28809957
Communication networks for the tactical edge
NASA Astrophysics Data System (ADS)
Evans, Joseph B.; Pennington, Steven G.; Ewy, Benjamin J.
2017-04-01
Information at the tactical level is increasingly critical in today's conflicts. The proliferation of commercial tablets and smart phones has created the ability for extensive information sharing at the tactical edge, beyond the traditional tactical voice communications and location information. This is particularly the case in Gray Zone conflicts, in which tactical decision making and actions are intertwined with information sharing and exploitation. Networking of tactical devices is the key to this information sharing. In this work, we detail and analyze two network models at different parts of the Gray Zone spectrum, and explore a number of networking options including Named Data Networking. We also compare networking approaches in a variety of realistic operating environments. Our results show that Named Data Networking is a good match for the disrupted networking environments found in many tactical situations
Libraries in the Global, National, and Local Networked Information Infrastructure.
ERIC Educational Resources Information Center
McClure, Charles R.
This paper explores the challenges and opportunities facing libraries as they evolve into the electronic networked environment, and looks at options for libraries in the year 2000 and beyond. The internationally networked environment has fundamentally changed the way in which people acquire and use information resources and services. The paper…
ERIC Educational Resources Information Center
Bertot, John Carlo; McClure, Charles R.
This report describes the results of an assessment of Sailor, Maryland's Online Public Information Network, which provides statewide Internet connection to 100% of Maryland public libraries. The concept of a "statewide networked environment" includes information services, products, hardware and software, telecommunications…
Information Security and Privacy in Network Environments.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Large-scale P2P network based distributed virtual geographic environment (DVGE)
NASA Astrophysics Data System (ADS)
Tan, Xicheng; Yu, Liang; Bian, Fuling
2007-06-01
Virtual Geographic Environment has raised full concern as a kind of software information system that helps us understand and analyze the real geographic environment, and it has also expanded to application service system in distributed environment--distributed virtual geographic environment system (DVGE), and gets some achievements. However, limited by the factor of the mass data of VGE, the band width of network, as well as numerous requests and economic, etc. DVGE still faces some challenges and problems which directly cause the current DVGE could not provide the public with high-quality service under current network mode. The Rapid development of peer-to-peer network technology has offered new ideas of solutions to the current challenges and problems of DVGE. Peer-to-peer network technology is able to effectively release and search network resources so as to realize efficient share of information. Accordingly, this paper brings forth a research subject on Large-scale peer-to-peer network extension of DVGE as well as a deep study on network framework, routing mechanism, and DVGE data management on P2P network.
Issues and challenges of information fusion in contested environments: panel results
NASA Astrophysics Data System (ADS)
Blasch, Erik; Kadar, Ivan; Chong, Chee; Jones, Eric K.; Tierno, Jorge E.; Fenstermacher, Laurie; Gorman, John D.; Levchuk, Georgiy
2015-05-01
With the plethora of information, there are many aspects to contested environments such as the protection of information, network privacy, and restricted observational and entry access. In this paper, we review and contrast the perspectives of challenges and opportunities for future developments in contested environments. The ability to operate in a contested environment would aid societal operations for highly congested areas with limited bandwidth such as transportation, the lack of communication and observations after a natural disaster, or planning for situations in which freedom of movement is restricted. Different perspectives were presented, but common themes included (1) Domain: targets and sensors, (2) network: communications, control, and social networks, and (3) user: human interaction and analytics. The paper serves as a summary and organization of the panel discussion as towards future concerns for research needs in contested environments.
Integrated Engineering Information Technology, FY93 accommplishments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harris, R.N.; Miller, D.K.; Neugebauer, G.L.
1994-03-01
The Integrated Engineering Information Technology (IEIT) project is providing a comprehensive, easy-to-use computer network solution or communicating with coworkers both inside and outside Sandia National Laboratories. IEIT capabilities include computer networking, electronic mail, mechanical design, and data management. These network-based tools have one fundamental purpose: to help create a concurrent engineering environment that will enable Sandia organizations to excel in today`s increasingly competitive business environment.
Enabling information management systems in tactical network environments
NASA Astrophysics Data System (ADS)
Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher
2009-05-01
Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.
Wang, Jianxin; Chen, Bo; Wang, Yaqun; Wang, Ningtao; Garbey, Marc; Tran-Son-Tay, Roger; Berceli, Scott A.; Wu, Rongling
2013-01-01
The capacity of an organism to respond to its environment is facilitated by the environmentally induced alteration of gene and protein expression, i.e. expression plasticity. The reconstruction of gene regulatory networks based on expression plasticity can gain not only new insights into the causality of transcriptional and cellular processes but also the complex regulatory mechanisms that underlie biological function and adaptation. We describe an approach for network inference by integrating expression plasticity into Shannon’s mutual information. Beyond Pearson correlation, mutual information can capture non-linear dependencies and topology sparseness. The approach measures the network of dependencies of genes expressed in different environments, allowing the environment-induced plasticity of gene dependencies to be tested in unprecedented details. The approach is also able to characterize the extent to which the same genes trigger different amounts of expression in response to environmental changes. We demonstrated the usefulness of this approach through analysing gene expression data from a rabbit vein graft study that includes two distinct blood flow environments. The proposed approach provides a powerful tool for the modelling and analysis of dynamic regulatory networks using gene expression data from distinct environments. PMID:23470995
A Framework for Integrating Multiple Biological Networks to Predict MicroRNA-Disease Associations.
Peng, Wei; Lan, Wei; Yu, Zeng; Wang, Jianxin; Pan, Yi
2017-03-01
MicroRNAs have close relationship with human diseases. Therefore, identifying disease related MicroRNAs plays an important role in disease diagnosis, prognosis and therapy. However, designing an effective computational method which can make good use of various biological resources and correctly predict the associations between MicroRNA and disease is still a big challenge. Previous researchers have pointed out that there are complex relationships among microRNAs, diseases and environment factors. There are inter-relationships between microRNAs, diseases or environment factors based on their functional similarity or phenotype similarity or chemical structure similarity and so on. There are also intra-relationships between microRNAs and diseases, microRNAs and environment factors, diseases and environment factors. Moreover, functionally similar microRNAs tend to associate with common diseases and common environment factors. The diseases with similar phenotypes are likely caused by common microRNAs and common environment factors. In this work, we propose a framework namely ThrRWMDE which can integrate these complex relationships to predict microRNA-disease associations. In this framework, microRNA similarity network (MFN), disease similarity network (DSN) and environmental factor similarity network (ESN) are constructed according to certain biological properties. Then, an unbalanced three random walking algorithm is implemented on the three networks so as to obtain information from neighbors in corresponding networks. This algorithm not only can flexibly infer information from different levels of neighbors with respect to the topological and structural differences of the three networks, but also in the course of working the functional information will be transferred from one network to another according to the associations between the nodes in different networks. The results of experiment show that our method achieves better prediction performance than other state-of-the-art methods.
Study on an agricultural environment monitoring server system using Wireless Sensor Networks.
Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun
2010-01-01
This paper proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural environment monitoring server system collects environmental and soil information on the outdoors through WSN-based environmental and soil sensors, collects image information through CCTVs, and collects location information using GPS modules. This collected information is converted into a database through the agricultural environment monitoring server consisting of a sensor manager, which manages information collected from the WSN sensors, an image information manager, which manages image information collected from CCTVs, and a GPS manager, which processes location information of the agricultural environment monitoring server system, and provides it to producers. In addition, a solar cell-based power supply is implemented for the server system so that it could be used in agricultural environments with insufficient power infrastructure. This agricultural environment monitoring server system could even monitor the environmental information on the outdoors remotely, and it could be expected that the use of such a system could contribute to increasing crop yields and improving quality in the agricultural field by supporting the decision making of crop producers through analysis of the collected information.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Learning in neural networks based on a generalized fluctuation theorem
NASA Astrophysics Data System (ADS)
Hayakawa, Takashi; Aoyagi, Toshio
2015-11-01
Information maximization has been investigated as a possible mechanism of learning governing the self-organization that occurs within the neural systems of animals. Within the general context of models of neural systems bidirectionally interacting with environments, however, the role of information maximization remains to be elucidated. For bidirectionally interacting physical systems, universal laws describing the fluctuation they exhibit and the information they possess have recently been discovered. These laws are termed fluctuation theorems. In the present study, we formulate a theory of learning in neural networks bidirectionally interacting with environments based on the principle of information maximization. Our formulation begins with the introduction of a generalized fluctuation theorem, employing an interpretation appropriate for the present application, which differs from the original thermodynamic interpretation. We analytically and numerically demonstrate that the learning mechanism presented in our theory allows neural networks to efficiently explore their environments and optimally encode information about them.
Effective Utilization of Commercial Wireless Networking Technology in Planetary Environments
NASA Technical Reports Server (NTRS)
Caulev, Michael (Technical Monitor); Phillip, DeLeon; Horan, Stephen; Borah, Deva; Lyman, Ray
2005-01-01
The purpose of this research is to investigate the use of commercial, off-the-shelf wireless networking technology in planetary exploration applications involving rovers and sensor webs. The three objectives of this research project are to: 1) simulate the radio frequency environment of proposed landing sites on Mars using actual topographic data, 2) analyze the performance of current wireless networking standards in the simulated radio frequency environment, and 3) propose modifications to the standards for more efficient utilization. In this annual report, we present our results for the second year of research. During this year, the effort has focussed on the second objective of analyzing the performance of the IEEE 802.11a and IEEE 802.1lb wireless networking standards in the simulated radio frequency environment of Mars. The approach builds upon our previous results which deterministically modelled the RF environment at selected sites on Mars using high-resolution topographical data. These results provide critical information regarding antenna coverage patterns, maximum link distances, effects of surface clutter, and multipath effects. Using these previous results, the physical layer of these wireless networking standards has now been simulated and analyzed in the Martian environment. We are looking to extending these results to the and medium access layer next. Our results give us critical information regarding the performance (data rates, packet error rates, link distances, etc.) of IEEE 802.1 la/b wireless networks. This information enables a critical examination of how these wireless networks may be utilized in future Mars missions and how they may be possibly modified for more optimal usage.
Automating Network Node Behavior Characterization by Mining Communication Patterns
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Chikkagoudar, Satish; Arthur-Durett, Kristine M.
Enterprise networks of scale are complex, dynamic computing environments that respond to evolv- ing business objectives and requirements. Characteriz- ing system behaviors in these environments is essential for network management and cyber security operations. Characterization of system’s communication is typical and is supported using network flow information (NetFlow). Related work has characterized behavior using theoretical graph metrics; results are often difficult to interpret by enterprise staff. We propose a different approach, where flow information is mapped to sets of tags that contextualize the data in terms of network principals and enterprise concepts. Frequent patterns are then extracted and are expressedmore » as behaviors. Behaviors can be com- pared, identifying systems expressing similar behaviors. We evaluate the approach using flow information collected by a third party.« less
ERIC Educational Resources Information Center
Sanborn, Mark
2011-01-01
Wireless sensor networks (WSNs) represent a class of miniaturized information systems designed to monitor physical environments. These smart monitoring systems form collaborative networks utilizing autonomous sensing, data-collection, and processing to provide real-time analytics of observed environments. As a fundamental research area in…
Prototyping an institutional IAIMS/UMLS information environment for an academic medical center.
Miller, P L; Paton, J A; Clyman, J I; Powsner, S M
1992-07-01
The paper describes a prototype information environment designed to link network-based information resources in an integrated fashion and thus enhance the information capabilities of an academic medical center. The prototype was implemented on a single Macintosh computer to permit exploration of the overall "information architecture" and to demonstrate the various desired capabilities prior to full-scale network-based implementation. At the heart of the prototype are two components: a diverse set of information resources available over an institutional computer network and an information sources map designed to assist users in finding and accessing information resources relevant to their needs. The paper describes these and other components of the prototype and presents a scenario illustrating its use. The prototype illustrates the link between the goals of two National Library of Medicine initiatives, the Integrated Academic Information Management System (IAIMS) and the Unified Medical Language System (UMLS).
The University in the Networked Economy and Society: Challenges and Opportunities
ERIC Educational Resources Information Center
Benkler, Yochai
2008-01-01
The networked information economy and society present a new social, technical, and economic environment within which the university functions. To understand the new challenges and opportunities this environment presents, a usable characterization of the core new characteristics of both the environment and the university as a system and how those…
From Personal to Social: Learning Environments that Work
ERIC Educational Resources Information Center
Camacho, Mar; Guilana, Sonia
2011-01-01
VLE (Virtual Learning Environments) are rapidly falling short to meet the demands of a networked society. Web 2.0 and social networks are proving to offer a more personalized, open environment for students to learn formally as they are already doing informally. With the irruption of social media into society, and therefore, education, many voices…
Application of wireless networks-peer-to-peer information sharing
NASA Astrophysics Data System (ADS)
ellappan, Vijayan; chaki, suchismita; kumar, avn
2017-11-01
Peer to Peer communications and its applications have gotten to be ordinary construction modelling in the wired network environment. But then, they have not been successfully adjusted with the wireless environment. Unlike the traditional client-server framework, in a P2P framework, each node can play the role of client as well as server simultaneously and exchange data or information with others. We aim to design an application which can adapt to the wireless ad-hoc networks. Peer to Peer communication can help people to share their files (information, image, audio, video and so on) and communicate with each other without relying on a particular network infrastructure or limited data usage. Here there is a central server with the help of which, the peers will have the capability to get the information about the other peers in the network. Indeed, even without the Internet, devices have the potential to allow users to connect and communicate in a special way through short range remote protocols such Wi-Fi.
A vision of network-centric military communications
NASA Astrophysics Data System (ADS)
Conklin, Ross, Jr.; Burbank, Jack; Nichols, Robert, Jr.
2005-05-01
This paper presents a vision for a future capability-based military communications system that considers user requirements. Historically, the military has developed and fielded many specialized communications systems. While these systems solved immediate communications problems, they were not designed to operate with other systems. As information has become more important to the execution of war, the "stove-pipe" nature of the communications systems deployed by the military is no longer acceptable. Realizing this, the military has begun the transformation of communications to a network-centric communications paradigm. However, the specialized communications systems were developed in response to the widely varying environments related to military communications. These environments, and the necessity for effective communications within these environments, do not disappear under the network-centric paradigm. In fact, network-centric communications allows for one message to cross many of these environments by transiting multiple networks. The military would also like one communications approach that is capable of working well in multiple environments. This paper presents preliminary work on the creation of a framework that allows for a reconfigurable device that is capable of adapting to the physical and network environments. The framework returns to the Open Systems Interconnect (OSI) architecture with the addition of a standardized intra-layer control interface for control information exchange, a standardized data interface and a proposed device architecture based on the software radio.
Design and implementation of a telecare information platform.
Li, Shing-Han; Wang, Ching-Yao; Lu, Wen-Hui; Lin, Yuan-Yuan; Yen, David C
2012-06-01
For the aging population and for people with dominant chronic diseases, countries all over the world are promoting an "Aging in Place" program with its primary focus on the implementation of telecare. In 2009, Taiwan held a "Health Care Value-Added Platinum Program" with the goal of promoting the development of "Telecare" services by integrating medical treatment, healthcare, information communication, medical equipment and materials and by linking related cross-discipline professions to enable people to familiarize themselves with preventive healthcare services offered in their household and community environments. In addition, this program can be utilized to effectively provide diversified healthcare service benefitting society as a whole. This study aims to promote a diversified telecare service network in Taiwan's household and community environments, establish telecare information platforms, build an internal network of various healthcare service modes, standardize externally interfacing telecare information networks, effectively utilize related healthcare service resources, and complete reasonable service resource links forming an up-to-date health information exchange network. To this end, the telecare information platform based on service oriented architecture (SOA) is designed to promote an open telecare information interface and sharing environment to assist in such tasks as developing healthcare information exchange services, integrating service resources among various different healthcare service modes, accessing externally complex community affairs information, supporting remote physiological information transmissions, and providing diversified remote innovative services. Information system architecture and system monitoring indices of various types of healthcare service modes are used for system integrations for future development and/or expansions.
Albantakis, Larissa; Hintze, Arend; Koch, Christof; Adami, Christoph; Tononi, Giulio
2014-01-01
Natural selection favors the evolution of brains that can capture fitness-relevant features of the environment's causal structure. We investigated the evolution of small, adaptive logic-gate networks (“animats”) in task environments where falling blocks of different sizes have to be caught or avoided in a ‘Tetris-like’ game. Solving these tasks requires the integration of sensor inputs and memory. Evolved networks were evaluated using measures of information integration, including the number of evolved concepts and the total amount of integrated conceptual information. The results show that, over the course of the animats' adaptation, i) the number of concepts grows; ii) integrated conceptual information increases; iii) this increase depends on the complexity of the environment, especially on the requirement for sequential memory. These results suggest that the need to capture the causal structure of a rich environment, given limited sensors and internal mechanisms, is an important driving force for organisms to develop highly integrated networks (“brains”) with many concepts, leading to an increase in their internal complexity. PMID:25521484
Materials, Processes, and Environmental Engineering Network
NASA Technical Reports Server (NTRS)
White, Margo M.
1993-01-01
Attention is given to the Materials, Processes, and Environmental Engineering Network (MPEEN), which was developed as a central holding facility for materials testing information generated by the Materials and Processes Laboratory of NASA-Marshall. It contains information from other NASA centers and outside agencies, and also includes the NASA Environmental Information System (NEIS) and Failure Analysis Information System (FAIS) data. The data base is NEIS, which is accessible through MPEEN. Environmental concerns are addressed regarding materials identified by the NASA Operational Environment Team (NOET) to be hazardous to the environment. The data base also contains the usage and performance characteristics of these materials.
ERIC Educational Resources Information Center
Samerkhanova, Elvira K.; Krupoderova, Elena P.; Krupoderova, Klimentina R.; Bahtiyarova, Lyudmila N.; Ponachugin, Alexander V.
2016-01-01
The purpose of the research is justifying didactic possibilities of the use of network services for the organization of information for the learning environment of college, where students carry out their project activities, and where effective networking between students and teachers takes place. The authors consider didactic possibilities of…
Designing a New Urban Internet.
ERIC Educational Resources Information Center
Burke, Lauren
2002-01-01
Discusses Web site design and information architecture in light of principles of New Urbanism that are being applied in urban planning situations. Topics include networked electronic environment design; user-centered network design; multidisciplinary approaches; knowledge access and collaboration; and the Global Information Infrastructure…
ERIC Educational Resources Information Center
Akgün, Ergün; Akkoyunlu, Buket
2013-01-01
Along with the integration of network and communication innovations into education, those technology enriched learning environments gained importance both qualitatively and operationally. Using network and communication innovations in the education field, provides diffusion of information and global accessibility, and also allows physically…
The enhancement of security in healthcare information systems.
Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De
2012-06-01
With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
NASA Technical Reports Server (NTRS)
Stoenescu, Tudor M.; Woo, Simon S.
2009-01-01
In this work, we consider information dissemination and sharing in a distributed peer-to-peer (P2P highly dynamic communication network. In particular, we explore a network coding technique for transmission and a rank based peer selection method for network formation. The combined approach has been shown to improve information sharing and delivery to all users when considering the challenges imposed by the space network environments.
NASA Technical Reports Server (NTRS)
Quattrochi, Dale A.; Niskar, Amanda Sue
2005-01-01
The Centers for Disease Control and Prevention (CDC) is coordinating HELIX- Atlanta to provide information regarding the five-county Metropolitan Atlanta Area (Clayton, Cobb, DeKalb, Fulton, and Gwinett) via a network of integrated environmental monitoring and public health data systems so that all sectors can take action to prevent and control environmentally related health effects. The HELIX-Atlanta Network is a tool to access interoperable information systems with optional information technology linkage functionality driven by scientific rationale. HELIX-Atlanta is a collaborative effort with local, state, federal, and academic partners, including the NASA Marshall Space Flight Center. The HELIX-Atlanta Partners identified the following HELIX-Atlanta initial focus areas: childhood lead poisoning, short-latency cancers, developmental disabilities, birth defects, vital records, respiratory health, age of housing, remote sensing data, and environmental monitoring, HELIX-Atlanta Partners identified and evaluated information systems containing information on the above focus areas. The information system evaluations resulted in recommendations for what resources would be needed to interoperate selected information systems in compliance with the CDC Public Health Information Network (PHIN). This presentation will discuss the collaborative process of building a network that links health and environment data for information exchange, including NASA remote sensing data, for use in HELIX-Atlanta.
Anatomy and histology as socially networked learning environments: some preliminary findings.
Hafferty, Frederic W; Castellani, Brian; Hafferty, Philip K; Pawlina, Wojciech
2013-09-01
An exploratory study to better understand the "networked" life of the medical school as a learning environment. In a recent academic year, the authors gathered data during two six-week blocks of a sequential histology and anatomy course at a U.S. medical college. An eight-item questionnaire captured different dimensions of student interactions. The student cohort/network was 48 first-year medical students. Using social network analysis (SNA), the authors focused on (1) the initial structure and the evolution of informal class networks over time, (2) how informal class networks compare to formal in-class small-group assignments in influencing student information gathering, and (3) how peer assignment of professionalism role model status is shaped more by informal than formal ties. In examining these latter two issues, the authors explored not only how formal group assignment persisted over time but also how it functioned to prevent the tendency for groupings based on gender or ethnicity. The study revealed an evolving dynamic between the formal small-group learning structure of the course blocks and the emergence of informal student networks. For example, whereas formal group membership did influence in-class questions and did prevent formation of groups of like gender and ethnicity, outside-class questions and professionalism were influenced more by informal group ties where gender and, to a much lesser extent, ethnicity influence student information gathering. The richness of these preliminary findings suggests that SNA may be a useful tool in examining an array of medical student learning encounters.
Macromolecular networks and intelligence in microorganisms
Westerhoff, Hans V.; Brooks, Aaron N.; Simeonidis, Evangelos; García-Contreras, Rodolfo; He, Fei; Boogerd, Fred C.; Jackson, Victoria J.; Goncharuk, Valeri; Kolodkin, Alexey
2014-01-01
Living organisms persist by virtue of complex interactions among many components organized into dynamic, environment-responsive networks that span multiple scales and dimensions. Biological networks constitute a type of information and communication technology (ICT): they receive information from the outside and inside of cells, integrate and interpret this information, and then activate a response. Biological networks enable molecules within cells, and even cells themselves, to communicate with each other and their environment. We have become accustomed to associating brain activity – particularly activity of the human brain – with a phenomenon we call “intelligence.” Yet, four billion years of evolution could have selected networks with topologies and dynamics that confer traits analogous to this intelligence, even though they were outside the intercellular networks of the brain. Here, we explore how macromolecular networks in microbes confer intelligent characteristics, such as memory, anticipation, adaptation and reflection and we review current understanding of how network organization reflects the type of intelligence required for the environments in which they were selected. We propose that, if we were to leave terms such as “human” and “brain” out of the defining features of “intelligence,” all forms of life – from microbes to humans – exhibit some or all characteristics consistent with “intelligence.” We then review advances in genome-wide data production and analysis, especially in microbes, that provide a lens into microbial intelligence and propose how the insights derived from quantitatively characterizing biomolecular networks may enable synthetic biologists to create intelligent molecular networks for biotechnology, possibly generating new forms of intelligence, first in silico and then in vivo. PMID:25101076
Learning Analytics for Networked Learning Models
ERIC Educational Resources Information Center
Joksimovic, Srecko; Hatala, Marek; Gaševic, Dragan
2014-01-01
Teaching and learning in networked settings has attracted significant attention recently. The central topic of networked learning research is human-human and human-information interactions occurring within a networked learning environment. The nature of these interactions is highly complex and usually requires a multi-dimensional approach to…
NASA Astrophysics Data System (ADS)
Ji, Junzhong; Song, Xiangjing; Liu, Chunnian; Zhang, Xiuzhen
2013-08-01
Community structure detection in complex networks has been intensively investigated in recent years. In this paper, we propose an adaptive approach based on ant colony clustering to discover communities in a complex network. The focus of the method is the clustering process of an ant colony in a virtual grid, where each ant represents a node in the complex network. During the ant colony search, the method uses a new fitness function to percept local environment and employs a pheromone diffusion model as a global information feedback mechanism to realize information exchange among ants. A significant advantage of our method is that the locations in the grid environment and the connections of the complex network structure are simultaneously taken into account in ants moving. Experimental results on computer-generated and real-world networks show the capability of our method to successfully detect community structures.
Advanced algorithms for distributed fusion
NASA Astrophysics Data System (ADS)
Gelfand, A.; Smith, C.; Colony, M.; Bowman, C.; Pei, R.; Huynh, T.; Brown, C.
2008-03-01
The US Military has been undergoing a radical transition from a traditional "platform-centric" force to one capable of performing in a "Network-Centric" environment. This transformation will place all of the data needed to efficiently meet tactical and strategic goals at the warfighter's fingertips. With access to this information, the challenge of fusing data from across the batttlespace into an operational picture for real-time Situational Awareness emerges. In such an environment, centralized fusion approaches will have limited application due to the constraints of real-time communications networks and computational resources. To overcome these limitations, we are developing a formalized architecture for fusion and track adjudication that allows the distribution of fusion processes over a dynamically created and managed information network. This network will support the incorporation and utilization of low level tracking information within the Army Distributed Common Ground System (DCGS-A) or Future Combat System (FCS). The framework is based on Bowman's Dual Node Network (DNN) architecture that utilizes a distributed network of interlaced fusion and track adjudication nodes to build and maintain a globally consistent picture across all assets.
NASA Astrophysics Data System (ADS)
Hwang, Jeonghwan; Lee, Jiwoong; Lee, Hochul; Yoe, Hyun
The wireless sensor networks (WSN) technology based on low power consumption is one of the important technologies in the realization of ubiquitous society. When the technology would be applied to the agricultural field, it can give big change in the existing agricultural environment such as livestock growth environment, cultivation and harvest of agricultural crops. This research paper proposes the 'Pig Farm Integrated Management System' based on WSN technology, which will establish the ubiquitous agricultural environment and improve the productivity of pig-raising farmers. The proposed system has WSN environmental sensors and CCTV at inside/outside of pig farm. These devices collect the growth-environment related information of pigs, such as luminosity, temperature, humidity and CO2 status. The system collects and monitors the environmental information and video information of pig farm. In addition to the remote-control and monitoring of the pig farm facilities, this system realizes the most optimum pig-raising environment based on the growth environmental data accumulated for a long time.
2012-01-01
destroy information; disrupt networks or communications; or deny service. In military terms, cyberspace is a contested environment. Hactivists, cyber ... criminals , terrorists, and adversarial nations are active in cyberspace networks across the globe; our military networks are no excep tion. DoD
ERIC Educational Resources Information Center
Van Houweling, Douglas E.; McGill, Michael J.
The rapidly developing and changing networking and telecommunications environment now being implemented in the United States and across the globe is explored. The creation of a flexible and inexpensive digital network allowing instantaneous access by any individual to information of any type is now within our grasp. A primer on the technology…
The Vehicular Information Space Framework
NASA Astrophysics Data System (ADS)
Prinz, Vivian; Schlichter, Johann; Schweiger, Benno
Vehicular networks are distributed, self-organizing and highly mobile ad hoc networks. They allow for providing drivers with up-to-the-minute information about their environment. Therefore, they are expected to be a decisive future enabler for enhancing driving comfort and safety. This article introduces the Vehicular Information Space framework (VIS). Vehicles running the VIS form a kind of distributed database. It enables them to provide information like existing hazards, parking spaces or traffic densities in a location aware and fully distributed manner. In addition, vehicles can retrieve, modify and delete these information items. The underlying algorithm is based on features derived from existing structured Peer-to-Peer algorithms and extended to suit the specific characteristics of highly mobile ad hoc networks. We present, implement and simulate the VIS using a motorway and an urban traffic environment. Simulation studies on VIS message occurrence show that the VIS implies reasonable traffic overhead. Also, overall VIS message traffic is independent from the number of information items provided.
2016-12-21
PLANNING TO COUNTER THREAT NETWORKS Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding
The Impact of Social Media on Informal Learning in Museums
ERIC Educational Resources Information Center
Russo, Angelina; Watkins, Jerry; Groundwater-Smith, Susan
2009-01-01
This paper posits that social networking can take a central role in learning in informal environments such as museums, libraries and galleries. It argues that social media offers young people agency previously unavailable in informal learning environments in order to explore complex responses to and participation with cultural content. The paper…
Astakhov, Vadim
2009-01-01
Interest in simulation of large-scale metabolic networks, species development, and genesis of various diseases requires new simulation techniques to accommodate the high complexity of realistic biological networks. Information geometry and topological formalisms are proposed to analyze information processes. We analyze the complexity of large-scale biological networks as well as transition of the system functionality due to modification in the system architecture, system environment, and system components. The dynamic core model is developed. The term dynamic core is used to define a set of causally related network functions. Delocalization of dynamic core model provides a mathematical formalism to analyze migration of specific functions in biosystems which undergo structure transition induced by the environment. The term delocalization is used to describe these processes of migration. We constructed a holographic model with self-poetic dynamic cores which preserves functional properties under those transitions. Topological constraints such as Ricci flow and Pfaff dimension were found for statistical manifolds which represent biological networks. These constraints can provide insight on processes of degeneration and recovery which take place in large-scale networks. We would like to suggest that therapies which are able to effectively implement estimated constraints, will successfully adjust biological systems and recover altered functionality. Also, we mathematically formulate the hypothesis that there is a direct consistency between biological and chemical evolution. Any set of causal relations within a biological network has its dual reimplementation in the chemistry of the system environment.
Gemini: Extending Information Management for Real Time Tactical Environments
2008-03-01
Mobile, Ad ‐ Hoc Networks.......................................................................................................49 8.4 Wired...networks, such as wireless ad ‐ hoc networks. This paper looked into the operating environments expected to be available to Unmanned Aircraft Systems...decentralized, ad ‐ hoc networks. The total peering capability of these networks may be very large. And, each network or access point may carry restrictions; for
MYSEA: The Monterey Security Architecture
2009-01-01
Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized
Environmental Uncertainty and Communication Network Complexity: A Cross-System, Cross-Cultural Test.
ERIC Educational Resources Information Center
Danowski, James
An infographic model is proposed to account for the operation of systems within their information environments. Infographics is a communication paradigm used to indicate the clustering of information processing variables in communication systems. Four propositions concerning environmental uncertainty and internal communication network complexity,…
NASA Technical Reports Server (NTRS)
Davies, Mark
1991-01-01
The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both Local Area Network (LAN) and Wide Area Network (WAN) space. Also, you can expect to see the higher level functions and applications begin the same transition. Additional information is given in viewgraph form.
ERIC Educational Resources Information Center
Zia, Lee L.; Van de Sompel, Herbert; Beit-Arie, Oren; Gambles, Anne
2001-01-01
Includes three articles that discuss the National Science Foundation's National Science, Mathematics, Engineering, and Technology Education Digital Library (NSDL) program; the OpenURL framework for open reference linking in the Web-based scholarly information environment; and HeadLine (Hybrid Electronic Access and Delivery in the Library Networked…
Developing a health information network within an integrated delivery system: a case study.
Wager, K A; Heda, S; Austin, C J
1997-05-01
Changes in the health care environment, such as the growth of integrated delivery systems and the proliferation of managed care, are having a profound impact on the way in which health care organizations manage both clinical and financial information. Health information networks (HINs) are emerging to support the goals and internal needs of integrated delivery systems. In this environment, health care managers must assume a leadership role in planning for the development of HINs. The article provides an overview of the principal issues that should be addressed in an organization's information systems plan when a HIN is being developed and includes a case study that illustrates the key points discussed.
Data Handling and Communication
NASA Astrophysics Data System (ADS)
Hemmer, FréDéRic Giorgio Innocenti, Pier
The following sections are included: * Introduction * Computing Clusters and Data Storage: The New Factory and Warehouse * Local Area Networks: Organizing Interconnection * High-Speed Worldwide Networking: Accelerating Protocols * Detector Simulation: Events Before the Event * Data Analysis and Programming Environment: Distilling Information * World Wide Web: Global Networking * References
Autoplan: A self-processing network model for an extended blocks world planning environment
NASA Technical Reports Server (NTRS)
Dautrechy, C. Lynne; Reggia, James A.; Mcfadden, Frank
1990-01-01
Self-processing network models (neural/connectionist models, marker passing/message passing networks, etc.) are currently undergoing intense investigation for a variety of information processing applications. These models are potentially very powerful in that they support a large amount of explicit parallel processing, and they cleanly integrate high level and low level information processing. However they are currently limited by a lack of understanding of how to apply them effectively in many application areas. The formulation of self-processing network methods for dynamic, reactive planning is studied. The long-term goal is to formulate robust, computationally effective information processing methods for the distributed control of semiautonomous exploration systems, e.g., the Mars Rover. The current research effort is focusing on hierarchical plan generation, execution and revision through local operations in an extended blocks world environment. This scenario involves many challenging features that would be encountered in a real planning and control environment: multiple simultaneous goals, parallel as well as sequential action execution, action sequencing determined not only by goals and their interactions but also by limited resources (e.g., three tasks, two acting agents), need to interpret unanticipated events and react appropriately through replanning, etc.
Self-Organized Link State Aware Routing for Multiple Mobile Agents in Wireless Network
NASA Astrophysics Data System (ADS)
Oda, Akihiro; Nishi, Hiroaki
Recently, the importance of data sharing structures in autonomous distributed networks has been increasing. A wireless sensor network is used for managing distributed data. This type of distributed network requires effective information exchanging methods for data sharing. To reduce the traffic of broadcasted messages, reduction of the amount of redundant information is indispensable. In order to reduce packet loss in mobile ad-hoc networks, QoS-sensitive routing algorithm have been frequently discussed. The topology of a wireless network is likely to change frequently according to the movement of mobile nodes, radio disturbance, or fading due to the continuous changes in the environment. Therefore, a packet routing algorithm should guarantee QoS by using some quality indicators of the wireless network. In this paper, a novel information exchanging algorithm developed using a hash function and a Boolean operation is proposed. This algorithm achieves efficient information exchanges by reducing the overhead of broadcasting messages, and it can guarantee QoS in a wireless network environment. It can be applied to a routing algorithm in a mobile ad-hoc network. In the proposed routing algorithm, a routing table is constructed by using the received signal strength indicator (RSSI), and the neighborhood information is periodically broadcasted depending on this table. The proposed hash-based routing entry management by using an extended MAC address can eliminate the overhead of message flooding. An analysis of the collision of hash values contributes to the determination of the length of the hash values, which is minimally required. Based on the verification of a mathematical theory, an optimum hash function for determining the length of hash values can be given. Simulations are carried out to evaluate the effectiveness of the proposed algorithm and to validate the theory in a general wireless network routing algorithm.
LavaNet—Neural network development environment in a general mine planning package
NASA Astrophysics Data System (ADS)
Kapageridis, Ioannis Konstantinou; Triantafyllou, A. G.
2011-04-01
LavaNet is a series of scripts written in Perl that gives access to a neural network simulation environment inside a general mine planning package. A well known and a very popular neural network development environment, the Stuttgart Neural Network Simulator, is used as the base for the development of neural networks. LavaNet runs inside VULCAN™—a complete mine planning package with advanced database, modelling and visualisation capabilities. LavaNet is taking advantage of VULCAN's Perl based scripting environment, Lava, to bring all the benefits of neural network development and application to geologists, mining engineers and other users of the specific mine planning package. LavaNet enables easy development of neural network training data sets using information from any of the data and model structures available, such as block models and drillhole databases. Neural networks can be trained inside VULCAN™ and the results be used to generate new models that can be visualised in 3D. Direct comparison of developed neural network models with conventional and geostatistical techniques is now possible within the same mine planning software package. LavaNet supports Radial Basis Function networks, Multi-Layer Perceptrons and Self-Organised Maps.
Design and implementation of dynamic hybrid Honeypot network
NASA Astrophysics Data System (ADS)
Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang
2013-05-01
The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.
Social Network Analysis in E-Learning Environments: A Preliminary Systematic Review
ERIC Educational Resources Information Center
Cela, Karina L.; Sicilia, Miguel Ángel; Sánchez, Salvador
2015-01-01
E-learning occupies an increasingly prominent place in education. It provides the learner with a rich virtual network where he or she can exchange ideas and information and create synergies through interactions with other members of the network, whether fellow learners or teachers. Social network analysis (SNA) has proven extremely powerful at…
On computer vision in wireless sensor networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berry, Nina M.; Ko, Teresa H.
Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an imagemore » capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.« less
The NASA Fireball Network Database
NASA Technical Reports Server (NTRS)
Moser, Danielle E.
2011-01-01
The NASA Meteoroid Environment Office (MEO) has been operating an automated video fireball network since late-2008. Since that time, over 1,700 multi-station fireballs have been observed. A database containing orbital data and trajectory information on all these events has recently been compiled and is currently being mined for information. Preliminary results are presented here.
K-12 Networking: Breaking Down the Walls of the Learning Environment.
ERIC Educational Resources Information Center
Epler, Doris, Ed.
Networks can benefit school libraries by: (1) offering multiple user access to information; (2) managing and distributing information and data; (3) allowing resources to be shared; (4) improving and enabling communications; (5) improving the management of resources; and (6) creating renewed interest in the library and its resources. As a result,…
Laadan, Oren; Nieh, Jason; Phung, Dan
2012-10-02
Methods, media and systems for managing a distributed application running in a plurality of digital processing devices are provided. In some embodiments, a method includes running one or more processes associated with the distributed application in virtualized operating system environments on a plurality of digital processing devices, suspending the one or more processes, and saving network state information relating to network connections among the one or more processes. The method further include storing process information relating to the one or more processes, recreating the network connections using the saved network state information, and restarting the one or more processes using the stored process information.
NASA Astrophysics Data System (ADS)
Anderson, Thomas S.
2016-05-01
The Global Information Network Architecture is an information technology based on Vector Relational Data Modeling, a unique computational paradigm, DoD network certified by USARMY as the Dragon Pulse Informa- tion Management System. This network available modeling environment for modeling models, where models are configured using domain relevant semantics and use network available systems, sensors, databases and services as loosely coupled component objects and are executable applications. Solutions are based on mission tactics, techniques, and procedures and subject matter input. Three recent ARMY use cases are discussed a) ISR SoS. b) Modeling and simulation behavior validation. c) Networked digital library with behaviors.
A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays
Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog
2011-01-01
These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072
Research on Influence of Cloud Environment on Traditional Network Security
NASA Astrophysics Data System (ADS)
Ming, Xiaobo; Guo, Jinhua
2018-02-01
Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.
Evaluation of Deep Learning Representations of Spatial Storm Data
NASA Astrophysics Data System (ADS)
Gagne, D. J., II; Haupt, S. E.; Nychka, D. W.
2017-12-01
The spatial structure of a severe thunderstorm and its surrounding environment provide useful information about the potential for severe weather hazards, including tornadoes, hail, and high winds. Statistics computed over the area of a storm or from the pre-storm environment can provide descriptive information but fail to capture structural information. Because the storm environment is a complex, high-dimensional space, identifying methods to encode important spatial storm information in a low-dimensional form should aid analysis and prediction of storms by statistical and machine learning models. Principal component analysis (PCA), a more traditional approach, transforms high-dimensional data into a set of linearly uncorrelated, orthogonal components ordered by the amount of variance explained by each component. The burgeoning field of deep learning offers two potential approaches to this problem. Convolutional Neural Networks are a supervised learning method for transforming spatial data into a hierarchical set of feature maps that correspond with relevant combinations of spatial structures in the data. Generative Adversarial Networks (GANs) are an unsupervised deep learning model that uses two neural networks trained against each other to produce encoded representations of spatial data. These different spatial encoding methods were evaluated on the prediction of severe hail for a large set of storm patches extracted from the NCAR convection-allowing ensemble. Each storm patch contains information about storm structure and the near-storm environment. Logistic regression and random forest models were trained using the PCA and GAN encodings of the storm data and were compared against the predictions from a convolutional neural network. All methods showed skill over climatology at predicting the probability of severe hail. However, the verification scores among the methods were very similar and the predictions were highly correlated. Further evaluations are being performed to determine how the choice of input variables affects the results.
The Erector Set Computer: Building a Virtual Workstation over a Large Multi-Vendor Network.
ERIC Educational Resources Information Center
Farago, John M.
1989-01-01
Describes a computer network developed at the City University of New York Law School that uses device sharing and local area networking to create a simulated law office. Topics discussed include working within a multi-vendor environment, and the communication, information, and database access services available through the network. (CLB)
Listening to the noise: random fluctuations reveal gene network parameters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Munsky, Brian; Khammash, Mustafa
2009-01-01
The cellular environment is abuzz with noise. The origin of this noise is attributed to the inherent random motion of reacting molecules that take part in gene expression and post expression interactions. In this noisy environment, clonal populations of cells exhibit cell-to-cell variability that frequently manifests as significant phenotypic differences within the cellular population. The stochastic fluctuations in cellular constituents induced by noise can be measured and their statistics quantified. We show that these random fluctuations carry within them valuable information about the underlying genetic network. Far from being a nuisance, the ever-present cellular noise acts as a rich sourcemore » of excitation that, when processed through a gene network, carries its distinctive fingerprint that encodes a wealth of information about that network. We demonstrate that in some cases the analysis of these random fluctuations enables the full identification of network parameters, including those that may otherwise be difficult to measure. This establishes a potentially powerful approach for the identification of gene networks and offers a new window into the workings of these networks.« less
Health information technology and the idea of informed consent.
Goldstein, Melissa M
2010-01-01
During this early stage of HIT adoption, it is critical that we engage in discussions regarding informed consent's proper role in a health care environment in which electronic information sharing holds primary importance. This article discusses current implementation of the doctrine within health information exchange networks; the relationship between informed consent and privacy; the variety of ways that the concept is referenced in discussions of information sharing; and challenges that surround incorporation of the doctrine into the evolving HIT environment. The article concludes by reviewing the purpose behind the traditional obligation to obtain informed consent and the possibility of maintaining its relevance in the new environment.
Modeling socio-cultural processes in network-centric environments
NASA Astrophysics Data System (ADS)
Santos, Eunice E.; Santos, Eugene, Jr.; Korah, John; George, Riya; Gu, Qi; Kim, Keumjoo; Li, Deqing; Russell, Jacob; Subramanian, Suresh
2012-05-01
The major focus in the field of modeling & simulation for network centric environments has been on the physical layer while making simplifications for the human-in-the-loop. However, the human element has a big impact on the capabilities of network centric systems. Taking into account the socio-behavioral aspects of processes such as team building, group decision-making, etc. are critical to realistically modeling and analyzing system performance. Modeling socio-cultural processes is a challenge because of the complexity of the networks, dynamism in the physical and social layers, feedback loops and uncertainty in the modeling data. We propose an overarching framework to represent, model and analyze various socio-cultural processes within network centric environments. The key innovation in our methodology is to simultaneously model the dynamism in both the physical and social layers while providing functional mappings between them. We represent socio-cultural information such as friendships, professional relationships and temperament by leveraging the Culturally Infused Social Network (CISN) framework. The notion of intent is used to relate the underlying socio-cultural factors to observed behavior. We will model intent using Bayesian Knowledge Bases (BKBs), a probabilistic reasoning network, which can represent incomplete and uncertain socio-cultural information. We will leverage previous work on a network performance modeling framework called Network-Centric Operations Performance and Prediction (N-COPP) to incorporate dynamism in various aspects of the physical layer such as node mobility, transmission parameters, etc. We validate our framework by simulating a suitable scenario, incorporating relevant factors and providing analyses of the results.
Health information multitype library reference referral networking: panacea for the '90s.
Teplitskaia, H
1998-07-01
Librarians are exploring new approaches to information sharing to cope with a rapidly changing environment dominated by budget cuts, information explosion, and globalization of the economy, science, and culture. In 1990, the University of Illinois at Chicago Library of the Health Sciences (UIC LHS) initiated a pilot project aimed at establishing an effective balance between state-of-the-art information technology and traditional library methods and promoting cooperation among health information professionals by establishing the Health Information Referral Network (HIRN) in the state of Illinois. HIRN's background and development, Internet home page, and networking techniques reviewed in this paper are applicable to multitype libraries and information centers interested in improving information use and the referral process.
Health information multitype library reference referral networking: panacea for the '90s.
Teplitskaia, H
1998-01-01
Librarians are exploring new approaches to information sharing to cope with a rapidly changing environment dominated by budget cuts, information explosion, and globalization of the economy, science, and culture. In 1990, the University of Illinois at Chicago Library of the Health Sciences (UIC LHS) initiated a pilot project aimed at establishing an effective balance between state-of-the-art information technology and traditional library methods and promoting cooperation among health information professionals by establishing the Health Information Referral Network (HIRN) in the state of Illinois. HIRN's background and development, Internet home page, and networking techniques reviewed in this paper are applicable to multitype libraries and information centers interested in improving information use and the referral process. PMID:9681171
NASA Astrophysics Data System (ADS)
Byłak, Michał; RóŻański, Grzegorz
2017-04-01
The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.
A Context-Aware Paradigm for Information Discovery and Dissemination in Mobile Environments
ERIC Educational Resources Information Center
Lundquist, Doug
2011-01-01
The increasing power and ubiquity of mobile wireless devices is enabling real-time information delivery for many diverse applications. A crucial question is how to allocate finite network resources efficiently and fairly despite the uncertainty common in highly dynamic mobile ad hoc networks. We propose a set of routing protocols, Self-Balancing…
Joint Information Environment: DOD Needs to Strengthen Governance and Management
2016-07-01
provide fast and secure connections to any application or service from any authorized network at any time Software application rationalization and...deployment at all sites. DOD further defines an automated information system as a system of computer hardware, computer software , data or telecommunications ...Why GAO Did This Study For fiscal year 2017, DOD plans to spend more than $38 billion on information technology to support thousands of networks and
Teaching Network Security in a Virtual Learning Environment
ERIC Educational Resources Information Center
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik
2004-01-01
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Neural network applications in telecommunications
NASA Technical Reports Server (NTRS)
Alspector, Joshua
1994-01-01
Neural network capabilities include automatic and organized handling of complex information, quick adaptation to continuously changing environments, nonlinear modeling, and parallel implementation. This viewgraph presentation presents Bellcore work on applications, learning chip computational function, learning system block diagram, neural network equalization, broadband access control, calling-card fraud detection, software reliability prediction, and conclusions.
Good Communication: The Other Social Network for Successful IT Organizations
ERIC Educational Resources Information Center
Trubitt, Lisa; Overholtzer, Jeff
2009-01-01
Social networks of the electronic variety have become thoroughly embedded in contemporary culture. People have woven these networks into their daily routines, using Facebook, Twitter, LinkedIn, online gaming environments, and other tools to build and maintain complex webs of professional and personal relationships. Chief Information Officers…
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Current Issues for Higher Education Information Resources Management.
ERIC Educational Resources Information Center
CAUSE/EFFECT, 1996
1996-01-01
Issues identified as important to the future of information resources management and use in higher education include information policy in a networked environment, distributed computing, integrating information resources and college planning, benchmarking information technology, integrated digital libraries, technology integration in teaching,…
Guidelines on CV networking information flow optimization for Texas.
DOT National Transportation Integrated Search
2017-03-01
Recognizing the fundamental role of information flow in future transportation applications, the research team investigated the quality and security of information flow in the connected vehicle (CV) environment. The research team identified key challe...
An Auto-Scoring Mechanism for Evaluating Problem-Solving Ability in a Web-Based Learning Environment
ERIC Educational Resources Information Center
Chiou, Chuang-Kai; Hwang, Gwo-Jen; Tseng, Judy C. R.
2009-01-01
The rapid development of computer and network technologies has attracted researchers to investigate strategies for and the effects of applying information technologies in learning activities; simultaneously, learning environments have been developed to record the learning portfolios of students seeking web information for problem-solving. Although…
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks
NASA Astrophysics Data System (ADS)
Wu, Zhengping; Wu, Hao
With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.
Materials, processes, and environmental engineering network
NASA Technical Reports Server (NTRS)
White, Margo M.
1993-01-01
The Materials, Processes, and Environmental Engineering Network (MPEEN) was developed as a central holding facility for materials testing information generated by the Materials and Processes Laboratory. It contains information from other NASA centers and outside agencies, and also includes the NASA Environmental Information System (NEIS) and Failure Analysis Information System (FAIS) data. Environmental replacement materials information is a newly developed focus of MPEEN. This database is the NASA Environmental Information System, NEIS, which is accessible through MPEEN. Environmental concerns are addressed regarding materials identified by the NASA Operational Environment Team, NOET, to be hazardous to the environment. An environmental replacement technology database is contained within NEIS. Environmental concerns about materials are identified by NOET, and control or replacement strategies are formed. This database also contains the usage and performance characteristics of these hazardous materials. In addition to addressing environmental concerns, MPEEN contains one of the largest materials databases in the world. Over 600 users access this network on a daily basis. There is information available on failure analysis, metals and nonmetals testing, materials properties, standard and commercial parts, foreign alloy cross-reference, Long Duration Exposure Facility (LDEF) data, and Materials and Processes Selection List data.
A Cyber Situational Awareness Model for Network Administrators
2017-03-01
environments, the Internet of Things, artificial intelligence , and so on. As users’ data requirements grow more complex, they demand information...security of systems of interest. Further, artificial intelligence is a powerful concept in information technology. Therefore, new research should...look into how to use artificial intelligence to develop CSA. Human interaction with cyber systems is not making networks and their components safer
2012-03-01
30 c. IEEE 802.16/WiMAX .............................................................31 4. Broadband Global Area Network...Space Agency, 2006) ...........................34 Figure 19. Global BGAN Coverage (From Inmarsat, 2009...BGAN Broadband Global Area Network C2 Command and Control CHSC California Homeland Security Consortium CIE Collaborative Information Environment CJCS
Cori, Liliana; Carducci, Annalaura; Donzelli, Gabriele; La Rocca, Cinzia; Bianchi, Fabrizio
2018-01-01
Eleven projects within the LIFE programme (through which the Directorate-General for Environment of the European Commission provides funding for projects aim at protecting environment and nature) addressing environmental-health-related issues have been involved in a collaborative network called KTE LIFE EnvHealth Network. The shared issues tackled by that projects are knowledge transfer and exchange (KTE). The objective of the LIFE programme is to support the implementation of the environmental legislation in the European Union, to provide new tools and knowledge that will help to better protect both the territory and the communities. Transferring knowledge to decision makers, at the appropriate and effective level, is therefore a central function of the projects. The Network promotes national and international networking, which intends to involve other projects, to provide methodological support, to make information and successful practices circulate, with the aim of multiplying the energies of each project involved.
ERIC Educational Resources Information Center
Bishop, Ann P.
This digest describes proposed legislation for the implementation of the National Research and Education Network (NREN). Issues and implications for teachers, students, researchers, and librarians are suggested and the emergence of the electronic network as a general communication and research tool is described. Developments in electronic…
Listening to the Noise: Random Fluctuations Reveal Gene Network Parameters
NASA Astrophysics Data System (ADS)
Munsky, Brian; Trinh, Brooke; Khammash, Mustafa
2010-03-01
The cellular environment is abuzz with noise originating from the inherent random motion of reacting molecules in the living cell. In this noisy environment, clonal cell populations exhibit cell-to-cell variability that can manifest significant prototypical differences. Noise induced stochastic fluctuations in cellular constituents can be measured and their statistics quantified using flow cytometry, single molecule fluorescence in situ hybridization, time lapse fluorescence microscopy and other single cell and single molecule measurement techniques. We show that these random fluctuations carry within them valuable information about the underlying genetic network. Far from being a nuisance, the ever-present cellular noise acts as a rich source of excitation that, when processed through a gene network, carries its distinctive fingerprint that encodes a wealth of information about that network. We demonstrate that in some cases the analysis of these random fluctuations enables the full identification of network parameters, including those that may otherwise be difficult to measure. We use theoretical investigations to establish experimental guidelines for the identification of gene regulatory networks, and we apply these guideline to experimentally identify predictive models for different regulatory mechanisms in bacteria and yeast.
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
Ribbon networks for modeling navigable paths of autonomous agents in virtual environments.
Willemsen, Peter; Kearney, Joseph K; Wang, Hongling
2006-01-01
This paper presents the Environment Description Framework (EDF) for modeling complex networks of intersecting roads and pathways in virtual environments. EDF represents information about the layout of streets and sidewalks, the rules that govern behavior on roads and walkways, and the locations of agents with respect to navigable structures. The framework serves as the substrate on which behavior programs for autonomous vehicles and pedestrians are built. Pathways are modeled as ribbons in space. The ribbon structure provides a natural coordinate frame for defining the local geometry of navigable surfaces. EDF includes a powerful runtime interface supported by robust and efficient code for locating objects on the ribbon network, for mapping between Cartesian and ribbon coordinates, and for determining behavioral constraints imposed by the environment.
2009-12-01
type of information available through DISA search tools: Centralized Search, Federated Search , and Enterprise Search (Defense Information Systems... Federated Search , and Enterprise 41 Search services. Likewise, EFD and GCDS support COIs in discovering information by making information
ERIC Educational Resources Information Center
Sardone, Nancy B.
2011-01-01
The confluence of powerful technologies of computers and network connectivity has brought explosive growth to the field of Information Technology (IT). The problem presented in this study is whether the type of learning environment where IT concepts are taught to undergraduates has a relationship to the development of IT fluency and course…
Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks
2017-03-01
MAST is a custom software framework originally designed to facilitate the training of network administrators on live networks using SimWare. The MAST...or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services ...scenario development and testing in a virtual test environment. Commercial and custom software tools that provide the ability to conduct network
Impact of Trust on Security and Performance in Tactical Networks
2013-06-01
and reliability . On the other hand, in organizational theory, trust management has viewed trust as a key factor to manage relationships that flourish...environments challenges, these dynamics can hinder accurate and reliable trust evaluation of entities in the network [10], [11]. • Information Network Domain...trustworthy entities. • Social/Cognitive Network Domain: Social scientists, physiologists, and neuroscientists have studied social trust, interpersonal
Characterisation of Network Objects in Natural and Anthropic Environments
NASA Astrophysics Data System (ADS)
Harris, B.; McDougall, K.; Barry, M.
2014-11-01
Networks are structures that organise component objects, and they are extensive and recognisable across a range of environments. Estimating lengths of networks objects and their relationships to areas contiguous to them could assist provide owners with additional knowledge of their assets. There is currently some understanding of the way in which networks (such as waterways) relate and respond to their natural and anthropogenic environments. Despite this knowledge, there is no straight forward formula, method or model that can be applied to assess these relationships to a sufficient level of detail. Whilst waterway networks and their structures are well understood from the work of Horton and Strahler, relatively little attention has been paid to how (or if) these properties and behaviours can inform the understanding of other, unrelated, networks. Analysis of existing natural and built network objects exhibited how relationships derived from waterway networks can be applied in new areas of interest. We create a predictive approach to associate dissimilar objects such as pipe networks to assess if using the model established for waterway networks and their relationships can be functional in other areas. Using diversity of inputs we create data to assist with the creation of a predictive model. This work provides a clean theoretical connection between a formula applied to evaluate waterways and their environments, and other natural and anthropogenic network objects. It fills a key knowledge gap in the assessment and application of approaches used to measure natural and built networks.
NASA Technical Reports Server (NTRS)
Wang, Yeou-Fang; Schrock, Mitchell; Baldwin, John R.; Borden, Charles S.
2010-01-01
The Ground Resource Allocation and Planning Environment (GRAPE 1.0) is a Web-based, collaborative team environment based on the Microsoft SharePoint platform, which provides Deep Space Network (DSN) resource planners tools and services for sharing information and performing analysis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ahn, Gail-Joon
The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.
Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks
NASA Astrophysics Data System (ADS)
Yan, Gongjun; Yang, Weiming; Shaner, Earl F.; Rawat, Danda B.
Intelligent Vehicular Networks, known as Vehicle-to-Vehicle and Vehicle-to-Roadside wireless communications (also called Vehicular Ad hoc Networks), are revolutionizing our daily driving with better safety and more infortainment. Most, if not all, applications will depend on accurate location information. Thus, it is of importance to provide intrusion-tolerant location information services. In this paper, we describe an adaptive algorithm that detects and filters the false location information injected by intruders. Given a noisy environment of mobile vehicles, the algorithm estimates the high resolution location of a vehicle by refining low resolution location input. We also investigate results of simulations and evaluate the quality of the intrusion-tolerant location service.
Sociospace: A smart social framework based on the IP Multimedia Subsystem
NASA Astrophysics Data System (ADS)
Hasswa, Ahmed
Advances in smart technologies, wireless networking, and increased interest in contextual services have led to the emergence of ubiquitous and pervasive computing as one of the most promising areas of computing in recent years. Smart Spaces, in particular, have gained significant interest within the research community. Currently, most Smart Spaces rely on physical components, such as sensors, to acquire information about the real-world environment. Although current sensor networks can acquire some useful contextual information from the physical environment, their information resources are often limited, and the data acquired is often unreliable. We argue that by introducing social network information into such systems, smarter and more adaptive spaces can be created. Social networks have recently become extremely popular, and are now an integral part of millions of people's daily lives. Through social networks, users create profiles, build relationships, and join groups, forming intermingled sets and communities. Social Networks contain a wealth of information, which, if exploited properly, can lead to a whole new level of smart contextual services. A mechanism is therefore needed to extract data from heterogeneous social networks, to link profiles across different networks, and to aggregate the data obtained. We therefore propose the design and implementation of a Smart Spaces framework that utilizes the social context. In order to manage services and sessions, we integrate our system with the IP Multimedia Subsystem. Our system, which we call SocioSpace, includes full design and implementation of all components, including the central server, the location management system, the social network interfacing system, the service delivery platform, and user agents. We have built a prototype for proof of concept and carried out exhaustive performance analysis; the results show that SocioSpace is scalable, extensible, and fault-tolerant. It is capable of creating Smart Spaces that can truly deliver adaptive services that enhance the users' overall experience, increase their satisfaction, and make the surroundings more beneficial and interesting to them.
Information Assurance Tasks Supporting the Processing of Electronic Records Archives
2007-03-01
3 Table 2. OpenVPN evaluation results...........................................................................................10 iv 1...operation of necessary security features and compare the network performance under OpenVPN (openvpn.net) operation with the network performance under no...VPN operation (non-VPN) in a gigabit network environment. The reason for selecting OpenVPN product was based on the previous findings of Khanvilkar
A Cross Cultural Validation of Perceptions and Use of Social Network Service: An Exploratory Study
ERIC Educational Resources Information Center
Guo, Chengqi
2009-01-01
The rapid developments Social Network Service (SNS) have offered opportunities to re-visit many seminal theoretical assumptions of technology usage within socio-technical environment. Online social network is a rapidly growing field that imposes new questions to the existing IS research paradigm. It is argued that information systems research must…
Peng, Wei; Lan, Wei; Zhong, Jiancheng; Wang, Jianxin; Pan, Yi
2017-07-15
MicroRNAs have been reported to have close relationship with diseases due to their deregulation of the expression of target mRNAs. Detecting disease-related microRNAs is helpful for disease therapies. With the development of high throughput experimental techniques, a large number of microRNAs have been sequenced. However, it is still a big challenge to identify which microRNAs are related to diseases. Recently, researchers are interesting in combining multiple-biological information to identify the associations between microRNAs and diseases. In this work, we have proposed a novel method to predict the microRNA-disease associations based on four biological properties. They are microRNA, disease, gene and environment factor. Compared with previous methods, our method makes predictions not only by using the prior knowledge of associations among microRNAs, disease, environment factors and genes, but also by using the internal relationship among these biological properties. We constructed four biological networks based on the similarity of microRNAs, diseases, environment factors and genes, respectively. Then random walking was implemented on the four networks unequally. In the walking course, the associations can be inferred from the neighbors in the same networks. Meanwhile the association information can be transferred from one network to another. The results of experiment showed that our method achieved better prediction performance than other existing state-of-the-art methods. Copyright © 2017 Elsevier Inc. All rights reserved.
Valdivieso Caraguay, Ángel Leonardo; García Villalba, Luis Javier
2017-01-01
This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors. PMID:28362346
Web Information Systems for Monitoring and Control of Indoor Air Quality at Subway Stations
NASA Astrophysics Data System (ADS)
Choi, Gi Heung; Choi, Gi Sang; Jang, Joo Hyoung
In crowded subway stations indoor air quality (IAQ) is a key factor for ensuring the safety, health and comfort of passengers. In this study, a framework for web-based information system in VDN environment for monitoring and control of IAQ in subway stations is suggested. Since physical variables that describing IAQ need to be closely monitored and controlled in multiple locations in subway stations, concept of distributed monitoring and control network using wireless media needs to be implemented. Connecting remote wireless sensor network and device (LonWorks) networks to the IP network based on the concept of VDN can provide a powerful, integrated, distributed monitoring and control performance, making a web-based information system possible.
Caraguay, Ángel Leonardo Valdivieso; Villalba, Luis Javier García
2017-03-31
This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
ERIC Educational Resources Information Center
Severiens, Thomas; Hohlfeld, Michael; Zimmermann, Kerstin; Hilf, Eberhard R.; von Ossietzky, Carl; Weibel, Stuart L.; Koch, Traugott; Hughes, Carol Ann; Bearman, David
2000-01-01
Includes four articles that discuss a variety to topics, including a distributed network of physics institutions documents called PhysDocs which harvests information from the local Web-servers of professional physics institutions; the Dublin Core metadata initiative; information services for higher education in a competitive environment; and…
Intelligent On-Board Processing in the Sensor Web
NASA Astrophysics Data System (ADS)
Tanner, S.
2005-12-01
Most existing sensing systems are designed as passive, independent observers. They are rarely aware of the phenomena they observe, and are even less likely to be aware of what other sensors are observing within the same environment. Increasingly, intelligent processing of sensor data is taking place in real-time, using computing resources on-board the sensor or the platform itself. One can imagine a sensor network consisting of intelligent and autonomous space-borne, airborne, and ground-based sensors. These sensors will act independently of one another, yet each will be capable of both publishing and receiving sensor information, observations, and alerts among other sensors in the network. Furthermore, these sensors will be capable of acting upon this information, perhaps altering acquisition properties of their instruments, changing the location of their platform, or updating processing strategies for their own observations to provide responsive information or additional alerts. Such autonomous and intelligent sensor networking capabilities provide significant benefits for collections of heterogeneous sensors within any environment. They are crucial for multi-sensor observations and surveillance, where real-time communication with external components and users may be inhibited, and the environment may be hostile. In all environments, mission automation and communication capabilities among disparate sensors will enable quicker response to interesting, rare, or unexpected events. Additionally, an intelligent network of heterogeneous sensors provides the advantage that all of the sensors can benefit from the unique capabilities of each sensor in the network. The University of Alabama in Huntsville (UAH) is developing a unique approach to data processing, integration and mining through the use of the Adaptive On-Board Data Processing (AODP) framework. AODP is a key foundation technology for autonomous internetworking capabilities to support situational awareness by sensors and their on-board processes. The two primary research areas for this project are (1) the on-board processing and communications framework itself, and (2) data mining algorithms targeted to the needs and constraints of the on-board environment. The team is leveraging its experience in on-board processing, data mining, custom data processing, and sensor network design. Several unique UAH-developed technologies are employed in the AODP project, including EVE, an EnVironmEnt for on-board processing, and the data mining tools included in the Algorithm Development and Mining (ADaM) toolkit.
Heterogeneous information sharing of sensor information in contested environments
NASA Astrophysics Data System (ADS)
Wampler, Jason A.; Hsieh, Chien; Toth, Andrew; Sheatsley, Ryan
2017-05-01
The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R and E) project, "Smoke Screen in Cyberspace", was demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. Recovery is only possible after recovering all fragments and attacking/denying one or more nodes does not limit the availability of other fragment copies in the network. This experiment proved the feasibility of redundant file fragmentation, and is the foundation for developing sophisticated methods to blacklist compromised nodes, move data fragments from risks of compromise, and forward stored data fragments closer to the anticipated retrieval point. This paper outlines initial results in scalability of node members, fragment size, file size, and performance in a heterogeneous network consisting of the Wireless Network after Next (WNaN) radio and Common Sensor Radio (CSR).
MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey.
Han, Ruisong; Yang, Wei; You, Kaiming
2016-12-16
Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed.
MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey
Han, Ruisong; Yang, Wei; You, Kaiming
2016-01-01
Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed. PMID:27999258
NASA Astrophysics Data System (ADS)
Sabah, L.; Şimşek, M.
2017-11-01
Social networks are the real social experience of individuals in the online environment. In this environment, people use symbolic gestures and mimics, sharing thoughts and content. Social network analysis is the visualization of complex and large quantities of data to ensure that the overall picture appears. It is the understanding, development, quantitative and qualitative analysis of the relations in the social networks of Graph theory. Social networks are expressed in the form of nodes and edges. Nodes are people/organizations, and edges are relationships between nodes. Relations are directional, non-directional, weighted, and weightless. The purpose of this study is to examine the effects of social networks on the evaluation of person data with spatial coordinates. For this, the cluster size and the effect on the geographical area of the circle where the placements of the individual are influenced by the frequently used placeholder feature in the social networks have been studied.
A cooperative model for IS security risk management in distributed environment.
Feng, Nan; Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.
Liu, Yang; Xu, Songhua; Tourassi, Georgia
2015-01-01
In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.
Networked Learning: Design Considerations for Online Instructors
ERIC Educational Resources Information Center
Czerkawski, Betul C.
2016-01-01
The considerable increase in web-based knowledge networks in the past two decades is strongly influencing learning environments. Learning entails information retrieval, use, communication, and production, and is strongly enriched by socially mediated discussions, debates, and collaborative activities. It is becoming critical for educators to…
Distributed Learning. CAUSE Professional Paper Series, No. 14.
ERIC Educational Resources Information Center
Oblinger, Diana G.; Maruyama, Mark K.
This paper synthesizes current thought about the role of networking technologies in instruction and addresses the need for higher education to create affordable and flexible student-centered "distributed learning environments" employing networking technologies. First, relevant trends are identified in the areas of information volume, technology…
Factors Affecting Information Seeking and Evaluation in a Distributed Learning Environment
ERIC Educational Resources Information Center
Lee, Jae-Shin; Cho, Hichang
2011-01-01
The purpose of this study was to identify and analyze the processes of seeking information online and evaluating this information. We hypothesized that individuals' social network, in-out group categorization, and cultural proclivity would influence their online information-seeking behavior. Also, we tested whether individuals differentiated…
Molecular communication and networking: opportunities and challenges.
Nakano, Tadashi; Moore, Michael J; Wei, Fang; Vasilakos, Athanasios V; Shuai, Jianwei
2012-06-01
The ability of engineered biological nanomachines to communicate with biological systems at the molecular level is anticipated to enable future applications such as monitoring the condition of a human body, regenerating biological tissues and organs, and interfacing artificial devices with neural systems. From the viewpoint of communication theory and engineering, molecular communication is proposed as a new paradigm for engineered biological nanomachines to communicate with the natural biological nanomachines which form a biological system. Distinct from the current telecommunication paradigm, molecular communication uses molecules as the carriers of information; sender biological nanomachines encode information on molecules and release the molecules in the environment, the molecules then propagate in the environment to receiver biological nanomachines, and the receiver biological nanomachines biochemically react with the molecules to decode information. Current molecular communication research is limited to small-scale networks of several biological nanomachines. Key challenges to bridge the gap between current research and practical applications include developing robust and scalable techniques to create a functional network from a large number of biological nanomachines. Developing networking mechanisms and communication protocols is anticipated to introduce new avenues into integrating engineered and natural biological nanomachines into a single networked system. In this paper, we present the state-of-the-art in the area of molecular communication by discussing its architecture, features, applications, design, engineering, and physical modeling. We then discuss challenges and opportunities in developing networking mechanisms and communication protocols to create a network from a large number of bio-nanomachines for future applications.
Scalability of Findability: Decentralized Search and Retrieval in Large Information Networks
ERIC Educational Resources Information Center
Ke, Weimao
2010-01-01
Amid the rapid growth of information today is the increasing challenge for people to survive and navigate its magnitude. Dynamics and heterogeneity of large information spaces such as the Web challenge information retrieval in these environments. Collection of information in advance and centralization of IR operations are hardly possible because…
Information Dynamics as Foundation for Network Management
2014-12-04
developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design
Simulating Operation of a Complex Sensor Network
NASA Technical Reports Server (NTRS)
Jennings, Esther; Clare, Loren; Woo, Simon
2008-01-01
Simulation Tool for ASCTA Microsensor Network Architecture (STAMiNA) ["ASCTA" denotes the Advanced Sensors Collaborative Technology Alliance.] is a computer program for evaluating conceptual sensor networks deployed over terrain to provide military situational awareness. This or a similar program is needed because of the complexity of interactions among such diverse phenomena as sensing and communication portions of a network, deployment of sensor nodes, effects of terrain, data-fusion algorithms, and threat characteristics. STAMiNA is built upon a commercial network-simulator engine, with extensions to include both sensing and communication models in a discrete-event simulation environment. Users can define (1) a mission environment, including terrain features; (2) objects to be sensed; (3) placements and modalities of sensors, abilities of sensors to sense objects of various types, and sensor false alarm rates; (4) trajectories of threatening objects; (5) means of dissemination and fusion of data; and (6) various network configurations. By use of STAMiNA, one can simulate detection of targets through sensing, dissemination of information by various wireless communication subsystems under various scenarios, and fusion of information, incorporating such metrics as target-detection probabilities, false-alarm rates, and communication loads, and capturing effects of terrain and threat.
EnvironMentors: Mentoring At-Risk High School Students through University Partnerships
ERIC Educational Resources Information Center
Monk, Melissa H.; Baustian, Melissa M.; Saari, Courtney R.; Welsh, Susan; D'Elia, Christopher F.; Powers, Joseph E.; Gaston, Suzan; Francis, Pamela
2014-01-01
Informal place-based environmental education is a proven approach for increasing environmental awareness for students in urban cities. This article describes and qualitatively evaluates the first two academic years of the EnvironMentors program at Louisiana State University (LSU-EM), which is part of a national network of EnvironMentors programs.…
Networked Professional Learning: Relating the Formal and the Informal
ERIC Educational Resources Information Center
Vaessen, Matthieu; van den Beemt, Antoine; de Laat, Maarten
2014-01-01
The increasing complexity of the workplace environment requires teachers and professionals in general to tap into their social networks, inside and outside circles of direct colleagues and collaborators, for finding appropriate knowledge and expertise. This collective process of sharing and constructing knowledge can be considered "networked…
Amuyunzu-Nyamongo, M; Okeng'o, L; Wagura, A; Mwenzwa, E
2007-01-01
This paper examines two key dimensions of HIV and AIDS in sub-Saharan Africa, namely poverty and gender, within the particular context of informal settlements. The study, conducted in five informal settlements of Nairobi, Kenya explored the challenges facing women living with HIV and AIDS (WLWA) in informal settlements in Nairobi in terms of the specific risk environments of informal settlements, the support they receive and their perceptions of their future. The data were gathered through an interviewer-based questionnaire administered to 390 WLWA and 20 key informant interviews with Kenya Network of Women with AIDS (KENWA) project personnel. The results show that for WLWA in informal settlements, poverty and poor living conditions combine to increase the risk environment for HIV infection and other opportunistic infections and that the WLWA then face HIV- and AIDS-related problems that are exacerbated by poverty and by the poor living environments. In response, the WLWA had devised coping strategies that were largely centred on survival, including commercial sex work and the sale of illicit liquor, thus increasing their susceptibility to re-infections. Insecurity in informal settlements curtailed their participation in income generating activities (IGAs) and increased their risk of rape and HIV re-infection. Recognising the disadvantaged position of communities in informal settlements, the non-governmental organizations (NGOs), community-based organizations (CBOs) and faith-based organizations (FBOs) provide a range of services including HIV and AIDS information and therapy. Paradoxically, living in urban informal settlements was found to increase WLWA's access to HIV and AIDS prevention and treatment services through NGOs and social networks that are not found in more established residential areas. The sustainability of these services is, however, questioned, given the lack of local resources, weak state support and high donor dependency. We suggest that the economic and tenure insecurity found among WLWA demands in response consistent support through comprehensive, sustainable HIV and AIDS services complemented by social networks and community sensitisation against stigma and discrimination. Fundamentally, the upgrading of informal settlements would address the wider risk environments that exacerbate the poor health of the WLWA who line in them.
Quantum demultiplexer of quantum parameter-estimation information in quantum networks
NASA Astrophysics Data System (ADS)
Xie, Yanqing; Huang, Yumeng; Wu, Yinzhong; Hao, Xiang
2018-05-01
The quantum demultiplexer is constructed by a series of unitary operators and multipartite entangled states. It is used to realize information broadcasting from an input node to multiple output nodes in quantum networks. The scheme of quantum network communication with respect to phase estimation is put forward through the demultiplexer subjected to amplitude damping noises. The generalized partial measurements can be applied to protect the transferring efficiency from environmental noises in the protocol. It is found out that there are some optimal coherent states which can be prepared to enhance the transmission of phase estimation. The dynamics of state fidelity and quantum Fisher information are investigated to evaluate the feasibility of the network communication. While the state fidelity deteriorates rapidly, the quantum Fisher information can be enhanced to a maximum value and then decreases slowly. The memory effect of the environment induces the oscillations of fidelity and quantum Fisher information. The adjustment of the strength of partial measurements is helpful to increase quantum Fisher information.
An, Sungbae; Kwon, Young-Kyun; Yoon, Sungroh
2013-01-01
The assessment of information transfer in the global economic network helps to understand the current environment and the outlook of an economy. Most approaches on global networks extract information transfer based mainly on a single variable. This paper establishes an entirely new bioinformatics-inspired approach to integrating information transfer derived from multiple variables and develops an international economic network accordingly. In the proposed methodology, we first construct the transfer entropies (TEs) between various intra- and inter-country pairs of economic time series variables, test their significances, and then use a weighted sum approach to aggregate information captured in each TE. Through a simulation study, the new method is shown to deliver better information integration compared to existing integration methods in that it can be applied even when intra-country variables are correlated. Empirical investigation with the real world data reveals that Western countries are more influential in the global economic network and that Japan has become less influential following the Asian currency crisis. PMID:23300959
Kim, Jinkyu; Kim, Gunn; An, Sungbae; Kwon, Young-Kyun; Yoon, Sungroh
2013-01-01
The assessment of information transfer in the global economic network helps to understand the current environment and the outlook of an economy. Most approaches on global networks extract information transfer based mainly on a single variable. This paper establishes an entirely new bioinformatics-inspired approach to integrating information transfer derived from multiple variables and develops an international economic network accordingly. In the proposed methodology, we first construct the transfer entropies (TEs) between various intra- and inter-country pairs of economic time series variables, test their significances, and then use a weighted sum approach to aggregate information captured in each TE. Through a simulation study, the new method is shown to deliver better information integration compared to existing integration methods in that it can be applied even when intra-country variables are correlated. Empirical investigation with the real world data reveals that Western countries are more influential in the global economic network and that Japan has become less influential following the Asian currency crisis.
Bluetooth Roaming for Sensor Network System in Clinical Environment.
Kuroda, Tomohiro; Noma, Haruo; Takase, Kazuhiko; Sasaki, Shigeto; Takemura, Tadamasa
2015-01-01
A sensor network is key infrastructure for advancing a hospital information system (HIS). The authors proposed a method to provide roaming functionality for Bluetooth to realize a Bluetooth-based sensor network, which is suitable to connect clinical devices. The proposed method makes the average response time of a Bluetooth connection less than one second by making the master device repeat the inquiry process endlessly and modifies parameters of the inquiry process. The authors applied the developed sensor network for daily clinical activities in an university hospital, and confirmed the stabilitya and effectiveness of the sensor network. As Bluetooth becomes a quite common wireless interface for medical devices, the proposed protocol that realizes Bluetooth-based sensor network enables HIS to equip various clinical devices and, consequently, lets information and communication technologies advance clinical services.
QPA-CLIPS: A language and representation for process control
NASA Technical Reports Server (NTRS)
Freund, Thomas G.
1994-01-01
QPA-CLIPS is an extension of CLIPS oriented towards process control applications. Its constructs define a dependency network of process actions driven by sensor information. The language consists of three basic constructs: TASK, SENSOR, and FILTER. TASK's define the dependency network describing alternative state transitions for a process. SENSOR's and FILTER's define sensor information sources used to activate state transitions within the network. Deftemplate's define these constructs and their run-time environment is an interpreter knowledge base, performing pattern matching on sensor information and so activating TASK's in the dependency network. The pattern matching technique is based on the repeatable occurrence of a sensor data pattern. QPA-CIPS has been successfully tested on a SPARCStation providing supervisory control to an Allen-Bradley PLC 5 controller driving molding equipment.
Environmental networks for large-scale monitoring of Earth and atmosphere
NASA Astrophysics Data System (ADS)
Maurodimou, Olga; Kolios, Stavros; Konstantaras, Antonios; Georgoulas, George; Stylios, Chrysostomos
2013-04-01
Installation and operation of instrument/sensor networks are proven fundamental in the monitoring of the physical environment from local to global scale. The advances in electronics, wireless communications and informatics has led to the development of a huge number of networks at different spatial scales that measure, collect and store a wide range of environmental parameters. These networks have been gradually evolved into integrated information systems that provide real time monitoring, forecasts and different products from the initial collected datasets. Instrument/sensor networks have nowadays become important solutions for environmental monitoring, comprising a basic component of fully automated systems developing worldwide that contribute in the efforts for a sustainable Earth's environment (e.g. Hart et al., 2006, Othman et al., 2012). They are also used as a source of data for models parameterization and as verification tools for accuracy assessment techniques of the satellite imagery. Environmental networks can be incorporated into decision support systems (e.g Rizzi et al., 2012) providing informational background along with data from satellites for decision making, manage problems, suggest solutions and best practices for a sustainable management of the environment. This is a comparative study aiming to examine and highlight the significant role of existing instrument/sensor networks for large-scale monitoring of environmental issues, especially atmospheric and marine environment as well as weather and climate. We provide characteristic examples of integrated systems based on large scale instrument/sensor networks along with other sources of data (like satellite datasets) as informational background to measure, identify, monitor, analyze and forecast a vast series of atmospheric parameters (like CO2, O3, particle matter and solar irradiance), weather, climate and their impacts (e.g., cloud systems, lightnings, rainfall, air and surface temperature, humidity, winds) and marine environment (salinity, water quality, sea surface temperature among others). "ZEUS" lightning detection system (Chronis et al. 2006, Lagouvardos et al. 2009), "UVnet" system that is primarily referred to the UltaViolet solar irradiance (Bais et al. 2006, Kazantzidis et al. 2006) and "GLOBcolour" system for seas monitoring, are some characteristic examples of systems that use networks of instruments/sensors to monitor relative parameters. The chosen examples are focused on the European continent. Basic operating principles of these networks, their usefulness, restrictions and their perspectives in the environmental real time basis monitoring and forecast, are also described. References Bais, A.F., Meleti, C. Kazantzidis, A., Topaloglou, C., Zerefos, C.S., Kosmidis, E. 2006. Greek UV Network: Results and perspectives after three years. 8th Conference on Meteorology - Climatology and Atmospheric Physics, 24-25 May, Athens, Greece. Chronis, T., Anagnostou, E. 2006. Evaluation of a Long-Range Lightning Detection Network with Receivers in Europe and Africa. IEEE Transactions on Geoscience and Remote Sensing, 44, 1504-1510. Hart, K.J., Martinez, K. 2006. Environmental Sensor Networks: A revolution in the Earth system science? Earth-Science Reviews, 78, 178-19. Kazantzidis, A., Bais, A.F, Topaloglou, C., Garane, K., Zempila, M., Meleti, C., Zerefos, C.S. 2006. Quality assurance of the Greek UV Network: preliminary results from the pilot phase operation. Proceedings of SPIE Europe Remote Sensing of Clouds and the Atmosphere XI, vol. 6362, 636229-1 - 636229-10, Stockholm, Sweden, 11-14 September. Lagouvardos, K., Kotroni, V, Betz, D-H., Schmidt, K. 2009. A comparison of lightning data provided by ZEUS and LINET networks over Western Europe. Natural Hazards and Earth Systems Sciences, 9, 1713-1717. Maritorena, S., D'Andon, O.H.F., Mangin, A., Siegel, D.A., 2010. Merged satellite ocean color data products using bio-optical model: Characteristics, benefits and issues. Remote Sensing of Environment, 114, 1791-1804. Othman, M.F., Shazali K., 2012. Wireless Network Applications: A study in environment monitoring system. Procedia Engineering, 41, 1204-1210. Rizzi, J., Torresan, S., Zabeo, A., Gallina, V., Critto, A., Marcomini, A., 2012. A GIS-based Decision Support System to support the implementation of integrated coastal zone management - preliminary results from the PEGASO project. Proceedings of the AGILE' 2012 International Conference on Geographical Information Science, Avignon, April, 24-27.
Social roles and the evolution of networks in extreme and isolated environments
NASA Technical Reports Server (NTRS)
Johnson, Jeffrey C.; Boster, James S.; Palinkas, Lawrence A.
2003-01-01
This article reports on the evolution of network structure as it relates to formal and informal social roles in well-bounded, isolated groups. Research was conducted at the Amundsen-Scott South Pole Station. Data were collected on crewmembers' networks of social interaction over each of three winter-over periods, when the station is completely isolated. In addition, data were collected on the informal roles played by crewmembers (e.g., instrumental leadership, expressive leadership). The study found that globally coherent networks in winter-over groups were associated with group consensus on the presence of critically important informal social roles (e.g., expressive leadership) where global coherence is the extent to which a network forms a single group composed of a unitary core and periphery as opposed to being factionalized into two or more subgroups. Conversely, the evolution of multiple subgroups was associated with the absence of consensus on critical informal social roles, above all the critically important role of instrumental leader.
ERIC Educational Resources Information Center
CAUSE, Boulder, CO.
Proceedings of a 1986 CAUSE conference on the impact of converging information technologies are presented. Topics of conference papers include: policy issues in higher education, planning and information technology, people issues in information technology, telecommunications/networking, special environments, microcomputer issues and applications,…
A Historical Study of Operational Command: A Resource for Researchers
2005-03-01
PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is
A Historical Study of Operational: A Resource for Researches
2005-03-01
PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... Impact (FONSI) AGENCY: Defense Logistics Agency, DoD. ACTION: Notice of Availability (NOA) for Strategic Network Optimization (SNO) Environmental Assessment (EA) Finding of No Significant Impact (FONSI). SUMMARY... impacts on the human environment are associated with this decision. FOR FURTHER INFORMATION CONTACT: Ann...
Z39.50 and the Scholar's Workstation Concept.
ERIC Educational Resources Information Center
Phillips, Gary Lee
1992-01-01
Examines the potential application of the American National Standards Institute (ANSI)/National Information Standards Organization (NISO) Z39.50 library networking protocol as a client/server environment for a scholar's workstation. Computer networking models are described, and linking the workstation to an online public access catalog (OPAC) is…
Social Networks and Performance in Distributed Learning Communities
ERIC Educational Resources Information Center
Cadima, Rita; Ojeda, Jordi; Monguet, Josep M.
2012-01-01
Social networks play an essential role in learning environments as a key channel for knowledge sharing and students' support. In distributed learning communities, knowledge sharing does not occur as spontaneously as when a working group shares the same physical space; knowledge sharing depends even more on student informal connections. In this…
A Cooperative Model for IS Security Risk Management in Distributed Environment
Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626
A computer tool to support in design of industrial Ethernet.
Lugli, Alexandre Baratella; Santos, Max Mauro Dias; Franco, Lucia Regina Horta Rodrigues
2009-04-01
This paper presents a computer tool to support in the project and development of an industrial Ethernet network, verifying the physical layer (cables-resistance and capacitance, scan time, network power supply-POE's concept "Power Over Ethernet" and wireless), and occupation rate (amount of information transmitted to the network versus the controller network scan time). These functions are accomplished without a single physical element installed in the network, using only simulation. The computer tool has a software that presents a detailed vision of the network to the user, besides showing some possible problems in the network, and having an extremely friendly environment.
2008-05-13
IA capabilities applied to protect, defend, and respond to them. This will provide decision makers and network operators, at all command levels...procedures to recognize, react, and respond to potential system and network compromises must be in place and provide control sufficient to protect the...to respond to and track users’ needs. • Information Service Visibility. Interview responses described a need for the reporting of network status and
Supporting tactical intelligence using collaborative environments and social networking
NASA Astrophysics Data System (ADS)
Wollocko, Arthur B.; Farry, Michael P.; Stark, Robert F.
2013-05-01
Modern military environments place an increased emphasis on the collection and analysis of intelligence at the tactical level. The deployment of analytical tools at the tactical level helps support the Warfighter's need for rapid collection, analysis, and dissemination of intelligence. However, given the lack of experience and staffing at the tactical level, most of the available intelligence is not exploited. Tactical environments are staffed by a new generation of intelligence analysts who are well-versed in modern collaboration environments and social networking. An opportunity exists to enhance tactical intelligence analysis by exploiting these personnel strengths, but is dependent on appropriately designed information sharing technologies. Existing social information sharing technologies enable users to publish information quickly, but do not unite or organize information in a manner that effectively supports intelligence analysis. In this paper, we present an alternative approach to structuring and supporting tactical intelligence analysis that combines the benefits of existing concepts, and provide detail on a prototype system embodying that approach. Since this approach employs familiar collaboration support concepts from social media, it enables new-generation analysts to identify the decision-relevant data scattered among databases and the mental models of other personnel, increasing the timeliness of collaborative analysis. Also, the approach enables analysts to collaborate visually to associate heterogeneous and uncertain data within the intelligence analysis process, increasing the robustness of collaborative analyses. Utilizing this familiar dynamic collaboration environment, we hope to achieve a significant reduction of time and skill required to glean actionable intelligence in these challenging operational environments.
NASA Astrophysics Data System (ADS)
Zhang, X.-S.; Xie, Hua
This paper presents a learning-by-doing method in the Internet environment to enhance the results of information technology education by experimental work in the classroom of colleges. In this research, an practical approach to apply the "learning by doing" paradigm in Internet-based learning, both for higher educational environments and life-long training systems, taking into account available computer and network resources, such as blogging, podcasting, social networks, wiki etc. We first introduce the different phases in the learning process, which aimed at showing to the readers that the importance of the learning by doing paradigm, which is not implemented in many Internet-based educational environments. Secondly, we give the concept of learning by doing in the different perfective. Then, we identify the most important trends in this field, and give a real practical case for the application of this approach. The results show that the attempt methods are much better than traditional teaching methods.
Photogrammetric point cloud compression for tactical networks
NASA Astrophysics Data System (ADS)
Madison, Andrew C.; Massaro, Richard D.; Wayant, Clayton D.; Anderson, John E.; Smith, Clint B.
2017-05-01
We report progress toward the development of a compression schema suitable for use in the Army's Common Operating Environment (COE) tactical network. The COE facilitates the dissemination of information across all Warfighter echelons through the establishment of data standards and networking methods that coordinate the readout and control of a multitude of sensors in a common operating environment. When integrated with a robust geospatial mapping functionality, the COE enables force tracking, remote surveillance, and heightened situational awareness to Soldiers at the tactical level. Our work establishes a point cloud compression algorithm through image-based deconstruction and photogrammetric reconstruction of three-dimensional (3D) data that is suitable for dissimination within the COE. An open source visualization toolkit was used to deconstruct 3D point cloud models based on ground mobile light detection and ranging (LiDAR) into a series of images and associated metadata that can be easily transmitted on a tactical network. Stereo photogrammetric reconstruction is then conducted on the received image stream to reveal the transmitted 3D model. The reported method boasts nominal compression ratios typically on the order of 250 while retaining tactical information and accurate georegistration. Our work advances the scope of persistent intelligence, surveillance, and reconnaissance through the development of 3D visualization and data compression techniques relevant to the tactical operations environment.
Body area network--a key infrastructure element for patient-centered telemedicine.
Norgall, Thomas; Schmidt, Robert; von der Grün, Thomas
2004-01-01
The Body Area Network (BAN) extends the range of existing wireless network technologies by an ultra-low range, ultra-low power network solution optimised for long-term or continuous healthcare applications. It enables wireless radio communication between several miniaturised, intelligent Body Sensor (or actor) Units (BSU) and a single Body Central Unit (BCU) worn at the human body. A separate wireless transmission link from the BCU to a network access point--using different technology--provides for online access to BAN components via usual network infrastructure. The BAN network protocol maintains dynamic ad-hoc network configuration scenarios and co-existence of multiple networks.BAN is expected to become a basic infrastructure element for electronic health services: By integrating patient-attached sensors and mobile actor units, distributed information and data processing systems, the range of medical workflow can be extended to include applications like wireless multi-parameter patient monitoring and therapy support. Beyond clinical use and professional disease management environments, private personal health assistance scenarios (without financial reimbursement by health agencies / insurance companies) enable a wide range of applications and services in future pervasive computing and networking environments.
DEFENSE ENVIRONMENTAL NETWORK AND INFORMATION EXCHANGE (DENIX)
DENIX serves as a central platform for the dissemination of environment, safety and occupational health (ESOH) news, policy, and guidance within Department of Defense (DoD) activities worldwide, in support of the national defense mission. DENIX informs ESOH professionals of salie...
Application Architecture of Avian Influenza Research Collaboration Network in Korea e-Science
NASA Astrophysics Data System (ADS)
Choi, Hoon; Lee, Junehawk
In the pursuit of globalization of the AI e-Science environment, KISTI is fostering to extend the AI research community to the AI research institutes of neighboring countries and to share the AI e-Science environment with them in the near future. In this paper we introduce the application architecture of AI research collaboration network (AIRCoN). AIRCoN is a global e-Science environment for AI research conducted by KISTI. It consists of AI virus sequence information sharing system for sufficing data requirement of research community, integrated analysis environment for analyzing the mutation pattern of AI viruses and their risks, epidemic modeling and simulation environment for establishing national effective readiness strategy against AI pandemics, and knowledge portal for sharing expertise of epidemic study and unpublished research results with community members.
Co-creation and Co-innovation in a Collaborative Networked Environment
NASA Astrophysics Data System (ADS)
Klen, Edmilson Rampazzo
Leveraged by the advances in communication and information Technologies, producers and consumers are developing a new behavior. Together with the new emerging collaborative manifestations this behavior may directly impact the way products are developed. This powerful combination indicates that consumers will be involved in a very early stage in product development processes supporting even more the creation and innovation of products. This new way of collaboration gives rise to a new collaborative networked environment based on co-creation and co-innovation. This work will present some evolutionary steps that point to the development of this environment where prosumer communities and virtual organizations interact and collaborate.
NASA Astrophysics Data System (ADS)
Oguchi, Kimio
2016-03-01
The recent dramatic advances in information and communication technologies have yielded new environments. However, adoption still differs area by area. To realize the future broadband environment that everyone can enjoy everywhere, several technical issues have to be resolved before network penetration becomes ubiquitous. One such key is the use of fiber optics for the home and mobile services. This article overviews initial observations drawn from numerical survey data gathered over the last decade in several countries/regions, and gives some example scenarios for network/service evolution. One result implies that implementing new/future services must consider the gross domestic product impact.
Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services
NASA Astrophysics Data System (ADS)
Soppera, A.; Burbridge, T.
During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].
FuzzyFusion: an application architecture for multisource information fusion
NASA Astrophysics Data System (ADS)
Fox, Kevin L.; Henning, Ronda R.
2009-04-01
The correlation of information from disparate sources has long been an issue in data fusion research. Traditional data fusion addresses the correlation of information from sources as diverse as single-purpose sensors to all-source multi-media information. Information system vulnerability information is similar in its diversity of sources and content, and in the desire to draw a meaningful conclusion, namely, the security posture of the system under inspection. FuzzyFusionTM, A data fusion model that is being applied to the computer network operations domain is presented. This model has been successfully prototyped in an applied research environment and represents a next generation assurance tool for system and network security.
Legacy system integration using web technology
NASA Astrophysics Data System (ADS)
Kennedy, Richard L.; Seibert, James A.; Hughes, Chris J.
2000-05-01
As healthcare moves towards a completely digital, multimedia environment there is an opportunity to provide for cost- effective, highly distributed physician access to clinical information including radiology-based imaging. In order to address this opportunity a Universal Clinical Desktop (UCD) system was developed. A UCD provides a single point of entry into an integrated view of all types of clinical data available within a network of disparate healthcare information systems. In order to explore the application of a UCD in a hospital environment, a pilot study was established with the University of California Davis Medical Center using technology from Trilix Information Systems. Within this pilot environment the information systems integrated under the UCD include a radiology information system (RIS), a picture archive and communication system (PACS) and a laboratory information system (LIS).
Resource Management In Peer-To-Peer Networks: A Nadse Approach
NASA Astrophysics Data System (ADS)
Patel, R. B.; Garg, Vishal
2011-12-01
This article presents a common solution to Peer-to-Peer (P2P) network problems and distributed computing with the help of "Neighbor Assisted Distributed and Scalable Environment" (NADSE). NADSE supports both device and code mobility. In this article mainly we focus on the NADSE based resource management technique. How information dissemination and searching is speedup when using the NADSE service provider node in large network. Results show that performance of the NADSE network is better in comparison to Gnutella, and Freenet.
NASA Technical Reports Server (NTRS)
Meyer, P.; Shire, J.; Qualters, Judy; Daley, Randolph; Fiero, Leslie Todorov; Autry, Andy; Avchen, Rachel; Stock, Allison; Correa, Adolofo; Siffel, Csaba;
2007-01-01
CDC and its partners established the Health and Environment Linked for Information Exchange, Atlanta (HELIX-Atlanta) demonstration project, to develop linking and analysis methods that could be used by the National Environmental Public Health Tracking (EPHT) Network. Initiated in October 2003, the Metropolitan Atlanta-based collaborative conducted four projects: asthma and particulate air pollution, birth defects and ozone and particulate air pollution, childhood leukemia and traffic emissions, and children's blood lead testing and neighborhood risk factors for lead poisoning. This report provides an overview of the HELIX-Atlanta projects' goals, methods and outcomes. We discuss priority attributes and common issues and challenges and offer recommendations for implementation of the nascent national environmental public health tracking network.
Optimized Sensor Network and Multi-Agent Decision Support for Smart Traffic Light Management.
Cruz-Piris, Luis; Rivera, Diego; Fernandez, Susel; Marsa-Maestre, Ivan
2018-02-02
One of the biggest challenges in modern societies is to solve vehicular traffic problems. Sensor networks in traffic environments have contributed to improving the decision-making process of Intelligent Transportation Systems. However, one of the limiting factors for the effectiveness of these systems is in the deployment of sensors to provide accurate information about the traffic. Our proposal is using the centrality measurement of a graph as a base to locate the best locations for sensor installation in a traffic network. After integrating these sensors in a simulation scenario, we define a Multi-Agent Systems composed of three types of agents: traffic light management agents, traffic jam detection agents, and agents that control the traffic lights at an intersection. The ultimate goal of these Multi-Agent Systems is to improve the trip duration for vehicles in the network. To validate our solution, we have developed the needed elements for modelling the sensors and agents in the simulation environment. We have carried out experiments using the Simulation of Urban MObility (SUMO) traffic simulator and the Travel and Activity PAtterns Simulation (TAPAS) Cologne traffic scenario. The obtained results show that our proposal allows to reduce the sensor network while still obtaining relevant information to have a global view of the environment. Finally, regarding the Multi-Agent Systems, we have carried out experiments that show that our proposal is able to improve other existing solutions such as conventional traffic light management systems (static or dynamic) in terms of reduction of vehicle trip duration and reduction of the message exchange overhead in the sensor network.
Optimized Sensor Network and Multi-Agent Decision Support for Smart Traffic Light Management
2018-01-01
One of the biggest challenges in modern societies is to solve vehicular traffic problems. Sensor networks in traffic environments have contributed to improving the decision-making process of Intelligent Transportation Systems. However, one of the limiting factors for the effectiveness of these systems is in the deployment of sensors to provide accurate information about the traffic. Our proposal is using the centrality measurement of a graph as a base to locate the best locations for sensor installation in a traffic network. After integrating these sensors in a simulation scenario, we define a Multi-Agent Systems composed of three types of agents: traffic light management agents, traffic jam detection agents, and agents that control the traffic lights at an intersection. The ultimate goal of these Multi-Agent Systems is to improve the trip duration for vehicles in the network. To validate our solution, we have developed the needed elements for modelling the sensors and agents in the simulation environment. We have carried out experiments using the Simulation of Urban MObility (SUMO) traffic simulator and the Travel and Activity PAtterns Simulation (TAPAS) Cologne traffic scenario. The obtained results show that our proposal allows to reduce the sensor network while still obtaining relevant information to have a global view of the environment. Finally, regarding the Multi-Agent Systems, we have carried out experiments that show that our proposal is able to improve other existing solutions such as conventional traffic light management systems (static or dynamic) in terms of reduction of vehicle trip duration and reduction of the message exchange overhead in the sensor network. PMID:29393884
Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth
2013-09-01
This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.
Internetworking in the military environment
NASA Astrophysics Data System (ADS)
Davies, B. H.; Bates, A. S.
1981-07-01
The increasing requirement for data communications in the military environment and the heterogeneous nature of the network technologies and protocols involved are highlighted. The design of a military internet architecture, influenced by the military requirements, especially that of survivability, is discussed. Comparison with the civilian PTT approach to internetworking shows that while there are economic advantages to using civilian international standards where possible, these standards do not satisfy the military requirements. In particular the strategies for routing in a heavily damaged network environment and addressing hosts that migrate from one network to another must form an integral part of the overall architectural design. This results in gateways whose routing tables have a finer degree of detail of the internet topology than is usually required but which do not contain connection oriented information. Finally, practical experience gained on the ARPA catenet system is described.
Combining Multiple Forms Of Visual Information To Specify Contact Relations In Spatial Layout
NASA Astrophysics Data System (ADS)
Sedgwick, Hal A.
1990-03-01
An expert system, called Layout2, has been described, which models a subset of available visual information for spatial layout. The system is used to examine detailed interactions between multiple, partially redundant forms of information in an environment-centered geometrical model of an environment obeying certain rather general constraints. This paper discusses the extension of Layout2 to include generalized contact relations between surfaces. In an environment-centered model, the representation of viewer-centered distance is replaced by the representation of environmental location. This location information is propagated through the representation of the environment by a network of contact relations between contiguous surfaces. Perspective information interacts with other forms of information to specify these contact relations. The experimental study of human perception of contact relations in extended spatial layouts is also discussed. Differences between human results and Layout2 results reveal limitations in the human ability to register available information; they also point to the existence of certain forms of information not yet formalized in Layout2.
Augmenting Trust Establishment in Dynamic Systems with Social Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J; Kumar, Mohan; Venkatesh, Svetha
2010-01-01
Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties. Pervasive computing systems are invisible systems, oriented around the user. As a result,more » many future pervasive systems are likely to include a social aspect to the system. The social communities that are developed in these systems can augment existing trust mechanisms with information about pre-trusted entities or entities to initially consider when beginning to establish trust. An example of such a system is the Collaborative Virtual Observation (CoVO) system fuses sensor information from disaparate sources in soft real-time to recreate a scene that provides observation of an event that has recently transpired. To accomplish this, CoVO must efficently access services whilst protecting the data from corruption from unknown remote nodes. CoVO combines dynamic service composition with virtual observation to utilize existing infrastructure with third party services available in the environment. Since these services are not under the control of the system, they may be unreliable or malicious. When an event of interest occurs, the given infrastructure (bus cameras, etc.) may not sufficiently cover the necessary information (be it in space, time, or sensor type). To enhance observation of the event, infrastructure is augmented with information from sensors in the environment that the infrastructure does not control. These sensors may be unreliable, uncooperative, or even malicious. Additionally, to execute queries in soft real-time, processing must be distributed to available systems in the environment. We propose to use information from social networks to satisfy these requirements. In this paper, we present our position that knowledge gained from social activities can be used to augment trust mechanisms in pervasive computing. The system uses social behavior of nodes to predict a subset that it wants to query for information. In this context, social behavior such as transit patterns and schedules (which can be used to determine if a queried node is likely to be reliable) or known relationships, such as a phone's address book, that can be used to determine networks of nodes that may also be able to assist in retrieving information. Neither implicit nor explicit relationships necessarily imply that the user trusts an entity, but rather will provide a starting place for establishing trust. The proposed framework utilizes social network information to assist in trust establishment when third-party sensors are used for sensing events.« less
Azpilicueta, Leire; López-Iturri, Peio; Aguirre, Erik; Mateo, Ignacio; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco
2014-12-10
The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs) in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.
A network-based training environment: a medical image processing paradigm.
Costaridou, L; Panayiotakis, G; Sakellaropoulos, P; Cavouras, D; Dimopoulos, J
1998-01-01
The capability of interactive multimedia and Internet technologies is investigated with respect to the implementation of a distance learning environment. The system is built according to a client-server architecture, based on the Internet infrastructure, composed of server nodes conceptually modelled as WWW sites. Sites are implemented by customization of available components. The environment integrates network-delivered interactive multimedia courses, network-based tutoring, SIG support, information databases of professional interest, as well as course and tutoring management. This capability has been demonstrated by means of an implemented system, validated with digital image processing content, specifically image enhancement. Image enhancement methods are theoretically described and applied to mammograms. Emphasis is given to the interactive presentation of the effects of algorithm parameters on images. The system end-user access depends on available bandwidth, so high-speed access can be achieved via LAN or local ISDN connections. Network based training offers new means of improved access and sharing of learning resources and expertise, as promising supplements in training.
Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205
Social Knowledge Awareness Map for Computer Supported Ubiquitous Learning Environment
ERIC Educational Resources Information Center
El-Bishouty, Moushir M.; Ogata, Hiroaki; Rahman, Samia; Yano, Yoneo
2010-01-01
Social networks are helpful for people to solve problems by providing useful information. Therefore, the importance of mobile social software for learning has been supported by many researches. In this research, a model of personalized collaborative ubiquitous learning environment is designed and implemented in order to support learners doing…
A Lane-Level LBS System for Vehicle Network with High-Precision BDS/GPS Positioning
Guo, Chi; Guo, Wenfei; Cao, Guangyi; Dong, Hongbo
2015-01-01
In recent years, research on vehicle network location service has begun to focus on its intelligence and precision. The accuracy of space-time information has become a core factor for vehicle network systems in a mobile environment. However, difficulties persist in vehicle satellite positioning since deficiencies in the provision of high-quality space-time references greatly limit the development and application of vehicle networks. In this paper, we propose a high-precision-based vehicle network location service to solve this problem. The major components of this study include the following: (1) application of wide-area precise positioning technology to the vehicle network system. An adaptive correction message broadcast protocol is designed to satisfy the requirements for large-scale target precise positioning in the mobile Internet environment; (2) development of a concurrence service system with a flexible virtual expansion architecture to guarantee reliable data interaction between vehicles and the background; (3) verification of the positioning precision and service quality in the urban environment. Based on this high-precision positioning service platform, a lane-level location service is designed to solve a typical traffic safety problem. PMID:25755665
The Virtual School Library: Gateway to the Information Superhighway.
ERIC Educational Resources Information Center
Kuhlthau, Carol Collier, Ed.; And Others
This book is a compilation of 14 articles that present a wide range of perspectives on providing access to vast networks of information resources and enabling students to learn in an information-rich environment. The articles, arranged in four parts--overview of important technologies comprising the virtual library, learning in the electronic…
Semantic Data Integration and Knowledge Management to Represent Biological Network Associations.
Losko, Sascha; Heumann, Klaus
2017-01-01
The vast quantities of information generated by academic and industrial research groups are reflected in a rapidly growing body of scientific literature and exponentially expanding resources of formalized data, including experimental data, originating from a multitude of "-omics" platforms, phenotype information, and clinical data. For bioinformatics, the challenge remains to structure this information so that scientists can identify relevant information, to integrate this information as specific "knowledge bases," and to formalize this knowledge across multiple scientific domains to facilitate hypothesis generation and validation. Here we report on progress made in building a generic knowledge management environment capable of representing and mining both explicit and implicit knowledge and, thus, generating new knowledge. Risk management in drug discovery and clinical research is used as a typical example to illustrate this approach. In this chapter we introduce techniques and concepts (such as ontologies, semantic objects, typed relationships, contexts, graphs, and information layers) that are used to represent complex biomedical networks. The BioXM™ Knowledge Management Environment is used as an example to demonstrate how a domain such as oncology is represented and how this representation is utilized for research.
The Price of Uncertainty in Security Games
NASA Astrophysics Data System (ADS)
Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas
In the realm of information security, lack of information about other users' incentives in a network can lead to inefficient security choices and reductions in individuals' payoffs. We propose, contrast and compare three metrics for measuring the price of uncertainty due to the departure from the payoff-optimal security outcomes under complete information. Per the analogy with other efficiency metrics, such as the price of anarchy, we define the price of uncertainty as the maximum discrepancy in expected payoff in a complete information environment versus the payoff in an incomplete information environment. We consider difference, payoffratio, and cost-ratio metrics as canonical nontrivial measurements of the price of uncertainty. We conduct an algebraic, numerical, and graphical analysis of these metrics applied to different well-studied security scenarios proposed in prior work (i.e., best shot, weakest-link, and total effort). In these scenarios, we study how a fully rational expert agent could utilize the metrics to decide whether to gather information about the economic incentives of multiple nearsighted and naïve agents. We find substantial differences between the various metrics and evaluate the appropriateness for security choices in networked systems.
SWARMs Ontology: A Common Information Model for the Cooperation of Underwater Robots.
Li, Xin; Bilbao, Sonia; Martín-Wanton, Tamara; Bastos, Joaquim; Rodriguez, Jonathan
2017-03-11
In order to facilitate cooperation between underwater robots, it is a must for robots to exchange information with unambiguous meaning. However, heterogeneity, existing in information pertaining to different robots, is a major obstruction. Therefore, this paper presents a networked ontology, named the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) ontology, to address information heterogeneity and enable robots to have the same understanding of exchanged information. The SWARMs ontology uses a core ontology to interrelate a set of domain-specific ontologies, including the mission and planning, the robotic vehicle, the communication and networking, and the environment recognition and sensing ontology. In addition, the SWARMs ontology utilizes ontology constructs defined in the PR-OWL ontology to annotate context uncertainty based on the Multi-Entity Bayesian Network (MEBN) theory. Thus, the SWARMs ontology can provide both a formal specification for information that is necessarily exchanged between robots and a command and control entity, and also support for uncertainty reasoning. A scenario on chemical pollution monitoring is described and used to showcase how the SWARMs ontology can be instantiated, be extended, represent context uncertainty, and support uncertainty reasoning.
Topology-dependent density optima for efficient simultaneous network exploration
NASA Astrophysics Data System (ADS)
Wilson, Daniel B.; Baker, Ruth E.; Woodhouse, Francis G.
2018-06-01
A random search process in a networked environment is governed by the time it takes to visit every node, termed the cover time. Often, a networked process does not proceed in isolation but competes with many instances of itself within the same environment. A key unanswered question is how to optimize this process: How many concurrent searchers can a topology support before the benefits of parallelism are outweighed by competition for space? Here, we introduce the searcher-averaged parallel cover time (APCT) to quantify these economies of scale. We show that the APCT of the networked symmetric exclusion process is optimized at a searcher density that is well predicted by the spectral gap. Furthermore, we find that nonequilibrium processes, realized through the addition of bias, can support significantly increased density optima. Our results suggest alternative hybrid strategies of serial and parallel search for efficient information gathering in social interaction and biological transport networks.
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
Publishing Webs of Information at Brown University.
ERIC Educational Resources Information Center
Kahn, Paul
1990-01-01
Describes the Intermedia software, an integrated environment that supports the creation, display, and linking of text and graphics on a network of workstations. Making links, navigation and orientation, and presenting information using the program are addressed. Two publications created with Intermedia and techniques employed for these…
Connectivism: 21st Century's New Learning Theory
ERIC Educational Resources Information Center
Kropf, Dorothy C.
2013-01-01
Transformed into a large collaborative learning environment, the Internet is comprised of information reservoirs namely, (a) online classrooms, (b) social networks, and (c) virtual reality or simulated communities, to expeditiously create, reproduce, share, and deliver information into the hands of educators and students. Most importantly, the…
Prediction based Greedy Perimeter Stateless Routing Protocol for Vehicular Self-organizing Network
NASA Astrophysics Data System (ADS)
Wang, Chunlin; Fan, Quanrun; Chen, Xiaolin; Xu, Wanjin
2018-03-01
PGPSR (Prediction based Greedy Perimeter Stateless Routing) is based on and extended the GPSR protocol to adapt to the high speed mobility of the vehicle auto organization network (VANET) and the changes in the network topology. GPSR is used in the VANET network environment, the network loss rate and throughput are not ideal, even cannot work. Aiming at the problems of the GPSR, the proposed PGPSR routing protocol, it redefines the hello and query packet structure, in the structure of the new node speed and direction information, which received the next update before you can take advantage of its speed and direction to predict the position of node and new network topology, select the right the next hop routing and path. Secondly, the update of the outdated node information of the neighbor’s table is deleted in time. The simulation experiment shows the performance of PGPSR is better than that of GPSR.
Information infrastructure for emergency medical services.
Orthner, Helmuth; Mishra, Ninad; Terndrup, Thomas; Acker, Joseph; Grimes, Gary; Gemmill, Jill; Battles, Marcie
2005-01-01
The pre-hospital emergency medical and public safety information environment is nearing a threshold of significant change. The change is driven in part by several emerging technologies such as secure, high-speed wireless communication in the local and wide area networks (wLAN, 3G), Geographic Information Systems (GIS), Global Positioning Systems (GPS), and powerful handheld computing and communication services, that are of sufficient utility to be more widely adopted. We propose a conceptual model to enable improved clinical decision making in the pre-hospital environment using these change agents.
Ball, Lianne C.
2016-07-14
Mangrove ecosystems protect vulnerable coastlines from storm effects, recycle nutrients, stabilize shorelines, improve water quality, and provide habitat for commercial and recreational fish species as well as for threatened and endangered wildlife. U.S. Geological Survey scientists conduct research on mangrove ecosystems to provide reliable scientific information about their ecology, productivity, hydrological processes, carbon storage stress response, and restoration success. The Mangrove Science Network is a collaboration of USGS scientists focused on working with natural resource managers to develop and conduct research to inform decisions on mangrove management and restoration. Information about the Mangrove Science Network can be found at: http://www.usgs.gov/ecosystems/environments/mangroves.html.
Maximally informative pairwise interactions in networks
Fitzgerald, Jeffrey D.; Sharpee, Tatyana O.
2010-01-01
Several types of biological networks have recently been shown to be accurately described by a maximum entropy model with pairwise interactions, also known as the Ising model. Here we present an approach for finding the optimal mappings between input signals and network states that allow the network to convey the maximal information about input signals drawn from a given distribution. This mapping also produces a set of linear equations for calculating the optimal Ising-model coupling constants, as well as geometric properties that indicate the applicability of the pairwise Ising model. We show that the optimal pairwise interactions are on average zero for Gaussian and uniformly distributed inputs, whereas they are nonzero for inputs approximating those in natural environments. These nonzero network interactions are predicted to increase in strength as the noise in the response functions of each network node increases. This approach also suggests ways for how interactions with unmeasured parts of the network can be inferred from the parameters of response functions for the measured network nodes. PMID:19905153
Fundamental trade-offs between information flow in single cells and cellular populations.
Suderman, Ryan; Bachman, John A; Smith, Adam; Sorger, Peter K; Deeds, Eric J
2017-05-30
Signal transduction networks allow eukaryotic cells to make decisions based on information about intracellular state and the environment. Biochemical noise significantly diminishes the fidelity of signaling: networks examined to date seem to transmit less than 1 bit of information. It is unclear how networks that control critical cell-fate decisions (e.g., cell division and apoptosis) can function with such low levels of information transfer. Here, we use theory, experiments, and numerical analysis to demonstrate an inherent trade-off between the information transferred in individual cells and the information available to control population-level responses. Noise in receptor-mediated apoptosis reduces information transfer to approximately 1 bit at the single-cell level but allows 3-4 bits of information to be transmitted at the population level. For processes such as eukaryotic chemotaxis, in which single cells are the functional unit, we find high levels of information transmission at a single-cell level. Thus, low levels of information transfer are unlikely to represent a physical limit. Instead, we propose that signaling networks exploit noise at the single-cell level to increase population-level information transfer, allowing extracellular ligands, whose levels are also subject to noise, to incrementally regulate phenotypic changes. This is particularly critical for discrete changes in fate (e.g., life vs. death) for which the key variable is the fraction of cells engaged. Our findings provide a framework for rationalizing the high levels of noise in metazoan signaling networks and have implications for the development of drugs that target these networks in the treatment of cancer and other diseases.
Research on Information Sharing Method for Future C2 in Network Centric Environment
2011-06-01
subscription (or search) request. Then, some of the information service nodes for future C2 deal with these users’ requests, locate, federated search the... federated search server is responsible for resolving the search requests sending out from the users, and executing the federated search . The information... federated search server, information filtering model, or information subscription matching algorithm (such as users subscribe the target information at two
The virtual library: Coming of age
NASA Technical Reports Server (NTRS)
Hunter, Judy F.; Cotter, Gladys A.
1994-01-01
With the high speed networking capabilities, multiple media options, and massive amounts of information that exist in electronic format today, the concept of a 'virtual' library or 'library without walls' is becoming viable. In virtual library environment, the information processed goes beyond the traditional definition of documents to include the results of scientific and technical research and development (reports, software, data) recorded in any format or media: electronic, audio, video, or scanned images. Network access to information must include tools to help locate information sources and navigate the networks to connect to the sources, as well as methods to extract the relevant information. Graphical User Interfaces (GUI's) that are intuitive and navigational tools such as Intelligent Gateway Processors (IGP) will provide users with seamless and transparent use of high speed networks to access, organize, and manage information. Traditional libraries will become points of electronic access to information on multiple medias. The emphasis will be towards unique collections of information at each library rather than entire collections at every library. It is no longer a question of whether there is enough information available; it is more a question of how to manage the vast volumes of information. The future equation will involve being able to organize knowledge, manage information, and provide access at the point of origin.
Roles of Course Facilitators, Learners, and Technology in the Flow of Information of a cMOOC
ERIC Educational Resources Information Center
Skrypnyk, Oleksandra; Joksimovic, Srec´ko; Kovanovic, Vitomir; Gas?evic, Dragan; Dawson, Shane
2015-01-01
Distributed Massive Open Online Courses (MOOCs) are based on the premise that online learning occurs through a network of interconnected learners. The teachers' role in distributed courses extends to forming such a network by facilitating communication that connects learners and their separate personal learning environments scattered around the…
Maximizing Information Diffusion in the Cyber-physical Integrated Network †
Lu, Hongliang; Lv, Shaohe; Jiao, Xianlong; Wang, Xiaodong; Liu, Juan
2015-01-01
Nowadays, our living environment has been embedded with smart objects, such as smart sensors, smart watches and smart phones. They make cyberspace and physical space integrated by their abundant abilities of sensing, communication and computation, forming a cyber-physical integrated network. In order to maximize information diffusion in such a network, a group of objects are selected as the forwarding points. To optimize the selection, a minimum connected dominating set (CDS) strategy is adopted. However, existing approaches focus on minimizing the size of the CDS, neglecting an important factor: the weight of links. In this paper, we propose a distributed maximizing the probability of information diffusion (DMPID) algorithm in the cyber-physical integrated network. Unlike previous approaches that only consider the size of CDS selection, DMPID also considers the information spread probability that depends on the weight of links. To weaken the effects of excessively-weighted links, we also present an optimization strategy that can properly balance the two factors. The results of extensive simulation show that DMPID can nearly double the information diffusion probability, while keeping a reasonable size of selection with low overhead in different distributed networks. PMID:26569254
Autonomous Congestion Control in Delay-Tolerant Networks
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.; Jennings, Esther H.
2005-01-01
Congestion control is an important feature that directly affects network performance. Network congestion may cause loss of data or long delays. Although this problem has been studied extensively in the Internet, the solutions for Internet congestion control do not apply readily to challenged network environments such as Delay Tolerant Networks (DTN) where end-to-end connectivity may not exist continuously and latency can be high. In DTN, end-to-end rate control is not feasible. This calls for congestion control mechanisms where the decisions can be made autonomously with local information only. We use an economic pricing model and propose a rule-based congestion control mechanism where each router can autonomously decide on whether to accept a bundle (data) based on local information such as available storage and the value and risk of accepting the bundle (derived from historical statistics).
A novel tele-medical environment appropriate for use in tele-advisory and tele-surgery cases.
Chatzipapadopoulos, F; Georgantas, N; Kotaras, A; Mamais, G; Tombros, S; Tselikis, G
1996-08-01
Tele-medical systems have been recently introduced in the field of networking as promising applications that can significantly improve the offering of medical treatment by providing services such as tele-advising, tele-surgery and remote monitoring in places where the presence of doctors or any medical specialists is difficult or time consuming. Some already existent networking models can be used for the establishment of a connection between the communicating sides. The offered network's security is also a significant factor. The present paper describes a software environment implementing a particular aspect of a tele-medical system. The developed system includes features such as direct communication between doctors and medical assistants, medical information acquisition and storing and high band information transfer in real-time. TCP/IP point-to-point protocol has been used for the implementation of the non bandwidth-critical connections. The application introduces novel features with the use of ATM connection for supporting the time-critical service of video transfer to and from the medical database.
Mobile robots exploration through cnn-based reinforcement learning.
Tai, Lei; Liu, Ming
2016-01-01
Exploration in an unknown environment is an elemental application for mobile robots. In this paper, we outlined a reinforcement learning method aiming for solving the exploration problem in a corridor environment. The learning model took the depth image from an RGB-D sensor as the only input. The feature representation of the depth image was extracted through a pre-trained convolutional-neural-networks model. Based on the recent success of deep Q-network on artificial intelligence, the robot controller achieved the exploration and obstacle avoidance abilities in several different simulated environments. It is the first time that the reinforcement learning is used to build an exploration strategy for mobile robots through raw sensor information.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jared Verba; Michael Milvich
2008-05-01
Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less
Lexical Problems in Large Distributed Information Systems.
ERIC Educational Resources Information Center
Berkovich, Simon Ya; Shneiderman, Ben
1980-01-01
Suggests a unified concept of a lexical subsystem as part of an information system to deal with lexical problems in local and network environments. The linguistic and control functions of the lexical subsystems in solving problems for large computer systems are described, and references are included. (Author/BK)
BioSYNTHESIS: access to a knowledge network of health sciences databases.
Broering, N C; Hylton, J S; Guttmann, R; Eskridge, D
1991-04-01
Users of the IAIMS Knowledge Network at the Georgetown University Medical Center have access to multiple in-house and external databases from a single point of entry through BioSYNTHESIS. The IAIMS project has developed a rich environment of biomedical information resources that represent a medical decision support system for campus physicians and students. The BioSYNTHESIS system is an information navigator that provides transparent access to a Knowledge Network of over a dozen databases. These multiple health sciences databases consist of bibliographic, informational, diagnostic, and research systems which reside on diverse computers such as DEC VAXs, SUN 490, AT&T 3B2s, Macintoshes, IBM PC/PS2s and the AT&T ISN and SYTEK network systems. Ethernet and TCP/IP protocols are used in the network architecture. BioSYNTHESIS also provides network links to the other campus libraries and to external institutions. As additional knowledge resources and technological advances have become available. BioSYNTHESIS has evolved from a two phase to a three phase program. Major components of the system including recent achievements and future plans are described.
Zhang, Kechen
2016-01-01
The problem of how the hippocampus encodes both spatial and nonspatial information at the cellular network level remains largely unresolved. Spatial memory is widely modeled through the theoretical framework of attractor networks, but standard computational models can only represent spaces that are much smaller than the natural habitat of an animal. We propose that hippocampal networks are built on a basic unit called a “megamap,” or a cognitive attractor map in which place cells are flexibly recombined to represent a large space. Its inherent flexibility gives the megamap a huge representational capacity and enables the hippocampus to simultaneously represent multiple learned memories and naturally carry nonspatial information at no additional cost. On the other hand, the megamap is dynamically stable, because the underlying network of place cells robustly encodes any location in a large environment given a weak or incomplete input signal from the upstream entorhinal cortex. Our results suggest a general computational strategy by which a hippocampal network enjoys the stability of attractor dynamics without sacrificing the flexibility needed to represent a complex, changing world. PMID:27193320
ERIC Educational Resources Information Center
O'Brien, William Ross
2010-01-01
Organizations involved in crisis relief after a natural disaster face the multifaceted challenge of significantly changing needs of their various stakeholders, limited, ambiguous and even incorrect information, and highly compressed time limitations. Yet the performance of these organization in these high velocity environments is critical for the…
Heterogeneity in Health Care Computing Environments
Sengupta, Soumitra
1989-01-01
This paper discusses issues of heterogeneity in computer systems, networks, databases, and presentation techniques, and the problems it creates in developing integrated medical information systems. The need for institutional, comprehensive goals are emphasized. Using the Columbia-Presbyterian Medical Center's computing environment as the case study, various steps to solve the heterogeneity problem are presented.
NASA Astrophysics Data System (ADS)
Dong, Yahui; Zhang, Pengwei; Li, Wei
To strengthen the informationization construction of the financial management has great significance to the achievement of business management informationization, and under the network economic environment, it is an important task of the financial management that how to conduct informationization construction of traditional financial management to provide true, reliable and complete financial information system for the business managers. This paper thoroughly researches the problem of financial information orientation management (FIOM) by taking the method of combining theory with practice. This paper puts forward the thinking method of financial information management, makes the new contents of E-finance. At last, this paper rebuilds the system of finance internal control from four aspects such as control of organization and management, system development control and safety control of network system.
UNIX based client/server hospital information system.
Nakamura, S; Sakurai, K; Uchiyama, M; Yoshii, Y; Tachibana, N
1995-01-01
SMILE (St. Luke's Medical Center Information Linkage Environment) is a HIS which is a client/server system using a UNIX workstation under an open network, LAN(FDDI&10BASE-T). It provides a multivendor environment, high performance with low cost and a user-friendly GUI. However, the client/server architecture with a UNIX workstation does not have the same OLTP environment (ex. TP monor) as the mainframe. So, our system problems and the steps used to solve them were reviewed. Several points that are necessary for a client/server system with a UNIX workstation in the future are presented.
NASA Astrophysics Data System (ADS)
Sokolova, N.; Morrison, A.; Haakonsen, T. A.
2015-04-01
Recent advancement of land-based mobile mapping enables rapid and cost-effective collection of highquality road related spatial information. Mobile Mapping Systems (MMS) can provide spatial information with subdecimeter accuracy in nominal operation environments. However, performance in challenging environments such as tunnels is not well characterized. The Norwegian Public Roads Administration (NPRA) manages the country's public road network and its infrastructure, a large segment of which is represented by road tunnels (there are about 1 000 road tunnels in Norway with a combined length of 800 km). In order to adopt mobile mapping technology for streamlining road network and infrastructure management and maintenance tasks, it is important to ensure that the technology is mature enough to meet existing requirements for object positioning accuracy in all types of environments, and provide homogeneous accuracy over the mapping perimeter. This paper presents results of a testing campaign performed within a project funded by the NPRA as a part of SMarter road traffic with Intelligent Transport Systems (ITS) (SMITS) program. The testing campaign objective was performance evaluation of high end commercial MMSs for inventory of public areas, focusing on Global Navigation Satellite System (GNSS) signal degraded environments.
E-Center: A Collaborative Platform for Wide Area Network Users
NASA Astrophysics Data System (ADS)
Grigoriev, M.; DeMar, P.; Tierney, B.; Lake, A.; Metzger, J.; Frey, M.; Calyam, P.
2012-12-01
The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.
2006-06-01
scenarios. The demonstration planned for May 2006, in Chiang Mai , Thailand, will have a first-responder, law enforcement, and counter-terrorism and counter...to local ( Chiang Mai ), theater (Bangkok), and global (Alameda, California) command and control centers. This fusion of information validates using...network performance to be tested during moderate environmental conditions. The third and fourth scenarios were conducted in Chiang Mai , Thailand
Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Khan, Muhammad Farhan; Naeem, Muhammad; Anpalagan, Alagan
2015-03-25
The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.
Prefrontal Cortex Networks Shift from External to Internal Modes during Learning.
Brincat, Scott L; Miller, Earl K
2016-09-14
As we learn about items in our environment, their neural representations become increasingly enriched with our acquired knowledge. But there is little understanding of how network dynamics and neural processing related to external information changes as it becomes laden with "internal" memories. We sampled spiking and local field potential activity simultaneously from multiple sites in the lateral prefrontal cortex (PFC) and the hippocampus (HPC)-regions critical for sensory associations-of monkeys performing an object paired-associate learning task. We found that in the PFC, evoked potentials to, and neural information about, external sensory stimulation decreased while induced beta-band (∼11-27 Hz) oscillatory power and synchrony associated with "top-down" or internal processing increased. By contrast, the HPC showed little evidence of learning-related changes in either spiking activity or network dynamics. The results suggest that during associative learning, PFC networks shift their resources from external to internal processing. As we learn about items in our environment, their representations in our brain become increasingly enriched with our acquired "top-down" knowledge. We found that in the prefrontal cortex, but not the hippocampus, processing of external sensory inputs decreased while internal network dynamics related to top-down processing increased. The results suggest that during learning, prefrontal cortex networks shift their resources from external (sensory) to internal (memory) processing. Copyright © 2016 the authors 0270-6474/16/369739-16$15.00/0.
Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Farhan Khan, Muhammad; Naeem, Muhammad; Anpalagan, Alagan
2015-01-01
The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed. PMID:25815444
Prefrontal Cortex Networks Shift from External to Internal Modes during Learning
Brincat, Scott L.
2016-01-01
As we learn about items in our environment, their neural representations become increasingly enriched with our acquired knowledge. But there is little understanding of how network dynamics and neural processing related to external information changes as it becomes laden with “internal” memories. We sampled spiking and local field potential activity simultaneously from multiple sites in the lateral prefrontal cortex (PFC) and the hippocampus (HPC)—regions critical for sensory associations—of monkeys performing an object paired-associate learning task. We found that in the PFC, evoked potentials to, and neural information about, external sensory stimulation decreased while induced beta-band (∼11–27 Hz) oscillatory power and synchrony associated with “top-down” or internal processing increased. By contrast, the HPC showed little evidence of learning-related changes in either spiking activity or network dynamics. The results suggest that during associative learning, PFC networks shift their resources from external to internal processing. SIGNIFICANCE STATEMENT As we learn about items in our environment, their representations in our brain become increasingly enriched with our acquired “top-down” knowledge. We found that in the prefrontal cortex, but not the hippocampus, processing of external sensory inputs decreased while internal network dynamics related to top-down processing increased. The results suggest that during learning, prefrontal cortex networks shift their resources from external (sensory) to internal (memory) processing. PMID:27629722
An Intelligent Pinger Network for Solid Glacier Environments
NASA Astrophysics Data System (ADS)
Schönitz, S.; Reuter, S.; Henke, C.; Jeschke, S.; Ewert, D.; Eliseev, D.; Heinen, D.; Linder, P.; Scholz, F.; Weinstock, L.; Wickmann, S.; Wiebusch, C.; Zierke, S.
2016-12-01
This talk presents a novel approach for an intelligent, agent-based pinger network in an extraterrestrial glacier environment. Because of recent findings of the Cassini spacecraft, a mission to Saturn's moon Enceladus is planned in order search for extraterrestrial life within the ocean beneath Enceladus' ice crust. Therefore, a maneuverable melting probe, the EnEx probe, was developed to melt into Enceladus' ice and take liquid samples from water-filled crevasses. Hence, the probe collecting the samples has to be able to navigate in ice which is a hard problem, because neither visual nor gravitational methods can be used. To enhance the navigability of the probe, a network of autonomous pinger units (APU) is in development that is able to extract a map of the ice environment via ultrasonic soundwaves. A network of these APUs will be deployed on the surface of Enceladus, melt into the ice and form a network to help guide the probe safely to its destination. The APU network is able to form itself fully autonomously and to compensate system failures of individual APUs. The agents controlling the single APU are realized by rule-based expert systems implemented in CLIPS. The rule-based expert system evaluates available information of the environment, decides for actions to take to achieve the desired goal (e.g. a specific network topology), and executes and monitors such actions. In general, it encodes certain situations that are evaluated whenever an APU is currently idle, and then decides for a next action to take. It bases this decision on its internal world model that is shared with the other APUs. The optimal network topology that defines each agents position is iteratively determined by mixed-integer nonlinear programming. Extensive simulations studies show that the proposed agent design enables the APUs to form a robust network topology that is suited to create a reliable 3D map of the ice environment.
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems
Liang, Junbin; Liu, Renping; Ni, Wei; Li, Yin; Li, Ran; Ma, Wenpeng; Qi, Chuanda
2018-01-01
In the post-Cloud era, the proliferation of Internet of Things (IoT) has pushed the horizon of Edge computing, which is a new computing paradigm with data processed at the edge of the network. As the important systems of Edge computing, wireless sensor and actuator networks (WSANs) play an important role in collecting and processing the sensing data from the surrounding environment as well as taking actions on the events happening in the environment. In WSANs, in-network data storage and information discovery schemes with high energy efficiency, high load balance and low latency are needed because of the limited resources of the sensor nodes and the real-time requirement of some specific applications, such as putting out a big fire in a forest. In this article, the existing schemes of WSANs on data storage and information discovery are surveyed with detailed analysis on their advancements and shortcomings, and possible solutions are proposed on how to achieve high efficiency, good load balance, and perfect real-time performances at the same time, hoping that it can provide a good reference for the future research of the WSANs-based Edge computing systems. PMID:29439442
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems.
Ma, Xingpo; Liang, Junbin; Liu, Renping; Ni, Wei; Li, Yin; Li, Ran; Ma, Wenpeng; Qi, Chuanda
2018-02-10
In the post-Cloud era, the proliferation of Internet of Things (IoT) has pushed the horizon of Edge computing, which is a new computing paradigm with data are processed at the edge of the network. As the important systems of Edge computing, wireless sensor and actuator networks (WSANs) play an important role in collecting and processing the sensing data from the surrounding environment as well as taking actions on the events happening in the environment. In WSANs, in-network data storage and information discovery schemes with high energy efficiency, high load balance and low latency are needed because of the limited resources of the sensor nodes and the real-time requirement of some specific applications, such as putting out a big fire in a forest. In this article, the existing schemes of WSANs on data storage and information discovery are surveyed with detailed analysis on their advancements and shortcomings, and possible solutions are proposed on how to achieve high efficiency, good load balance, and perfect real-time performances at the same time, hoping that it can provide a good reference for the future research of the WSANs-based Edge computing systems.
The Five Central Psychological Challenges Facing Effective Mobile Learning
ERIC Educational Resources Information Center
Terras, Melody M.; Ramsay, Judith
2012-01-01
Web 2.0 technology not only offers the opportunity of massively parallel interconnected networks that support the provision of information and communication anytime and anywhere but also offers immense opportunities for collaboration and sharing of user-generated content. This information-rich environment may support both formal and informal…
Fiber optic voice/data network
NASA Technical Reports Server (NTRS)
Bergman, Larry A. (Inventor)
1989-01-01
An asynchronous, high-speed, fiber optic local area network originally developed for tactical environments with additional benefits for other environments such as spacecraft, and the like. The network supports ordinary data packet traffic simultaneously with synchronous T1 voice traffic over a common token ring channel; however, the techniques and apparatus of this invention can be applied to any deterministic class of packet data networks, including multitier backbones, that must transport stream data (e.g., video, SAR, sensors) as well as data. A voice interface module parses, buffers, and resynchronizes the voice data to the packet network employing elastic buffers on both the sending and receiving ends. Voice call setup and switching functions are performed external to the network with ordinary PABX equipment. Clock information is passed across network boundaries in a token passing ring by preceeding the token with an idle period of non-transmission which allows the token to be used to re-establish a clock synchronized to the data. Provision is made to monitor and compensate the elastic receiving buffers so as to prevent them from overflowing or going empty.
Developing algorithm for the critical care physician scheduling
NASA Astrophysics Data System (ADS)
Lee, Hyojun; Pah, Adam; Amaral, Luis; Northwestern Memorial Hospital Collaboration
Understanding the social network has enabled us to quantitatively study social phenomena such as behaviors in adoption and propagation of information. However, most work has been focusing on networks of large heterogeneous communities, and little attention has been paid to how work-relevant information spreads within networks of small and homogeneous groups of highly trained individuals, such as physicians. Within the professionals, the behavior patterns and the transmission of information relevant to the job are dependent not only on the social network between the employees but also on the schedules and teams that work together. In order to systematically investigate the dependence of the spread of ideas and adoption of innovations on a work-environment network, we sought to construct a model for the interaction network of critical care physicians at Northwestern Memorial Hospital (NMH) based on their work schedules. We inferred patterns and hidden rules from past work schedules such as turnover rates. Using the characteristics of the work schedules of the physicians and their turnover rates, we were able to create multi-year synthetic work schedules for a generic intensive care unit. The algorithm for creating shift schedules can be applied to other schedule dependent networks ARO1.
Moran, W. P.; Messick, C.; Guerette, P.; Anderson, R.; Bradham, D.; Wofford, J. L.; Velez, R.
1994-01-01
Primary care physicians provide longitudinal care for chronically ill individuals in concert with many other community-based disciplines. The care management of these individuals requires data not traditionally collected during the care of well, or acutely ill individuals. These data not only concern the patient, in the form of patient functional status, mental status and affect, but also pertain to the caregiver, home environment, and the formal community health and social service system. The goal of the Community Care Coordination Network is to build a primary care-based information system to share patient data and communicate patient related information among the community-based multi-disciplinary teams. One objective of the Community Care Coordination Network is to create a Community Care Database for chronically ill individuals by identifying those data elements necessary for efficient multi-disciplinary care. PMID:7949995
Biology-Inspired Distributed Consensus in Massively-Deployed Sensor Networks
NASA Technical Reports Server (NTRS)
Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin, Chunsheng
2005-01-01
Promises of ubiquitous control of the physical environment by large-scale wireless sensor networks open avenues for new applications that are expected to redefine the way we live and work. Most of recent research has concentrated on developing techniques for performing relatively simple tasks in small-scale sensor networks assuming some form of centralized control. The main contribution of this work is to propose a new way of looking at large-scale sensor networks, motivated by lessons learned from the way biological ecosystems are organized. Indeed, we believe that techniques used in small-scale sensor networks are not likely to scale to large networks; that such large-scale networks must be viewed as an ecosystem in which the sensors/effectors are organisms whose autonomous actions, based on local information, combine in a communal way to produce global results. As an example of a useful function, we demonstrate that fully distributed consensus can be attained in a scalable fashion in massively deployed sensor networks where individual motes operate based on local information, making local decisions that are aggregated across the network to achieve globally-meaningful effects.
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
Gállego-Diéguez, Javier; Aliaga Traín, Pilar; Benedé Azagra, Carmen Belén; Bueno Franco, Manuel; Ferrer Gracia, Elisa; Ipiéns Sarrate, José Ramón; Muñoz Nadal, Pilar; Plumed Parrilla, Manuela; Vilches Urrutia, Begoña
2016-11-01
Networks of community health experiences promote interaction and knowledge management in health promotion among their participants. These networks integrate both professionals and social agents who work directly on the ground in small environments, with defined objectives and inclusion criteria and voluntary participation. In this article, networks in Aragon (Spain) are reviewed in order to analyse their role as an information system. The Health Promotion Projects Network of Aragon (Red Aragonesa de Proyectos de Promoción de la Salud, RAPPS) was launched in 1996 and currently includes 73 projects. The average duration of projects is 12.7 years. RAPPS interdisciplinary teams involve 701 people, of which 89.6% are professionals and 10.6% are social agents. The Aragon Health Promoting Schools Network (Red Aragonesa de Escuelas Promotoras de Salud, RAEPS) integrates 134 schools (24.9% of Aragon). The schools teams involve 829 teachers and members of the school community, students (35.2%), families (26.2%) and primary care health professionals (9.8%). Experiences Networks boost citizen participation, have an influence in changing social determinants and contribute to the formulation of plans and regional strategies. Networks can provide indicators for a health promotion information and monitoring system on: capacity building services in the territory, identifying assets and models of good practice, cross-sectoral and equity initiatives. Experiences Networks represent an opportunity to create a health promotion information system, systematising available information and establishing quality criteria for initiatives. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.
ERIC Educational Resources Information Center
Razak, Norizan Abdul; Saeed, Murad; Ahmad, Zulkifli
2013-01-01
As most traditional classroom environments in English as Foreign Language (EFL) still restrict learners' collaboration and interaction in college writing classes, today, the majority of EFL learners are accessing Social Networking Sites (SNSs) as online communities of practice (CoPs) for adopting informal collaborative learning as a way of…
1986-04-01
a Local Area Network Environment. Submitted for Publication. 1982. [Barrnger 791 Barringer . H,. P. C. Capon, and R . Phillips. The Portable Compiling...configuration and hardware. [Chesley 81 Chesley, Harry R . and Bruce V. Hunt., % Squire - A Communications-Oriented Operating System. Computer Networks 5(2...copying the information. Transfers between machines and copying " - r pages as necemry. [Nelson 80] Nelson, Bruce Jay. Remote Procedure Call. PhD Thesis
Barrington, Randy
2014-01-01
Community Care of North Carolina's 14 networks use data analysis to provide relevant solutions that are responsive to unique regional environments. This article describes some of the ways that these networks use data to improve patient self-management, to meet providers' needs, to improve quality of care, and to control costs.
Invocation oriented architecture for agile code and agile data
NASA Astrophysics Data System (ADS)
Verma, Dinesh; Chan, Kevin; Leung, Kin; Gkelias, Athanasios
2017-05-01
In order to address the unique requirements of sensor information fusion in a tactical coalition environment, we are proposing a new architecture - one based on the concept of invocations. An invocation is a combination of a software code and a piece of data, both managed using techniques from Information Centric networking. This paper will discuss limitations of current approaches, present the architecture for an invocation oriented architecture, illustrate how it works with an example scenario, and provide reasons for its suitability in a coalition environment.
Multi-objects recognition for distributed intelligent sensor networks
NASA Astrophysics Data System (ADS)
He, Haibo; Chen, Sheng; Cao, Yuan; Desai, Sachi; Hohil, Myron E.
2008-04-01
This paper proposes an innovative approach for multi-objects recognition for homeland security and defense based intelligent sensor networks. Unlike the conventional way of information analysis, data mining in such networks is typically characterized with high information ambiguity/uncertainty, data redundancy, high dimensionality and real-time constrains. Furthermore, since a typical military based network normally includes multiple mobile sensor platforms, ground forces, fortified tanks, combat flights, and other resources, it is critical to develop intelligent data mining approaches to fuse different information resources to understand dynamic environments, to support decision making processes, and finally to achieve the goals. This paper aims to address these issues with a focus on multi-objects recognition. Instead of classifying a single object as in the traditional image classification problems, the proposed method can automatically learn multiple objectives simultaneously. Image segmentation techniques are used to identify the interesting regions in the field, which correspond to multiple objects such as soldiers or tanks. Since different objects will come with different feature sizes, we propose a feature scaling method to represent each object in the same number of dimensions. This is achieved by linear/nonlinear scaling and sampling techniques. Finally, support vector machine (SVM) based learning algorithms are developed to learn and build the associations for different objects, and such knowledge will be adaptively accumulated for objects recognition in the testing stage. We test the effectiveness of proposed method in different simulated military environments.
NASA Astrophysics Data System (ADS)
Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.
2016-03-01
The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.
Design of the smart home system based on the optimal routing algorithm and ZigBee network.
Jiang, Dengying; Yu, Ling; Wang, Fei; Xie, Xiaoxia; Yu, Yongsheng
2017-01-01
To improve the traditional smart home system, its electric wiring, networking technology, information transmission and facility control are studied. In this paper, we study the electric wiring, networking technology, information transmission and facility control to improve the traditional smart home system. First, ZigBee is used to replace the traditional electric wiring. Second, a network is built to connect lots of wireless sensors and facilities, thanks to the capability of ZigBee self-organized network and Genetic Algorithm-Particle Swarm Optimization Algorithm (GA-PSOA) to search for the optimal route. Finally, when the smart home system is connected to the internet based on the remote server technology, home environment and facilities could be remote real-time controlled. The experiments show that the GA-PSOA reduce the system delay and decrease the energy consumption of the wireless system.
Autonomous Congestion Control in Delay-Tolerant Networks
NASA Technical Reports Server (NTRS)
Burleigh, Scott; Jennings, Esther; Schoolcraft, Joshua
2006-01-01
Congestion control is an important feature that directly affects network performance. Network congestion may cause loss of data or long delays. Although this problem has been studied extensively in the Internet, the solutions for Internet congestion control do not apply readily to challenged network environments such as Delay Tolerant Networks (DTN) where end-to-end connectivity may not exist continuously and latency can be high. In DTN, end-to-end rate control is not feasible. This calls for congestion control mechanisms where the decisions can be made autonomously with local information only. We use an economic pricing model and propose a rule-based congestion control mechanism where each router can autonomously decide on whether to accept a bundle (data) based on local information such as available storage and the value and risk of accepting the bundle (derived from historical statistics). Preliminary experimental results show that this congestion control mechanism can protect routers from resource depletion without loss of data.
Design of the smart home system based on the optimal routing algorithm and ZigBee network
Xie, Xiaoxia
2017-01-01
To improve the traditional smart home system, its electric wiring, networking technology, information transmission and facility control are studied. In this paper, we study the electric wiring, networking technology, information transmission and facility control to improve the traditional smart home system. First, ZigBee is used to replace the traditional electric wiring. Second, a network is built to connect lots of wireless sensors and facilities, thanks to the capability of ZigBee self-organized network and Genetic Algorithm-Particle Swarm Optimization Algorithm (GA-PSOA) to search for the optimal route. Finally, when the smart home system is connected to the internet based on the remote server technology, home environment and facilities could be remote real-time controlled. The experiments show that the GA-PSOA reduce the system delay and decrease the energy consumption of the wireless system. PMID:29131868
A European Languages Virtual Network Proposal
NASA Astrophysics Data System (ADS)
García-Peñalvo, Francisco José; González-González, Juan Carlos; Murray, Maria
ELVIN (European Languages Virtual Network) is a European Union (EU) Lifelong Learning Programme Project aimed at creating an informal social network to support and facilitate language learning. The ELVIN project aims to research and develop the connection between social networks, professional profiles and language learning in an informal educational context. At the core of the ELVIN project, there will be a web 2.0 social networking platform that connects employees/students for language practice based on their own professional/academic needs and abilities, using all relevant technologies. The ELVIN remit involves the examination of both methodological and technological issues inherent in achieving a social-based learning platform that provides the user with their own customized Personal Learning Environment for EU language acquisition. ELVIN started in November 2009 and this paper presents the project aims and objectives as well as the development and implementation of the web platform.
SWARMs Ontology: A Common Information Model for the Cooperation of Underwater Robots
Li, Xin; Bilbao, Sonia; Martín-Wanton, Tamara; Bastos, Joaquim; Rodriguez, Jonathan
2017-01-01
In order to facilitate cooperation between underwater robots, it is a must for robots to exchange information with unambiguous meaning. However, heterogeneity, existing in information pertaining to different robots, is a major obstruction. Therefore, this paper presents a networked ontology, named the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) ontology, to address information heterogeneity and enable robots to have the same understanding of exchanged information. The SWARMs ontology uses a core ontology to interrelate a set of domain-specific ontologies, including the mission and planning, the robotic vehicle, the communication and networking, and the environment recognition and sensing ontology. In addition, the SWARMs ontology utilizes ontology constructs defined in the PR-OWL ontology to annotate context uncertainty based on the Multi-Entity Bayesian Network (MEBN) theory. Thus, the SWARMs ontology can provide both a formal specification for information that is necessarily exchanged between robots and a command and control entity, and also support for uncertainty reasoning. A scenario on chemical pollution monitoring is described and used to showcase how the SWARMs ontology can be instantiated, be extended, represent context uncertainty, and support uncertainty reasoning. PMID:28287468
A general framework for a collaborative water quality knowledge and information network.
Dalcanale, Fernanda; Fontane, Darrell; Csapo, Jorge
2011-03-01
Increasing knowledge about the environment has brought about a better understanding of the complexity of the issues, and more information publicly available has resulted into a steady shift from centralized decision making to increasing levels of participatory processes. The management of that information, in turn, is becoming more complex. One of the ways to deal with the complexity is the development of tools that would allow all players, including managers, researchers, educators, stakeholders and the civil society, to be able to contribute to the information system, in any level they are inclined to do so. In this project, a search for the available technology for collaboration, methods of community filtering, and community-based review was performed and the possible implementation of these tools to create a general framework for a collaborative "Water Quality Knowledge and Information Network" was evaluated. The main goals of the network are to advance water quality education and knowledge; encourage distribution and access to data; provide networking opportunities; allow public perceptions and concerns to be collected; promote exchange of ideas; and, give general, open, and free access to information. A reference implementation was made available online and received positive feedback from the community, which also suggested some possible improvements.
A General Framework for a Collaborative Water Quality Knowledge and Information Network
NASA Astrophysics Data System (ADS)
Dalcanale, Fernanda; Fontane, Darrell; Csapo, Jorge
2011-03-01
Increasing knowledge about the environment has brought about a better understanding of the complexity of the issues, and more information publicly available has resulted into a steady shift from centralized decision making to increasing levels of participatory processes. The management of that information, in turn, is becoming more complex. One of the ways to deal with the complexity is the development of tools that would allow all players, including managers, researchers, educators, stakeholders and the civil society, to be able to contribute to the information system, in any level they are inclined to do so. In this project, a search for the available technology for collaboration, methods of community filtering, and community-based review was performed and the possible implementation of these tools to create a general framework for a collaborative "Water Quality Knowledge and Information Network" was evaluated. The main goals of the network are to advance water quality education and knowledge; encourage distribution and access to data; provide networking opportunities; allow public perceptions and concerns to be collected; promote exchange of ideas; and, give general, open, and free access to information. A reference implementation was made available online and received positive feedback from the community, which also suggested some possible improvements.
Describing the social environment of elderly persons at the time of death.
Werner, Perla; Miron, Ehud; Beeri, Michal Schnaider; Davidson, Michael; Noy, Shlomo
2005-04-01
To describe the social environment of elderly persons at the time of their death and its correlates. Telephone interviews with the next-of-kin of deceased elderly persons. Potential participants were the next-of-kin of all Jewish elderly individuals who died during the course of one year in a major city in the northern part of Israel. The final sample included 139 participants (58% response rate; 70% cooperation rate). Information was collected regarding the decedents' social environment three days before their death and at the time of death. Eight types of informal sources of support and four sources of formal support were examined. The correlates examined included the decedents' demographic, health, social, and death characteristics. The majority of the decedents died while surrounded by at least one family member. Having a larger social network was associated with a larger number of persons present at the time of death. Being informed about the impending death was associated with a larger number of persons from the formal and informal networks present at the time of death. The common fear of dying alone and isolated was not confirmed by this study. Increased efforts should be invested in helping professionals to deal with the difficulties inherent to the process of diagnosing an upcoming death.
Learning and Digital Environment of Dance--The Case of Greek Traditional Dance in Youtube
ERIC Educational Resources Information Center
Gratsiouni, Dimitra; Koutsouba, Maria; Venetsanou, Foteini; Tyrovola, Vasiliki
2016-01-01
The incorporation of Information and Communication Technologies (ICT) in education has changed the educational procedures through the creation and use of new teaching and learning environments with the use of computers and network applications that afford new dimensions to distance education. In turn, these emerging and in progress technologies,…
ERIC Educational Resources Information Center
Chen, Chih-Ming; Chang, Chia-Cheng
2014-01-01
Many studies have identified web-based cooperative learning as an increasingly popular educational paradigm with potential to increase learner satisfaction and interactions. However, peer-to-peer interaction often suffers barriers owing to a failure to explore useful social interaction information in web-based cooperative learning environments.…
Dynamic Business Networks: A Headache for Sustainable Systems Interoperability
NASA Astrophysics Data System (ADS)
Agostinho, Carlos; Jardim-Goncalves, Ricardo
Collaborative networked environments emerged with the spread of the internet, contributing to overcome past communication barriers, and identifying interoperability as an essential property. When achieved seamlessly, efficiency is increased in the entire product life cycle. Nowadays, most organizations try to attain interoperability by establishing peer-to-peer mappings with the different partners, or in optimized networks, by using international standard models as the core for information exchange. In current industrial practice, mappings are only defined once, and the morphisms that represent them, are hardcoded in the enterprise systems. This solution has been effective for static environments, where enterprise and product models are valid for decades. However, with an increasingly complex and dynamic global market, models change frequently to answer new customer requirements. This paper draws concepts from the complex systems science and proposes a framework for sustainable systems interoperability in dynamic networks, enabling different organizations to evolve at their own rate.
PREMER: a Tool to Infer Biological Networks.
Villaverde, Alejandro F; Becker, Kolja; Banga, Julio R
2017-10-04
Inferring the structure of unknown cellular networks is a main challenge in computational biology. Data-driven approaches based on information theory can determine the existence of interactions among network nodes automatically. However, the elucidation of certain features - such as distinguishing between direct and indirect interactions or determining the direction of a causal link - requires estimating information-theoretic quantities in a multidimensional space. This can be a computationally demanding task, which acts as a bottleneck for the application of elaborate algorithms to large-scale network inference problems. The computational cost of such calculations can be alleviated by the use of compiled programs and parallelization. To this end we have developed PREMER (Parallel Reverse Engineering with Mutual information & Entropy Reduction), a software toolbox that can run in parallel and sequential environments. It uses information theoretic criteria to recover network topology and determine the strength and causality of interactions, and allows incorporating prior knowledge, imputing missing data, and correcting outliers. PREMER is a free, open source software tool that does not require any commercial software. Its core algorithms are programmed in FORTRAN 90 and implement OpenMP directives. It has user interfaces in Python and MATLAB/Octave, and runs on Windows, Linux and OSX (https://sites.google.com/site/premertoolbox/).
Virtual shelves in a digital library: a framework for access to networked information sources.
Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E
1995-01-01
Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources.
NASA Astrophysics Data System (ADS)
Park, Soomyung; Joo, Seong-Soon; Yae, Byung-Ho; Lee, Jong-Hyun
2002-07-01
In this paper, we present the Optical Cross-Connect (OXC) Management Control System Architecture, which has the scalability and robust maintenance and provides the distributed managing environment in the optical transport network. The OXC system we are developing, which is divided into the hardware and the internal and external software for the OXC system, is made up the OXC subsystem with the Optical Transport Network (OTN) sub layers-hardware and the optical switch control system, the signaling control protocol subsystem performing the User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) signaling control, the Operation Administration Maintenance & Provisioning (OAM&P) subsystem, and the network management subsystem. And the OXC management control system has the features that can support the flexible expansion of the optical transport network, provide the connectivity to heterogeneous external network elements, be added or deleted without interrupting OAM&P services, be remotely operated, provide the global view and detail information for network planner and operator, and have Common Object Request Broker Architecture (CORBA) based the open system architecture adding and deleting the intelligent service networking functions easily in future. To meet these considerations, we adopt the object oriented development method in the whole developing steps of the system analysis, design, and implementation to build the OXC management control system with the scalability, the maintenance, and the distributed managing environment. As a consequently, the componentification for the OXC operation management functions of each subsystem makes the robust maintenance, and increases code reusability. Also, the component based OXC management control system architecture will have the flexibility and scalability in nature.
Inter-American Biodiversity Information Network (IABIN)
Disarmament Drugs E e-Government Education Elections Environment Equity G General Assembly Governance H Human Management Public Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and
Application of artificial neural networks to composite ply micromechanics
NASA Technical Reports Server (NTRS)
Brown, D. A.; Murthy, P. L. N.; Berke, L.
1991-01-01
Artificial neural networks can provide improved computational efficiency relative to existing methods when an algorithmic description of functional relationships is either totally unavailable or is complex in nature. For complex calculations, significant reductions in elapsed computation time are possible. The primary goal is to demonstrate the applicability of artificial neural networks to composite material characterization. As a test case, a neural network was trained to accurately predict composite hygral, thermal, and mechanical properties when provided with basic information concerning the environment, constituent materials, and component ratios used in the creation of the composite. A brief introduction on neural networks is provided along with a description of the project itself.
Biomimetic Models for An Ecological Approach to Massively-Deployed Sensor Networks
NASA Technical Reports Server (NTRS)
Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin, Chunsheng
2005-01-01
Promises of ubiquitous control of the physical environment by massively-deployed wireless sensor networks open avenues for new applications that will redefine the way we live and work. Due to small size and low cost of sensor devices, visionaries promise systems enabled by deployment of massive numbers of sensors ubiquitous throughout our environment working in concert. Recent research has concentrated on developing techniques for performing relatively simple tasks with minimal energy expense, assuming some form of centralized control. Unfortunately, centralized control is not conducive to parallel activities and does not scale to massive size networks. Execution of simple tasks in sparse networks will not lead to the sophisticated applications predicted. We propose a new way of looking at massively-deployed sensor networks, motivated by lessons learned from the way biological ecosystems are organized. We demonstrate that in such a model, fully distributed data aggregation can be performed in a scalable fashion in massively deployed sensor networks, where motes operate on local information, making local decisions that are aggregated across the network to achieve globally-meaningful effects. We show that such architectures may be used to facilitate communication and synchronization in a fault-tolerant manner, while balancing workload and required energy expenditure throughout the network.
ERIC Educational Resources Information Center
Etim, Alice Sunday
2010-01-01
The global environment is a complex network of people who are grouped using different types of information. In each country, people are grouped based on such information as age, race, ethnicity, educational qualification, income, occupation, and net worth. These socioeconomic descriptions of people have relevance in our current Information Age.…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brandt, James M.; Devine, Karen Dragon; Gentile, Ann C.
2014-09-01
As computer systems grow in both size and complexity, the need for applications and run-time systems to adjust to their dynamic environment also grows. The goal of the RAAMP LDRD was to combine static architecture information and real-time system state with algorithms to conserve power, reduce communication costs, and avoid network contention. We devel- oped new data collection and aggregation tools to extract static hardware information (e.g., node/core hierarchy, network routing) as well as real-time performance data (e.g., CPU uti- lization, power consumption, memory bandwidth saturation, percentage of used bandwidth, number of network stalls). We created application interfaces that allowedmore » this data to be used easily by algorithms. Finally, we demonstrated the benefit of integrating system and application information for two use cases. The first used real-time power consumption and memory bandwidth saturation data to throttle concurrency to save power without increasing application execution time. The second used static or real-time network traffic information to reduce or avoid network congestion by remapping MPI tasks to allocated processors. Results from our work are summarized in this report; more details are available in our publications [2, 6, 14, 16, 22, 29, 38, 44, 51, 54].« less
A Hybrid 3D Indoor Space Model
NASA Astrophysics Data System (ADS)
Jamali, Ali; Rahman, Alias Abdul; Boguslawski, Pawel
2016-10-01
GIS integrates spatial information and spatial analysis. An important example of such integration is for emergency response which requires route planning inside and outside of a building. Route planning requires detailed information related to indoor and outdoor environment. Indoor navigation network models including Geometric Network Model (GNM), Navigable Space Model, sub-division model and regular-grid model lack indoor data sources and abstraction methods. In this paper, a hybrid indoor space model is proposed. In the proposed method, 3D modeling of indoor navigation network is based on surveying control points and it is less dependent on the 3D geometrical building model. This research proposes a method of indoor space modeling for the buildings which do not have proper 2D/3D geometrical models or they lack semantic or topological information. The proposed hybrid model consists of topological, geometrical and semantical space.
Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim
2015-01-01
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations. PMID:25648712
Tajeddine, Ayman; Kayssi, Ayman; Chehab, Ali; Elhajj, Imad; Itani, Wassim
2015-02-02
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of "bad" nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics-maliciousness, cooperation, and compatibility-and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates "bad", "misbehaving" or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated "bad" behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to "good" nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.
Multimedia information processing in the SWAN mobile networked computing system
NASA Astrophysics Data System (ADS)
Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John
1996-03-01
Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.
Road safety alerting system with radar and GPS cooperation in a VANET environment
NASA Astrophysics Data System (ADS)
Santamaria, Amilcare Francesco; Sottile, Cesare; De Rango, Floriano; Voznak, Miroslav
2014-05-01
New applications in wireless environments are increasing and keeping even more interests from the developer companies and researchers. In particular, in these last few years the government and institutional organization for road safety spent a lot of resources and money to promote Vehicular Ad-Hoc Network (VANET) technology, also car manufactures are giving a lot of contributions on this field as well. In our paper, we propose an innovative system to increase road safety, matching the requests of the market allowing a cooperation between on-board devices. The vehicles are equipped with On Board Unit (OBU) and On Board Radar Unit (OBRU), which can spread alerting messages around the network regarding warning and dangerous situations exploiting IEEE802.llp standard. Vehicles move along roads observing the environment, traffic and road conditions, and vehicles parameters as well. These information can be elaborated and shared between neighbors, Road Side Unit (RSU)s and, of course, with Internet, allowing inter-system communications exploiting an Road Traffic Manager (RTM). Radar systems task it the detection of the environment in order to increase the knowledge of current conditions of the roads, for example it is important to identify obstacles, road accidents, dangerous situations and so on. Once detected exploiting onboard devices, such as Global Position System (GPS) receiver it is possible to know the exact location of the caught event and after a data elaboration the information is spread along the network. Once the drivers are advised, they can make some precautionary actions such as reduction of traveling speed or modification of current road path. In this work the routing algorithms, which have the main goal to rapidly disseminate information, are also been investigated.
NASA Astrophysics Data System (ADS)
Timonen, Jussi; Vankka, Jouko
2013-05-01
This paper presents a solution for information integration and sharing architecture, which is able to receive data simultaneously from multiple different sensor networks. Creating a Common Operational Picture (COP) object along with the base map of the building plays a key role in the research. The object is combined with desired map sources and then shared to the mobile devices worn by soldiers in the field. The sensor networks we used focus on location techniques indoors, and a simple set of symbols is created to present the information, as an addition to NATO APP6B symbols. A core element in this research is the MUSAS (Mobile Urban Situational Awareness System), a demonstration environment that implements central functionalities. Information integration of the system is handled by the Internet Connection Engine (Ice) middleware, as well as the server, which hosts COP information and maps. The entire system is closed, such that it does not need any external service, and the information transfer with the mobile devices is organized by a tactical 5 GHz WLAN solution. The demonstration environment is implemented using only commercial off-theshelf (COTS) products. We have presented a field experiment event in which the system was able to integrate and share real time information of a blue force tracking system, received signal strength indicator (RSSI) based intrusion detection system, and a robot using simultaneous location and mapping technology (SLAM), where all the inputs were based on real activities. The event was held in a training area on urban area warfare.
Information Retrieval and Graph Analysis Approaches for Book Recommendation.
Benkoussas, Chahinez; Bellot, Patrice
2015-01-01
A combination of multiple information retrieval approaches is proposed for the purpose of book recommendation. In this paper, book recommendation is based on complex user's query. We used different theoretical retrieval models: probabilistic as InL2 (Divergence from Randomness model) and language model and tested their interpolated combination. Graph analysis algorithms such as PageRank have been successful in Web environments. We consider the application of this algorithm in a new retrieval approach to related document network comprised of social links. We called Directed Graph of Documents (DGD) a network constructed with documents and social information provided from each one of them. Specifically, this work tackles the problem of book recommendation in the context of INEX (Initiative for the Evaluation of XML retrieval) Social Book Search track. A series of reranking experiments demonstrate that combining retrieval models yields significant improvements in terms of standard ranked retrieval metrics. These results extend the applicability of link analysis algorithms to different environments.
The future of bibliographic standards in a networked information environment
NASA Technical Reports Server (NTRS)
1997-01-01
The main mission of the CENDI Cataloging Working Group is to provide guidelines for cataloging practices that support the sharing of database records among the CENDI agencies, and that incorporate principles based on cost effectiveness and efficiency. Recent efforts include the extension of COSATI Guidelines for the Cataloging of Technical Reports to include non-print materials, and the mapping of each agency's export file structure to USMARC. Of primary importance is the impact of electronic documents and the distributed nature of the networked information environment. Topics discussed during the workshop include the following: Trade-offs in Cataloging and Indexing Internet Information; The Impact on Current and Future Standards; A Look at WWW Metadata Initiatives; Standards for Electronic Journals; The Present and Future Search Engines; The Roles for Text Analysis Software; Advanced Search Engine Meets Metathesaurus; Locator Schemes for Internet Resources; Identifying and Cataloging Web Document Types; In Search of a New Bibliographic Record. The videos in this set include viewgraphs of charts and related materials of the workshop.
Information Retrieval and Graph Analysis Approaches for Book Recommendation
Benkoussas, Chahinez; Bellot, Patrice
2015-01-01
A combination of multiple information retrieval approaches is proposed for the purpose of book recommendation. In this paper, book recommendation is based on complex user's query. We used different theoretical retrieval models: probabilistic as InL2 (Divergence from Randomness model) and language model and tested their interpolated combination. Graph analysis algorithms such as PageRank have been successful in Web environments. We consider the application of this algorithm in a new retrieval approach to related document network comprised of social links. We called Directed Graph of Documents (DGD) a network constructed with documents and social information provided from each one of them. Specifically, this work tackles the problem of book recommendation in the context of INEX (Initiative for the Evaluation of XML retrieval) Social Book Search track. A series of reranking experiments demonstrate that combining retrieval models yields significant improvements in terms of standard ranked retrieval metrics. These results extend the applicability of link analysis algorithms to different environments. PMID:26504899
Al-Muhtadi, Jalal; Shahzad, Basit; Saleem, Kashif; Jameel, Wasif; Orgun, Mehmet A
2017-05-01
Social media has enabled information-sharing across massively large networks of people without spending much financial resources and time that are otherwise required in the print and electronic media. Mobile-based social media applications have overwhelmingly changed the information-sharing perspective. However, with the advent of such applications at an unprecedented scale, the privacy of the information is compromised to a larger extent if breach mitigation is not adequate. Since healthcare applications are also being developed for mobile devices so that they also benefit from the power of social media, cybersecurity privacy concerns for such sensitive applications have become critical. This article discusses the architecture of a typical mobile healthcare application, in which customized privacy levels are defined for the individuals participating in the system. It then elaborates on how the communication across a social network in a multi-cloud environment can be made more secure and private, especially for healthcare applications.
Development of a HIPAA-compliant environment for translational research data and analytics.
Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C
2014-01-01
High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.
Wijayaratna, Kasun P; Dixit, Vinayak V; Denant-Boemont, Laurent; Waller, S Travis
2017-01-01
This study investigates the empirical presence of a theoretical transportation paradox, defined as the "Online Information Paradox" (OIP). The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE) solution (no information scenario) and the other being the User Equilibrium with Recourse (UER) solution (with information scenario). An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC) were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network.
Vital signs monitoring plan for the Klamath Network: Phase I report
Sarr, Daniel; Odion, Dennis; Truitt, Robert E.; Beever, Erik A.; Shafer, Sarah; Duff, Andrew; Smith, Sean B.; Bunn, Windy; Rocchio, Judy; Sarnat, Eli; Alexander, John; Jessup, Steve
2004-01-01
This report chronicles the Phase 1 stage of the vital signs monitoring program for the Klamath Network. It consists of two chapters and eleven appendixes. The purposes of Chapter One are to 1) describe the network administrative structure and approach to planning; 2) introduce the Klamath Network parks, their resources, and environmental settings; 3) explain the need for monitoring changes in resources and supporting environments; 4) identify key information gaps that limit understanding of how to best achieve these monitoring goals. The purpose of Chapter Two is to develop the descriptive information provided in Chapter One into a conceptual basis for vital signs monitoring and to present the Network’s initial suite of conceptual models. The Report Appendices provide in-depth information on a variety of topics researched in preparation of the report, including: detailed natural resource profiles for each park, supporting policies and guidelines, regional fire regimes, vegetation types of the parks, exotic species threats, interagency monitoring programs, air issues, water quality (Phase 1 Report), Network vital signs (Scoping Summary Report), rare species, and rare habitats of the parks.
Agerskov, Claus
2016-04-01
A neural network model is presented of novelty detection in the CA1 subdomain of the hippocampal formation from the perspective of information flow. This computational model is restricted on several levels by both anatomical information about hippocampal circuitry and behavioral data from studies done in rats. Several studies report that the CA1 area broadcasts a generalized novelty signal in response to changes in the environment. Using the neural engineering framework developed by Eliasmith et al., a spiking neural network architecture is created that is able to compare high-dimensional vectors, symbolizing semantic information, according to the semantic pointer hypothesis. This model then computes the similarity between the vectors, as both direct inputs and a recalled memory from a long-term memory network by performing the dot-product operation in a novelty neural network architecture. The developed CA1 model agrees with available neuroanatomical data, as well as the presented behavioral data, and so it is a biologically realistic model of novelty detection in the hippocampus, which can provide a feasible explanation for experimentally observed dynamics.
ERIC Educational Resources Information Center
Vellucci, Sherry L.; Hsieh-Yee, Ingrid; Moen, William E.
2007-01-01
The networked environment forced a sea change in Library and Information Science (LIS) education. Most LIS programs offer a mixed-mode of instruction that integrates online learning materials with more traditional classroom pedagogical methods and faculty are now responsible for developing content and digital learning objects. The teaching commons…
Richness vs. Reach: Using Technology To Overcome Economic Impediments to Reference Service.
ERIC Educational Resources Information Center
Holmes-Wong, Deborah
1999-01-01
Discussion of library reference services and the conflict between richness (complexity) of services and the reach (number of users that can be served) focuses on information technology that is used in electronic commerce and available on the Internet. Discusses changing roles of libraries and networked information environments. (Author/LRW)
Supporting Research: Environments, Administration and Libraries
ERIC Educational Resources Information Center
MacColl, John; Jubb, Michael
2011-01-01
Last year, OCLC Research and the UK's Research Information Network (RIN) undertook a pair of parallel studies in the US and the UK on the theme of research support services in universities (Kroll and Forsman 2010; CIBER 2010). In the US, the library and scholarly information consultancy Kroll Research Associates was commissioned, and in the UK the…
Business Value of Information Technology in Network Environments
ERIC Educational Resources Information Center
Liu, Yucong
2012-01-01
Information Technology (IT) business value research is suggested as fundamental to the contribution of the IS discipline. The IS research community has accumulated a critical mass of IT business value studies, but only limited or mixed results have been found on the direct relationship between IT and firm performance. Extant studies mostly focus…
Science and Math in the Library Media Center Using GLOBE.
ERIC Educational Resources Information Center
Aquino, Teresa L.; Levine, Elissa R.
2003-01-01
Describes the Global Learning and Observations to Benefit the Environment (GLOBE) program which helps school library media specialists and science and math teachers bring earth science, math, information literacy, information technology, and student inquiry into the classroom. Discusses use of the Internet to create a global network to study the…
Design and Implementation of Marine Information System, and Analysis of Learners' Intention toward
ERIC Educational Resources Information Center
Pan, Yu-Jen; Kao, Jui-Chung; Yu, Te-Cheng
2016-01-01
The goal of this study is to conduct further research and discussion on applying the internet on marine education, utilizing existing technologies such as cloud service, social network, data collection analysis, etc. to construct a marine environment education information system. The content to be explored includes marine education information…
Determining the Most Suitable E-Learning Delivery Mode for TUT Students
ERIC Educational Resources Information Center
Odunaike, Solomon Adeyemi; Chuene, Daniel
2011-01-01
Traditionally, in education and business environment, Information Technology has been seen as purely a support or operational tool. Advances in computing, information storage, software, and networking are all leading to new tools for teaching and learning and are also changing the paradigm for new initiative in the classroom teaching. The Internet…
Dynamic Tasking of Networked Sensors Using Covariance Information
2010-09-01
has been created under an effort called TASMAN (Tasking Autonomous Sensors in a Multiple Application Network). One of the first studies utilizing this...environment was focused on a novel resource management approach, namely covariance-based tasking. Under this scheme, the state error covariance of...resident space objects (RSO), sensor characteristics, and sensor- target geometry were used to determine the effectiveness of future observations in
Maritime Operations in Disconnected, Intermittent, and Low-Bandwidth Environments
2013-06-01
of a Dynamic Distributed Database ( DDD ) is a core element enabling the distributed operation of networks and applications, as described in this...document. The DDD is a database containing all the relevant information required to reconfigure the applications, routing, and other network services...optimize application configuration. Figure 5 gives a snapshot of entries in the DDD . In current testing, the DDD is replicated using Domino
NASA Astrophysics Data System (ADS)
Bejuri, Wan Mohd Yaakob Wan; Mohamad, Mohd Murtadha
2014-11-01
This paper introduces a new grey-world-based feature detection and matching algorithm, intended for use with mobile positioning systems. This approach uses a combination of a wireless local area network (WLAN) and a mobile phone camera to determine positioning in an illumination environment using a practical and pervasive approach. The signal combination is based on retrieved signal strength from the WLAN access point and the image processing information from the building hallways. The results show our method can handle information better than Harlan Hile's method relative to the illumination environment, producing lower illumination error in five (5) different environments.
Implementation of the MSAT network in Canada
NASA Astrophysics Data System (ADS)
Roscoe, Orest S.
1991-10-01
MSAT will be launched into geostationary orbit at 106.5 degrees west longitude. It will have an aggregate EIRP in excess of 57 dBw, making it the highest powered mobile satellite launched or planned to date. The MSAT ground segment will comprise hundreds of thousands of mobile terminals, as well as numerous feederlink earth stations. This requires a large scale network control system which is unprecedented in a satellite environment. The network control system must support circuit-switched voice and data services and packet-switched data services. In addition to assignment of capacity on demand, the control system must be able to support a variety of service features required by customers, as well as record information for billing. It must operate in a multi-beam, multi-satellite environment as the system grows.
Cyber-physical approach to the network-centric robotics control task
NASA Astrophysics Data System (ADS)
Muliukha, Vladimir; Ilyashenko, Alexander; Zaborovsky, Vladimir; Lukashin, Alexey
2016-10-01
Complex engineering tasks concerning control for groups of mobile robots are developed poorly. In our work for their formalization we use cyber-physical approach, which extends the range of engineering and physical methods for a design of complex technical objects by researching the informational aspects of communication and interaction between objects and with an external environment [1]. The paper analyzes network-centric methods for control of cyber-physical objects. Robots or cyber-physical objects interact with each other by transmitting information via computer networks using preemptive queueing system and randomized push-out mechanism [2],[3]. The main field of application for the results of our work is space robotics. The selection of cyber-physical systems as a special class of designed objects is due to the necessity of integrating various components responsible for computing, communications and control processes. Network-centric solutions allow using universal means for the organization of information exchange to integrate different technologies for the control system.
Exploring the impact of big data in economic geology using cloud-based synthetic sensor networks
NASA Astrophysics Data System (ADS)
Klump, J. F.; Robertson, J.
2015-12-01
In a market demanding lower resource prices and increasing efficiencies, resources companies are increasingly looking to the realm of real-time, high-frequency data streams to better measure and manage their minerals processing chain, from pit to plant to port. Sensor streams can include real-time drilling engineering information, data streams from mining trucks, and on-stream sensors operating in the plant feeding back rich chemical information. There are also many opportunities to deploy new sensor streams - unlike environmental monitoring networks, the mine environment is not energy- or bandwidth-limited. Although the promised efficiency dividends are inviting, the path to achieving these is difficult to see for most companies. As well as knowing where to invest in new sensor technology and how to integrate the new data streams, companies must grapple with risk-laden changes to their established methods of control to achieve maximum gains. What is required is a sandbox data environment for the development of analysis and control strategies at scale, allowing companies to de-risk proposed changes before actually deploying them to a live mine environment. In this presentation we describe our approach to simulating real-time scaleable data streams in a mine environment. Our sandbox consists of three layers: (a) a ground-truth layer that contains geological models, which can be statistically based on historical operations data, (b) a measurement layer - a network of RESTful synthetic sensor microservices which can simulate measurements of ground-truth properties, and (c) a control layer, which integrates the sensor streams and drives the measurement and optimisation strategies. The control layer could be a new machine learner, or simply a company's existing data infrastructure. Containerisation allows rapid deployment of large numbers of sensors, as well as service discovery to form a dynamic network of thousands of sensors, at a far lower cost than physically building the network.
NASA Astrophysics Data System (ADS)
Terasawa, Motoko
The Great East Japan Earthquake of March 11, 2011 caused extensive damage over a widespread area. Our hospital library, which is located in the affected area, was no exception. A large collection of books was lost, and some web content was inaccessible due to damage to the network environment. This greatly hindered our efforts to continue providing post-disaster medical information services. Information support, such as free access to databases, journals, and other online content related to the disaster areas, helped us immensely during this time. We were fortunate to have the cooperation of various medical employees and library members via social networks, such as twitter, during the process of attaining this information support.
WaveJava: Wavelet-based network computing
NASA Astrophysics Data System (ADS)
Ma, Kun; Jiao, Licheng; Shi, Zhuoer
1997-04-01
Wavelet is a powerful theory, but its successful application still needs suitable programming tools. Java is a simple, object-oriented, distributed, interpreted, robust, secure, architecture-neutral, portable, high-performance, multi- threaded, dynamic language. This paper addresses the design and development of a cross-platform software environment for experimenting and applying wavelet theory. WaveJava, a wavelet class library designed by the object-orient programming, is developed to take advantage of the wavelets features, such as multi-resolution analysis and parallel processing in the networking computing. A new application architecture is designed for the net-wide distributed client-server environment. The data are transmitted with multi-resolution packets. At the distributed sites around the net, these data packets are done the matching or recognition processing in parallel. The results are fed back to determine the next operation. So, the more robust results can be arrived quickly. The WaveJava is easy to use and expand for special application. This paper gives a solution for the distributed fingerprint information processing system. It also fits for some other net-base multimedia information processing, such as network library, remote teaching and filmless picture archiving and communications.
Smets, G; Alcalde, E; Andres, D; Carron, D; Delzenne, P; Heise, A; Legris, G; Martinez Parrilla, M; Verhaert, J; Wandelt, C; Ilegems, M; Rüdelsheim, P
2014-07-01
The European Union (EU) Directive 2001/18/EC on the deliberate release of genetically modified organisms (GMOs) into the environment requires that both Case-Specific Monitoring (CSM) and General Surveillance (GS) are considered as post-market implementing measures. Whereas CSM is directed to monitor potential adverse effects of GMOs or their use identified in the environmental risk assessment, GS aims to detect un-intended adverse effects of GMOs or their use on human and animal health or the environment. Guidance documents on the monitoring of genetically modified (GM) plants from the Commission and EFSA clarify that, as appropriate, GS can make use of established routine surveillance practices. Networks involved in routine surveillance offer recognised expertise in a particular domain and are designed to collect information on important environmental aspects over a large geographical area. However, as the suitability of existing monitoring networks to provide relevant data for monitoring impacts of GMOs is not known, plant biotechnology companies developed an approach to describe the processes and criteria that will be used for selecting and evaluating existing monitoring systems. In this paper, the availability of existing monitoring networks for this purpose is evaluated. By cataloguing the existing environmental monitoring networks in the EU, it can be concluded that they can only be used, in the context of GMO cultivation monitoring, as secondary tools to collect baseline information.
Network-based collaborative research environment LDRD final report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davies, B.R.; McDonald, M.J.
1997-09-01
The Virtual Collaborative Environment (VCE) and Distributed Collaborative Workbench (DCW) are new technologies that make it possible for diverse users to synthesize and share mechatronic, sensor, and information resources. Using these technologies, university researchers, manufacturers, design firms, and others can directly access and reconfigure systems located throughout the world. The architecture for implementing VCE and DCW has been developed based on the proposed National Information Infrastructure or Information Highway and a tool kit of Sandia-developed software. Further enhancements to the VCE and DCW technologies will facilitate access to other mechatronic resources. This report describes characteristics of VCE and DCW andmore » also includes background information about the evolution of these technologies.« less
ERIC Educational Resources Information Center
Kvalsund, Rune
2004-01-01
This article analyses and compares the learning environment in smaller and bigger rural schools by focusing on the arenas of both formal and informal learning; the lessons and the recesses between. Relational patterns are both analysed using complete network data from 19 schools in four different municipalities in four Norwegian counties and by…
A Novel Learning Environment: Case Study of the Pan African e-Network Project
ERIC Educational Resources Information Center
Nanda, Silima; Saxena, Ashlesh
2013-01-01
The constructivist form of learning creates such an environment where the learners are not only active but they become actors' i.e members and contributors of the social and information space without taking into consideration the geographic boundaries. Such an innovative form of distance education was initiated in India in the year 2007 and it was…
NASA Astrophysics Data System (ADS)
Drexler, Wendy
This design-based research case study applied a networked learning approach to a seventh grade science class at a public school in the southeastern United States. Students adapted emerging Web applications to construct personal learning environments for in-depth scientific inquiry of poisonous and venomous life forms. The personal learning environments constructed used Application Programming Interface (API) widgets to access, organize, and synthesize content from a number of educational Internet resources and social network connections. This study examined the nature of personal learning environments; the processes students go through during construction, and patterns that emerged. The project was documented from both an instructional and student-design perspective. Findings revealed that students applied the processes of: practicing digital responsibility; practicing digital literacy; organizing content; collaborating and socializing; and synthesizing and creating. These processes informed a model of the networked student that will serve as a framework for future instructional designs. A networked learning approach that incorporates these processes into future designs has implications for student learning, teacher roles, professional development, administrative policies, and delivery. This work is significant in that it shifts the focus from technology innovations based on tools to student empowerment based on the processes required to support learning. It affirms the need for greater attention to digital literacy and responsibility in K12 schools as well as consideration for those skills students will need to achieve success in the 21st century. The design-based research case study provides a set of design principles for teachers to follow when facilitating student construction of personal learning environments.
Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
He, Jingsha; Xu, Jing; Zhu, Xingye; Zhang, Yuqiang; Zhang, Ting; Fu, Wanqing
2014-01-01
Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments. PMID:24982940
A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments
Ghamari, Mohammad; Janko, Balazs; Sherratt, R. Simon; Harwin, William; Piechockic, Robert; Soltanpur, Cinna
2016-01-01
Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments. PMID:27338377
A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments.
Ghamari, Mohammad; Janko, Balazs; Sherratt, R Simon; Harwin, William; Piechockic, Robert; Soltanpur, Cinna
2016-06-07
Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments.
Wiggins, Benjamin L.; Goodreau, Steven M.
2014-01-01
Social interactions between students are a major and underexplored part of undergraduate education. Understanding how learning relationships form in undergraduate classrooms, as well as the impacts these relationships have on learning outcomes, can inform educators in unique ways and improve educational reform. Social network analysis (SNA) provides the necessary tool kit for investigating questions involving relational data. We introduce basic concepts in SNA, along with methods for data collection, data processing, and data analysis, using a previously collected example study on an undergraduate biology classroom as a tutorial. We conduct descriptive analyses of the structure of the network of costudying relationships. We explore generative processes that create observed study networks between students and also test for an association between network position and success on exams. We also cover practical issues, such as the unique aspects of human subjects review for network studies. Our aims are to convince readers that using SNA in classroom environments allows rich and informative analyses to take place and to provide some initial tools for doing so, in the process inspiring future educational studies incorporating relational data. PMID:26086650
Shi, Chenguang; Salous, Sana; Wang, Fei; Zhou, Jianjiang
2016-12-06
This paper investigates the joint target parameter (delay and Doppler) estimation performance of linear frequency modulation (LFM)-based radar networks in a Rice fading environment. The active radar networks are composed of multiple radar transmitters and multichannel receivers placed on moving platforms. First, the log-likelihood function of the received signal for a Rician target is derived, where the received signal scattered off the target comprises of dominant scatterer (DS) component and weak isotropic scatterers (WIS) components. Then, the analytically closed-form expressions of the Cramer-Rao lower bounds (CRLBs) on the Cartesian coordinates of target position and velocity are calculated, which can be adopted as a performance metric to access the target parameter estimation accuracy for LFM-based radar network systems in a Rice fading environment. It is found that the cumulative Fisher information matrix (FIM) is a linear combination of both DS component and WIS components, and it also demonstrates that the joint CRLB is a function of signal-to-noise ratio (SNR), target's radar cross section (RCS) and transmitted waveform parameters, as well as the relative geometry between the target and the radar network architectures. Finally, numerical results are provided to indicate that the joint target parameter estimation performance of active radar networks can be significantly improved with the exploitation of DS component.
Shi, Chenguang; Salous, Sana; Wang, Fei; Zhou, Jianjiang
2016-01-01
This paper investigates the joint target parameter (delay and Doppler) estimation performance of linear frequency modulation (LFM)-based radar networks in a Rice fading environment. The active radar networks are composed of multiple radar transmitters and multichannel receivers placed on moving platforms. First, the log-likelihood function of the received signal for a Rician target is derived, where the received signal scattered off the target comprises of dominant scatterer (DS) component and weak isotropic scatterers (WIS) components. Then, the analytically closed-form expressions of the Cramer-Rao lower bounds (CRLBs) on the Cartesian coordinates of target position and velocity are calculated, which can be adopted as a performance metric to access the target parameter estimation accuracy for LFM-based radar network systems in a Rice fading environment. It is found that the cumulative Fisher information matrix (FIM) is a linear combination of both DS component and WIS components, and it also demonstrates that the joint CRLB is a function of signal-to-noise ratio (SNR), target’s radar cross section (RCS) and transmitted waveform parameters, as well as the relative geometry between the target and the radar network architectures. Finally, numerical results are provided to indicate that the joint target parameter estimation performance of active radar networks can be significantly improved with the exploitation of DS component. PMID:27929433
NASA Astrophysics Data System (ADS)
Ballora, Mark; Hall, David L.
2010-04-01
Detection of intrusions is a continuing problem in network security. Due to the large volumes of data recorded in Web server logs, analysis is typically forensic, taking place only after a problem has occurred. This paper describes a novel method of representing Web log information through multi-channel sound, while simultaneously visualizing network activity using a 3-D immersive environment. We are exploring the detection of intrusion signatures and patterns, utilizing human aural and visual pattern recognition ability to detect intrusions as they occur. IP addresses and return codes are mapped to an informative and unobtrusive listening environment to act as a situational sound track of Web traffic. Web log data is parsed and formatted using Python, then read as a data array by the synthesis language SuperCollider [1], which renders it as a sonification. This can be done either for the study of pre-existing data sets or in monitoring Web traffic in real time. Components rendered aurally include IP address, geographical information, and server Return Codes. Users can interact with the data, speeding or slowing the speed of representation (for pre-existing data sets) or "mixing" sound components to optimize intelligibility for tracking suspicious activity.
A Wireless Sensor Network-Based Approach with Decision Support for Monitoring Lake Water Quality.
Huang, Xiaoci; Yi, Jianjun; Chen, Shaoli; Zhu, Xiaomin
2015-11-19
Online monitoring and water quality analysis of lakes are urgently needed. A feasible and effective approach is to use a Wireless Sensor Network (WSN). Lake water environments, like other real world environments, present many changing and unpredictable situations. To ensure flexibility in such an environment, the WSN node has to be prepared to deal with varying situations. This paper presents a WSN self-configuration approach for lake water quality monitoring. The approach is based on the integration of a semantic framework, where a reasoner can make decisions on the configuration of WSN services. We present a WSN ontology and the relevant water quality monitoring context information, which considers its suitability in a pervasive computing environment. We also propose a rule-based reasoning engine that is used to conduct decision support through reasoning techniques and context-awareness. To evaluate the approach, we conduct usability experiments and performance benchmarks.
Li, Xin; Gray, Kathleen; Verspoor, Karin; Barnett, Stephen
2017-01-01
Online social networks (OSN) enable health professionals to learn informally, for example by sharing medical knowledge, or discussing practice management challenges and clinical issues. Understanding the learning context in OSN is necessary to get a complete picture of the learning process, in order to better support this type of learning. This study proposes critical contextual factors for understanding the learning context in OSN for health professionals, and demonstrates how these contextual factors can be used to analyse the learning context in a designated online learning environment for health professionals.
Government information resource catalog and its service system realization
NASA Astrophysics Data System (ADS)
Gui, Sheng; Li, Lin; Wang, Hong; Peng, Zifeng
2007-06-01
During the process of informatization, there produces a great deal of information resources. In order to manage these information resources and use them to serve the management of business, government decision and public life, it is necessary to establish a transparent and dynamic information resource catalog and its service system. This paper takes the land-house management information resource for example. Aim at the characteristics of this kind of information, this paper does classification, identification and description of land-house information in an uniform specification and method, establishes land-house information resource catalog classification system&, metadata standard, identification standard and land-house thematic thesaurus, and in the internet environment, user can search and get their interested information conveniently. Moreover, under the network environment, to achieve speedy positioning, inquiring, exploring and acquiring various types of land-house management information; and satisfy the needs of sharing, exchanging, application and maintenance of land-house management information resources.
The challenge of social networking in the field of environment and health.
van den Hazel, Peter; Keune, Hans; Randall, Scott; Yang, Aileen; Ludlow, David; Bartonova, Alena
2012-06-28
The fields of environment and health are both interdisciplinary and trans-disciplinary, and until recently had little engagement in social networking designed to cross disciplinary boundaries. The EU FP6 project HENVINET aimed to establish integrated social network and networking facilities for multiple stakeholders in environment and health. The underlying assumption is that increased social networking across disciplines and sectors will enhance the quality of both problem knowledge and problem solving, by facilitating interactions. Inter- and trans-disciplinary networks are considered useful for this purpose. This does not mean that such networks are easily organized, as openness to such cooperation and exchange is often difficult to ascertain. Different methods may enhance network building. Using a mixed method approach, a diversity of actions were used in order to investigate the main research question: which kind of social networking activities and structures can best support the objective of enhanced inter- and trans-disciplinary cooperation and exchange in the fields of environment and health. HENVINET applied interviews, a role playing session, a personal response system, a stakeholder workshop and a social networking portal as part of the process of building an interdisciplinary and trans-disciplinary network. The interviews provided support for the specification of requirements for an interdisciplinary and trans-disciplinary network. The role playing session, the personal response system and the stakeholder workshop were assessed as useful tools in forming such network, by increasing the awareness by different disciplines of other's positions. The social networking portal was particularly useful in delivering knowledge, but the role of the scientist in social networking is not yet clear. The main challenge in the field of environment and health is not so much a lack of scientific problem knowledge, but rather the ability to effectively communicate, share and use available knowledge for policy making. Structured social network facilities can be useful by policy makers to engage with the research community. It is beneficial for scientists to be able to integrate the perspective of policy makers in the research agenda, and to assist in co-production of policy-relevant information. A diversity of methods need to be applied for network building: according to the fit-for-purpose-principle. It is useful to know which combination of methods and in which time frame produces the best results.Networking projects such as HENVINET are created not only for the benefit of the network itself, but also because the applying of the different methods is a learning tool for future network building. Finally, it is clear that the importance of specialized professionals in enabling effective communication between different groups should not be underestimated.
The challenge of social networking in the field of environment and health
2012-01-01
Background The fields of environment and health are both interdisciplinary and trans-disciplinary, and until recently had little engagement in social networking designed to cross disciplinary boundaries. The EU FP6 project HENVINET aimed to establish integrated social network and networking facilities for multiple stakeholders in environment and health. The underlying assumption is that increased social networking across disciplines and sectors will enhance the quality of both problem knowledge and problem solving, by facilitating interactions. Inter- and trans-disciplinary networks are considered useful for this purpose. This does not mean that such networks are easily organized, as openness to such cooperation and exchange is often difficult to ascertain. Methods Different methods may enhance network building. Using a mixed method approach, a diversity of actions were used in order to investigate the main research question: which kind of social networking activities and structures can best support the objective of enhanced inter- and trans-disciplinary cooperation and exchange in the fields of environment and health. HENVINET applied interviews, a role playing session, a personal response system, a stakeholder workshop and a social networking portal as part of the process of building an interdisciplinary and trans-disciplinary network. Results The interviews provided support for the specification of requirements for an interdisciplinary and trans-disciplinary network. The role playing session, the personal response system and the stakeholder workshop were assessed as useful tools in forming such network, by increasing the awareness by different disciplines of other’s positions. The social networking portal was particularly useful in delivering knowledge, but the role of the scientist in social networking is not yet clear. Conclusions The main challenge in the field of environment and health is not so much a lack of scientific problem knowledge, but rather the ability to effectively communicate, share and use available knowledge for policy making. Structured social network facilities can be useful by policy makers to engage with the research community. It is beneficial for scientists to be able to integrate the perspective of policy makers in the research agenda, and to assist in co-production of policy-relevant information. A diversity of methods need to be applied for network building: according to the fit-for-purpose-principle. It is useful to know which combination of methods and in which time frame produces the best results. Networking projects such as HENVINET are created not only for the benefit of the network itself, but also because the applying of the different methods is a learning tool for future network building. Finally, it is clear that the importance of specialized professionals in enabling effective communication between different groups should not be underestimated. PMID:22759497
Physio-Environmental Sensing and Live Modeling
Diaz, Vanessa; Gaggioli, Andrea; Liò, Pietro; Mazzà, Claudia; Merelli, Emanuela; Meskers, Carel G.M; Pappalardo, Francesco; von Ammon, Rainer
2013-01-01
In daily life, humans are constantly interacting with their environment. Evidence is emerging that this interaction is a very important modulator of health and well-being, even more so in our rapidly ageing society. Information and communication technology lies at the heart of the human health care revolution. It cannot remain acceptable to use out of date data analysis and predictive algorithms when superior alternatives exist. Communication network speed, high penetration of home broadband, availability of various mobile network options, together with the available detailed biological data for individuals, are producing promising advances in computerized systems that will turn information on human-environment interactions into actual knowledge with the potential to help make medical and lifestyle decisions. We introduced and discussed a key scenario in which hardware and software technologies capable of simultaneously sensing physiological and environmental signals process health care data in real-time to issue alarms, warnings, or simple recommendations to the patient or carers. PMID:23612245
NASA Technical Reports Server (NTRS)
Rickman, Doug; Shire, J.; Qualters, J.; Mitchell, K.; Pollard, S.; Rao, R.; Kajumba, N.; Quattrochi, D.; Estes, M., Jr.; Meyer, P.;
2009-01-01
Objectives. To provide an overview of four environmental public health surveillance projects developed by CDC and its partners for the Health and Environment Linked for Information Exchange, Atlanta (HELIX-Atlanta) and to illustrate common issues and challenges encountered in developing an environmental public health tracking system. Methods. HELIX-Atlanta, initiated in October 2003 to develop data linkage and analysis methods that can be used by the National Environmental Public Health Tracking Network (Tracking Network), conducted four projects. We highlight the projects' work, assess attainment of the HELIX-Atlanta goals and discuss three surveillance attributes. Results. Among the major challenges was the complexity of analytic issues which required multidiscipline teams with technical expertise. This expertise and the data resided across multiple organizations. Conclusions:Establishing formal procedures for sharing data, defining data analysis standards and automating analyses, and committing staff with appropriate expertise is needed to support wide implementation of environmental public health tracking.
Transition from isotropic to digitated growth modulates network formation in Physarum polycephalum
NASA Astrophysics Data System (ADS)
Vogel, David; Gautrais, Jacques; Perna, Andrea; Sumpter, David J. T.; Deneubourg, Jean-Louis; Dussutour, Audrey
2017-01-01
Some organisms, including fungi, ants, and slime molds, explore their environment and forage by forming interconnected networks. The plasmodium of the slime mold Physarum polycephalum is a large unicellular amoeboid organism that grows a tubular spatial network through which nutrients, body mass, and chemical signals are transported. Individual plasmodia are capable of sophisticated behaviours such as optimizing their network connectivity and dynamics using only decentralized information processing. In this study, we used a population of plasmodia that interconnect through time to analyse the dynamical interactions between growth of individual plasmodia and global network formation. Our results showed how initial conditions, such as the distance between plasmodia, their size, or the presence and quality of food, affect the emerging network connectivity.
Distributed Spectral Monitoring For Emitter Localization
2018-02-12
localization techniques in a DSA sensor network. The results of the research are presented through simulation of localization algorithms, emulation of a...network on a wireless RF environment emulator, and field tests. The results of the various tests in both the lab and field are obtained and analyzed to... are two main classes of localization techniques, and the technique to use will depend on the information available with the emitter. The first class
Beyond Line-of-Sight Information Dissemination for Force Protection
2012-11-01
utilize ad hoc, mesh networks to support data-in-motion and remote data storage and access. These types of sensors are common among Force Protection...Operations and Forward Operating Base security . Current Force Protection Kits include a rich set of sensors that can be monitored from a core operator...and tactical war fighters in tactical network environments . Marti has the potential to improve situation awareness and Force Protection for
Realistic terrain visualization based on 3D virtual world technology
NASA Astrophysics Data System (ADS)
Huang, Fengru; Lin, Hui; Chen, Bin; Xiao, Cai
2009-09-01
The rapid advances in information technologies, e.g., network, graphics processing, and virtual world, have provided challenges and opportunities for new capabilities in information systems, Internet applications, and virtual geographic environments, especially geographic visualization and collaboration. In order to achieve meaningful geographic capabilities, we need to explore and understand how these technologies can be used to construct virtual geographic environments to help to engage geographic research. The generation of three-dimensional (3D) terrain plays an important part in geographical visualization, computer simulation, and virtual geographic environment applications. The paper introduces concepts and technologies of virtual worlds and virtual geographic environments, explores integration of realistic terrain and other geographic objects and phenomena of natural geographic environment based on SL/OpenSim virtual world technologies. Realistic 3D terrain visualization is a foundation of construction of a mirror world or a sand box model of the earth landscape and geographic environment. The capabilities of interaction and collaboration on geographic information are discussed as well. Further virtual geographic applications can be developed based on the foundation work of realistic terrain visualization in virtual environments.
Realistic terrain visualization based on 3D virtual world technology
NASA Astrophysics Data System (ADS)
Huang, Fengru; Lin, Hui; Chen, Bin; Xiao, Cai
2010-11-01
The rapid advances in information technologies, e.g., network, graphics processing, and virtual world, have provided challenges and opportunities for new capabilities in information systems, Internet applications, and virtual geographic environments, especially geographic visualization and collaboration. In order to achieve meaningful geographic capabilities, we need to explore and understand how these technologies can be used to construct virtual geographic environments to help to engage geographic research. The generation of three-dimensional (3D) terrain plays an important part in geographical visualization, computer simulation, and virtual geographic environment applications. The paper introduces concepts and technologies of virtual worlds and virtual geographic environments, explores integration of realistic terrain and other geographic objects and phenomena of natural geographic environment based on SL/OpenSim virtual world technologies. Realistic 3D terrain visualization is a foundation of construction of a mirror world or a sand box model of the earth landscape and geographic environment. The capabilities of interaction and collaboration on geographic information are discussed as well. Further virtual geographic applications can be developed based on the foundation work of realistic terrain visualization in virtual environments.
Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance
ERIC Educational Resources Information Center
Shim, Woohyun
2010-01-01
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Providing the Tools for Information Sharing: Net-Centric Enterprise Services
2007-07-01
The Department of Defense (DoD) is establishing a net-centric environment that increasingly leverages shared services and Service-Oriented...transformational program that delivers a set of shared services as part of the DoD’s common infrastructure to enable networked joint force capabilities, improved interoperability, and increased information sharing across mission area services.
Measuring the Level of Security in the K-12 IT Environment in Southern California
ERIC Educational Resources Information Center
Brown, Brandon R.
2016-01-01
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Theoretical Neuroanatomy:Analyzing the Structure, Dynamics,and Function of Neuronal Networks
NASA Astrophysics Data System (ADS)
Seth, Anil K.; Edelman, Gerald M.
The mammalian brain is an extraordinary object: its networks give rise to our conscious experiences as well as to the generation of adaptive behavior for the organism within its environment. Progress in understanding the structure, dynamics and function of the brain faces many challenges. Biological neural networks change over time, their detailed structure is difficult to elucidate, and they are highly heterogeneous both in their neuronal units and synaptic connections. In facing these challenges, graph-theoretic and information-theoretic approaches have yielded a number of useful insights and promise many more.
Scalable and reusable emulator for evaluating the performance of SS7 networks
NASA Astrophysics Data System (ADS)
Lazar, Aurel A.; Tseng, Kent H.; Lim, Koon Seng; Choe, Winston
1994-04-01
A scalable and reusable emulator was designed and implemented for studying the behavior of SS7 networks. The emulator design was largely based on public domain software. It was developed on top of an environment supported by PVM, the Parallel Virtual Machine, and managed by OSIMIS-the OSI Management Information Service platform. The emulator runs on top of a commercially available ATM LAN interconnecting engineering workstations. As a case study for evaluating the emulator, the behavior of the Singapore National SS7 Network under fault and unbalanced loading conditions was investigated.
Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.
Virtual shelves in a digital library: a framework for access to networked information sources.
Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E
1995-01-01
OBJECTIVE: Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. DESIGN: This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. RESULTS: The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. CONCLUSIONS: This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources. PMID:8581554
Towards the understanding of network information processing in biology
NASA Astrophysics Data System (ADS)
Singh, Vijay
Living organisms perform incredibly well in detecting a signal present in the environment. This information processing is achieved near optimally and quite reliably, even though the sources of signals are highly variable and complex. The work in the last few decades has given us a fair understanding of how individual signal processing units like neurons and cell receptors process signals, but the principles of collective information processing on biological networks are far from clear. Information processing in biological networks, like the brain, metabolic circuits, cellular-signaling circuits, etc., involves complex interactions among a large number of units (neurons, receptors). The combinatorially large number of states such a system can exist in makes it impossible to study these systems from the first principles, starting from the interactions between the basic units. The principles of collective information processing on such complex networks can be identified using coarse graining approaches. This could provide insights into the organization and function of complex biological networks. Here I study models of biological networks using continuum dynamics, renormalization, maximum likelihood estimation and information theory. Such coarse graining approaches identify features that are essential for certain processes performed by underlying biological networks. We find that long-range connections in the brain allow for global scale feature detection in a signal. These also suppress the noise and remove any gaps present in the signal. Hierarchical organization with long-range connections leads to large-scale connectivity at low synapse numbers. Time delays can be utilized to separate a mixture of signals with temporal scales. Our observations indicate that the rules in multivariate signal processing are quite different from traditional single unit signal processing.
ImTK: an open source multi-center information management toolkit
NASA Astrophysics Data System (ADS)
Alaoui, Adil; Ingeholm, Mary Lou; Padh, Shilpa; Dorobantu, Mihai; Desai, Mihir; Cleary, Kevin; Mun, Seong K.
2008-03-01
The Information Management Toolkit (ImTK) Consortium is an open source initiative to develop robust, freely available tools related to the information management needs of basic, clinical, and translational research. An open source framework and agile programming methodology can enable distributed software development while an open architecture will encourage interoperability across different environments. The ISIS Center has conceptualized a prototype data sharing network that simulates a multi-center environment based on a federated data access model. This model includes the development of software tools to enable efficient exchange, sharing, management, and analysis of multimedia medical information such as clinical information, images, and bioinformatics data from multiple data sources. The envisioned ImTK data environment will include an open architecture and data model implementation that complies with existing standards such as Digital Imaging and Communications (DICOM), Health Level 7 (HL7), and the technical framework and workflow defined by the Integrating the Healthcare Enterprise (IHE) Information Technology Infrastructure initiative, mainly the Cross Enterprise Document Sharing (XDS) specifications.
2017-01-01
This study investigates the empirical presence of a theoretical transportation paradox, defined as the “Online Information Paradox” (OIP). The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE) solution (no information scenario) and the other being the User Equilibrium with Recourse (UER) solution (with information scenario). An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC) were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network. PMID:28902854
Findings from an Organizational Network Analysis to Support Local Public Health Management
Caldwell, Michael; Rockoff, Maxine L.; Gebbie, Kristine; Carley, Kathleen M.; Bakken, Suzanne
2008-01-01
We assessed the feasibility of using organizational network analysis in a local public health organization. The research setting was an urban/suburban county health department with 156 employees. The goal of the research was to study communication and information flow in the department and to assess the technique for public health management. Network data were derived from survey questionnaires. Computational analysis was performed with the Organizational Risk Analyzer. Analysis revealed centralized communication, limited interdependencies, potential knowledge loss through retirement, and possible informational silos. The findings suggested opportunities for more cross program coordination but also suggested the presences of potentially efficient communication paths and potentially beneficial social connectedness. Managers found the findings useful to support decision making. Public health organizations must be effective in an increasingly complex environment. Network analysis can help build public health capacity for complex system management. PMID:18481183
Quantum information transmission in the quantum wireless multihop network based on Werner state
NASA Astrophysics Data System (ADS)
Shi, Li-Hui; Yu, Xu-Tao; Cai, Xiao-Fei; Gong, Yan-Xiao; Zhang, Zai-Chen
2015-05-01
Many previous studies about teleportation are based on pure state. Study of quantum channel as mixed state is more realistic but complicated as pure states degenerate into mixed states by interaction with environment, and the Werner state plays an important role in the study of the mixed state. In this paper, the quantum wireless multihop network is proposed and the information is transmitted hop by hop through teleportation. We deduce a specific expression of the recovered state not only after one-hop teleportation but also across multiple intermediate nodes based on Werner state in a quantum wireless multihop network. We also obtain the fidelity of multihop teleportation. Project supported by the Prospective Future Network Project of Jiangsu Province, China (Grant No. BY2013095-1-18) and the Independent Project of State Key Laboratory of Millimeter Waves (Grant No. Z201504).
Communal Cooperation in Sensor Networks for Situation Management
NASA Technical Reports Server (NTRS)
Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin,Chunsheng
2006-01-01
Situation management is a rapidly evolving science where managed sources are processed as realtime streams of events and fused in a way that maximizes comprehension, thus enabling better decisions for action. Sensor networks provide a new technology that promises ubiquitous input and action throughout an environment, which can substantially improve information available to the process. Here we describe a NASA program that requires improvements in sensor networks and situation management. We present an approach for massively deployed sensor networks that does not rely on centralized control but is founded in lessons learned from the way biological ecosystems are organized. In this approach, fully distributed data aggregation and integration can be performed in a scalable fashion where individual motes operate based on local information, making local decisions that achieve globally-meaningful results. This exemplifies the robust, fault-tolerant infrastructure required for successful situation management systems.
A Wireless Sensor Network-Based Ubiquitous Paprika Growth Management System
Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun
2010-01-01
Wireless Sensor Network (WSN) technology can facilitate advances in productivity, safety and human quality of life through its applications in various industries. In particular, the application of WSN technology to the agricultural area, which is labor-intensive compared to other industries, and in addition is typically lacking in IT technology applications, adds value and can increase the agricultural productivity. This study attempts to establish a ubiquitous agricultural environment and improve the productivity of farms that grow paprika by suggesting a ‘Ubiquitous Paprika Greenhouse Management System’ using WSN technology. The proposed system can collect and monitor information related to the growth environment of crops outside and inside paprika greenhouses by installing WSN sensors and monitoring images captured by CCTV cameras. In addition, the system provides a paprika greenhouse environment control facility for manual and automatic control from a distance, improves the convenience and productivity of users, and facilitates an optimized environment to grow paprika based on the growth environment data acquired by operating the system. PMID:22163543
Toward information management in corporations (11)
NASA Astrophysics Data System (ADS)
Yamanaka, Yoshiaki
PC/WS's proleferation on to the despk top of endusers result in high level of computer literacies to them, networking between host/departmental/personal equipments also prevails entire organizations. In these circumstance, information architecture and environments will rapidly change in 1990's. Information manager's roles would change in these informated organization. Their roles and responsibilities will shifts to similer ones as other managers roles like human/asset/purchase/financial resources management. Sprit responsibilities between Cief Information Officer and MIS manager also will be seen in 1990's.
Design of multi-phase dynamic chemical networks
NASA Astrophysics Data System (ADS)
Chen, Chenrui; Tan, Junjun; Hsieh, Ming-Chien; Pan, Ting; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.
2017-08-01
Template-directed polymerization reactions enable the accurate storage and processing of nature's biopolymer information. This mutualistic relationship of nucleic acids and proteins, a network known as life's central dogma, is now marvellously complex, and the progressive steps necessary for creating the initial sequence and chain-length-specific polymer templates are lost to time. Here we design and construct dynamic polymerization networks that exploit metastable prion cross-β phases. Mixed-phase environments have been used for constructing synthetic polymers, but these dynamic phases emerge naturally from the growing peptide oligomers and create environments suitable both to nucleate assembly and select for ordered templates. The resulting templates direct the amplification of a phase containing only chain-length-specific peptide-like oligomers. Such multi-phase biopolymer dynamics reveal pathways for the emergence, self-selection and amplification of chain-length- and possibly sequence-specific biopolymers.
ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks
NASA Astrophysics Data System (ADS)
Banerjee, Debasmit; Dong, Bo; Biswas, Subir
2013-05-01
Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.
Biologically Inspired SNN for Robot Control.
Nichols, Eric; McDaid, Liam J; Siddique, Nazmul
2013-02-01
This paper proposes a spiking-neural-network-based robot controller inspired by the control structures of biological systems. Information is routed through the network using facilitating dynamic synapses with short-term plasticity. Learning occurs through long-term synaptic plasticity which is implemented using the temporal difference learning rule to enable the robot to learn to associate the correct movement with the appropriate input conditions. The network self-organizes to provide memories of environments that the robot encounters. A Pioneer robot simulator with laser and sonar proximity sensors is used to verify the performance of the network with a wall-following task, and the results are presented.
ERIC Educational Resources Information Center
Jain, Rishee K.
2013-01-01
The built environment accounts for a substantial portion of energy consumption in the United States and in many parts of the world. Due to concerns over rising energy costs and climate change, researchers and practitioners have started exploring the area of eco-informatics to link information from the human, natural and built environments.…
Advanced information society (11)
NASA Astrophysics Data System (ADS)
Nawa, Kotaro
Late in the 1980's the information system of Japanese corporation has been operated strategically to strengthen its competitive position in markets rather than to make corporate management efficient. Therefore, information-oriented policy in the corporation is making remarkable progress. This policy expands the intelligence activity in the corporation and also leads to the extension of the market in an information industry. In this environment closed corporate system is transformed into open one. For this system network and database are important managerial resources.
Ryan, Janice
2017-10-01
This exploratory, evidence-based practice research study focuses on presenting a plausible mesoscopic brain dynamics hypothesis for the benefits of treating clients with psychosocial and cognitive challenges using a mindful therapeutic approach and multi-sensory environments. After an extensive neuroscientific review of the therapeutic benefits of mindfulness, a multi-sensory environment is presented as a window of therapeutic opportunity to more quickly and efficiently facilitate the neurobiological experience of becoming more mindful or conscious of self and environment. The complementary relationship between the default mode network and the executive attention network is offered as a neurobiological hypothesis that could explain positive occupational engagement pattern shifts in a case study video of a hospice client with advanced dementia during multi-sensory environment treatment. Orbital Decomposition is used for a video analysis that shows a significant behavioral pattern shift consistent with dampening of the perceptual system attractors that contribute to negative emotional circular causalities in a variety of client populations. This treatment approach may also prove to be valuable for any person who has developed circular causalities due to feelings of isolation, victimization, or abuse. A case is made for broader applications of this intervention that may positively influence perception during the information transfer and processing of hippocampal learning. Future research is called for to determine if positive affective, interpersonal, and occupational engagement pattern shifts during treatment are related to the improved default mode network-executive attention network synchrony characteristic of increased mindfulness.
A design philosophy for multi-layer neural networks with applications to robot control
NASA Technical Reports Server (NTRS)
Vadiee, Nader; Jamshidi, MO
1989-01-01
A system is proposed which receives input information from many sensors that may have diverse scaling, dimension, and data representations. The proposed system tolerates sensory information with faults. The proposed self-adaptive processing technique has great promise in integrating the techniques of artificial intelligence and neural networks in an attempt to build a more intelligent computing environment. The proposed architecture can provide a detailed decision tree based on the input information, information stored in a long-term memory, and the adapted rule-based knowledge. A mathematical model for analysis will be obtained to validate the cited hypotheses. An extensive software program will be developed to simulate a typical example of pattern recognition problem. It is shown that the proposed model displays attention, expectation, spatio-temporal, and predictory behavior which are specific to the human brain. The anticipated results of this research project are: (1) creation of a new dynamic neural network structure, and (2) applications to and comparison with conventional multi-layer neural network structures. The anticipated benefits from this research are vast. The model can be used in a neuro-computer architecture as a building block which can perform complicated, nonlinear, time-varying mapping from a multitude of input excitory classes to an output or decision environment. It can be used for coordinating different sensory inputs and past experience of a dynamic system and actuating signals. The commercial applications of this project can be the creation of a special-purpose neuro-computer hardware which can be used in spatio-temporal pattern recognitions in such areas as air defense systems, e.g., target tracking, and recognition. Potential robotics-related applications are trajectory planning, inverse dynamics computations, hierarchical control, task-oriented control, and collision avoidance.
Dynamic Optical Networks for Future Internet Environments
NASA Astrophysics Data System (ADS)
Matera, Francesco
2014-05-01
This article reports an overview on the evolution of the optical network scenario taking into account the exponential growth of connected devices, big data, and cloud computing that is driving a concrete transformation impacting the information and communication technology world. This hyper-connected scenario is deeply affecting relationships between individuals, enterprises, citizens, and public administrations, fostering innovative use cases in practically any environment and market, and introducing new opportunities and new challenges. The successful realization of this hyper-connected scenario depends on different elements of the ecosystem. In particular, it builds on connectivity and functionalities allowed by converged next-generation networks and their capacity to support and integrate with the Internet of Things, machine-to-machine, and cloud computing. This article aims at providing some hints of this scenario to contribute to analyze impacts on optical system and network issues and requirements. In particular, the role of the software-defined network is investigated by taking into account all scenarios regarding data centers, cloud computing, and machine-to-machine and trying to illustrate all the advantages that could be introduced by advanced optical communications.
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606
Robust visual tracking via multiscale deep sparse networks
NASA Astrophysics Data System (ADS)
Wang, Xin; Hou, Zhiqiang; Yu, Wangsheng; Xue, Yang; Jin, Zefenfen; Dai, Bo
2017-04-01
In visual tracking, deep learning with offline pretraining can extract more intrinsic and robust features. It has significant success solving the tracking drift in a complicated environment. However, offline pretraining requires numerous auxiliary training datasets and is considerably time-consuming for tracking tasks. To solve these problems, a multiscale sparse networks-based tracker (MSNT) under the particle filter framework is proposed. Based on the stacked sparse autoencoders and rectifier linear unit, the tracker has a flexible and adjustable architecture without the offline pretraining process and exploits the robust and powerful features effectively only through online training of limited labeled data. Meanwhile, the tracker builds four deep sparse networks of different scales, according to the target's profile type. During tracking, the tracker selects the matched tracking network adaptively in accordance with the initial target's profile type. It preserves the inherent structural information more efficiently than the single-scale networks. Additionally, a corresponding update strategy is proposed to improve the robustness of the tracker. Extensive experimental results on a large scale benchmark dataset show that the proposed method performs favorably against state-of-the-art methods in challenging environments.
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.
Toward the establishment of design guidelines for effective 3D perspective interfaces
NASA Astrophysics Data System (ADS)
Fitzhugh, Elisabeth; Dixon, Sharon; Aleva, Denise; Smith, Eric; Ghrayeb, Joseph; Douglas, Lisa
2009-05-01
The propagation of information operation technologies, with correspondingly vast amounts of complex network information to be conveyed, significantly impacts operator workload. Information management research is rife with efforts to develop schemes to aid operators to identify, review, organize, and retrieve the wealth of available data. Data may take on such distinct forms as intelligence libraries, logistics databases, operational environment models, or network topologies. Increased use of taxonomies and semantic technologies opens opportunities to employ network visualization as a display mechanism for diverse information aggregations. The broad applicability of network visualizations is still being tested, but in current usage, the complexity of densely populated abstract networks suggests the potential utility of 3D. Employment of 2.5D in network visualization, using classic perceptual cues, creates a 3D experience within a 2D medium. It is anticipated that use of 3D perspective (2.5D) will enhance user ability to visually inspect large, complex, multidimensional networks. Current research for 2.5D visualizations demonstrates that display attributes, including color, shape, size, lighting, atmospheric effects, and shadows, significantly impact operator experience. However, guidelines for utilization of attributes in display design are limited. This paper discusses pilot experimentation intended to identify potential problem areas arising from these cues and determine how best to optimize perceptual cue settings. Development of optimized design guidelines will ensure that future experiments, comparing network displays with other visualizations, are not confounded or impeded by suboptimal attribute characterization. Current experimentation is anticipated to support development of cost-effective, visually effective methods to implement 3D in military applications.
Chen, Yiyun; Latkin, Carl; Celentano, David D; Yang, Xiushi; Li, Xiaoming; Xia, Guomei; Miao, Jia; Surkan, Pamela J
2012-10-01
Diffusion of innovation (DOI) is widely cited in the HIV behavior change literature; however there is a dearth of research on the application of DOI in interventions for sex workers. Following a randomized-controlled trial of HIV risk reduction among female entertainment workers (FEWs) in Shanghai, China, we used qualitative approaches to delineate potential interpersonal communication networks and contributing factors that promote diffusion of information in entertainment venues. Results showed that top-down communication networks from the venue owners to the FEWs were efficient for diffusion of information. Mammies/madams, who act as intermediaries between FEWs and clients form an essential part of FEWs' social networks but do not function as information disseminators due to a conflict of interest between safer sex and maximizing profits. Diffusion of information in large venues tended to rely more on aspects of the physical environment to create intimacy and on pressure from managers to stimulate communication. In small venues, communication and conversations occurred more spontaneously among FEWs. Information about safer sex appeared to be more easily disseminated when the message and the approach used to convey information could be tailored to people working at different levels in the venues. Results suggest that safer sex messages should be provided consistently following an intervention to further promote intervention diffusion, and health-related employer liability systems in entertainment venues should be established, in which employers are responsible for the health of their employees. Our study suggests that existing personal networks can be used to disseminate information in entertainment venues and one should be mindful about the context-specific interactions between FEWs and others in their social networks to better achieve diffusion of interventions.
Latkin, Carl; Celentano, David D.; Yang, Xiushi; Li, Xiaoming; Xia, Guomei; Miao, Jia; Surkan, Pamela J.
2013-01-01
Diffusion of innovation (DOI) is widely cited in the HIV behavior change literature; however there is a dearth of research on the application of DOI in interventions for sex workers. Following a randomized-controlled trial of HIV risk reduction among female entertainment workers (FEWs) in Shanghai, China, we used qualitative approaches to delineate potential interpersonal communication networks and contributing factors that promote diffusion of information in entertainment venues. Results showed that top-down communication networks from the venue owners to the FEWs were efficient for diffusion of information. Mammies/madams, who act as intermediaries between FEWs and clients form an essential part of FEWs’ social networks but do not function as information disseminators due to a conflict of interest between safer sex and maximizing profits. Diffusion of information in large venues tended to rely more on aspects of the physical environment to create intimacy and on pressure from managers to stimulate communication. In small venues, communication and conversations occurred more spontaneously among FEWs. Information about safer sex appeared to be more easily disseminated when the message and the approach used to convey information could be tailored to people working at different levels in the venues. Results suggest that safer sex messages should be provided consistently following an intervention to further promote intervention diffusion, and health-related employer liability systems in entertainment venues should be established, in which employers are responsible for the health of their employees. Our study suggests that existing personal networks can be used to disseminate information in entertainment venues and one should be mindful about the context-specific interactions between FEWs and others in their social networks to better achieve diffusion of interventions. PMID:22638867
The Evolution of Networks in Extreme and Isolated Environment
NASA Technical Reports Server (NTRS)
Johnson, Jeffrey C.; Boster, James S.; Palinkas, Lawrence A.
2000-01-01
This article reports on the evolution of network structure as it relates to the formal and informal aspects of social roles in well bounded, isolated groups. Research was conducted at the Amundsen-Scott South Pole Station over a 3-year period. Data was collected on crewmembers' networks of social interaction and personal advice over each of the 8.5-month winters during a time of complete isolation. In addition, data was collected on informal social role structure (e.g., instrumental leadership, expressive leadership). It was hypothesized that development and maintenance of a cohesive group structure was related to the presence of and group consensus on various informal social roles. The study found that core-periphery structures (i.e., reflecting cohesion) in winter-over groups were associated with the presence of critically important informal social roles (e.g., expressive leadership) and high group consensus on such informal roles. On the other hand, the evolution of clique structures (i.e., lack of cohesion) were associated with the absence of critical roles and a lack of consensus on these roles, particularly the critically important role of instrumental leader.
Positioning the library at the epicenter of the networked biomedical enterprise.
Stead, W W
1998-01-01
The changing economic environment in which our biomedical enterprises operate presents unparalleled opportunities to the profession of medical librarianship. Evidence-based medicine, patient empowerment, asynchronous learning networks, and research colaboratories each involve a new type of shared information, or access to information in new ways or by different people. These tasks are ones with which librarianship is directly involved. Librarians are therefore placed perfectly to provide new products and services. To position the library at the epicenter of the networked biomedical enterprise we must meet three challenges: We must align the library's business strategy with that of the larger enterprise. We must provide services in ways that will scale-up to enable new business strategies. We must measure the effectiveness of services in ways that document their role in supporting the enterprise.
Multirate control with incomplete information over Profibus-DP network
NASA Astrophysics Data System (ADS)
Salt, J.; Casanova, V.; Cuenca, A.; Pizá, R.
2014-07-01
When a process field bus-decentralized peripherals (Profibus-DP) network is used in an industrial environment, a deterministic behaviour is usually claimed. However, due to some concerns such as bandwidth limitations, lack of synchronisation among different clocks and existence of time-varying delays, a more complex problem must be faced. This problem implies the transmission of irregular and, even, random sequences of incomplete information. The main consequence of this issue is the appearance of different sampling periods at different network devices. In this paper, this aspect is checked by means of a detailed Profibus-DP timescale study. In addition, in order to deal with the different periods, a delay-dependent dual-rate proportional-integral-derivative control is introduced. Stability for the proposed control system is analysed in terms of linear matrix inequalities.
SSIC model: A multi-layer model for intervention of online rumors spreading
NASA Astrophysics Data System (ADS)
Tian, Ru-Ya; Zhang, Xue-Fu; Liu, Yi-Jun
2015-06-01
SIR model is a classical model to simulate rumor spreading, while the supernetwork is an effective tool for modeling complex systems. Based on the Opinion SuperNetwork involving Social Sub-network, Environmental Sub-network, Psychological Sub-network, and Viewpoint Sub-network, drawing from the modeling idea of SIR model, this paper designs super SIC model (SSIC model) and its evolution rules, and also analyzes intervention effects on public opinion of four elements of supernetwork, which are opinion agent, opinion environment, agent's psychology and viewpoint. Studies show that, the SSIC model based on supernetwork has effective intervention effects on rumor spreading. It is worth noting that (i) identifying rumor spreaders in Social Sub-network and isolating them can achieve desired intervention results, (ii) improving environmental information transparency so that the public knows as much information as possible to reduce the rumors is a feasible way to intervene, (iii) persuading wavering neutrals has better intervention effects than clarifying rumors already spread everywhere, so rumors should be intervened in properly in time by psychology counseling.
Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks.
Jurdak, Raja; Nafaa, Abdelhamid; Barbirato, Alessio
2008-11-24
Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper.
Deployed Communications in an Austere Environment: A Delphi Study
2013-12-01
gateways to access the Global Information Grid ( GIG ) will escalate dramatically. The ability simply to “deploy” a unit similar to the RF- SATCOM network...experts had divergent views on how deployed communications systems would link back to the GIG . The scenario uses both projected technologies. First...the self-configuring RF-SATCOM network link acts as a gateway to the GIG , providing wireless RF connectivity to autho- rized devices within the area
A Research Program in Computer Technology. 1986 Annual Technical Report
1989-08-01
1986 (Annual Technical Report I July 1985 - June 1986 A Research Program in Computer Technology ISI/SR-87-178 U S C INFORMA-TION S C I EN C ES...Program in Computer Technology (Unclassified) 12. PERSONAL AUTHOR(S) 151 Research Staff 13a. TYPE OF REPORT 113b. TIME COVERED 14 DATE OF REPORT (Yeer...survivable networks 17. distributed processing, local networks, personal computers, workstation environment 18. computer acquisition, Strategic Computing 19
Airpower In The Information Age: Embracing TCP/IP Within Airborne Networks
2015-04-01
proved successful at seamlessly connecting large numbers of users to a vast array of applications. Airborne TCP/IP communication systems within DoD are...behind the development of next generation weapons systems. Admiral Fitzgerald recommends that the network architecture be developed and the...environment makes traditional ISR much more difficult and the military will need to rely on fifth- generation platforms like the F-35 that are able to
NASA Operational Environment Team (NOET) - NASA's key to environmental technology
NASA Technical Reports Server (NTRS)
Cook, Beth
1993-01-01
NOET is a NASA-wide team which supports the research and development community by sharing information both in person and via a computerized network, assisting in specification and standard revisions, developing cleaner propulsion systems, and exploring environmentally compliant alternatives to current processes. NOET's structure, dissemination of materials, electronic information, EPA compliance, specifications and standards, and environmental research and development are discussed.
ERIC Educational Resources Information Center
Cornelius, Amy; Macaluso, Paul
The Berry Informational Technology (B.I.T.S.) program at Berry College (Georgia) is an apprenticeship opportunity associated with student work. The program gives students the opportunity to seek technological training in areas, such as building computer systems, trouble-shooting, networking, Web development, and user and technical support. In…
NASA Astrophysics Data System (ADS)
Zhou, Changjiu; Meng, Qingchun; Guo, Zhongwen; Qu, Wiefen; Yin, Bo
2002-04-01
Robot learning in unstructured environments has been proved to be an extremely challenging problem, mainly because of many uncertainties always present in the real world. Human beings, on the other hand, seem to cope very well with uncertain and unpredictable environments, often relying on perception-based information. Furthermore, humans beings can also utilize perceptions to guide their learning on those parts of the perception-action space that are actually relevant to the task. Therefore, we conduct a research aimed at improving robot learning through the incorporation of both perception-based and measurement-based information. For this reason, a fuzzy reinforcement learning (FRL) agent is proposed in this paper. Based on a neural-fuzzy architecture, different kinds of information can be incorporated into the FRL agent to initialise its action network, critic network and evaluation feedback module so as to accelerate its learning. By making use of the global optimisation capability of GAs (genetic algorithms), a GA-based FRL (GAFRL) agent is presented to solve the local minima problem in traditional actor-critic reinforcement learning. On the other hand, with the prediction capability of the critic network, GAs can perform a more effective global search. Different GAFRL agents are constructed and verified by using the simulation model of a physical biped robot. The simulation analysis shows that the biped learning rate for dynamic balance can be improved by incorporating perception-based information on biped balancing and walking evaluation. The biped robot can find its application in ocean exploration, detection or sea rescue activity, as well as military maritime activity.
Sensor assignment to mission in AI-TECD
NASA Astrophysics Data System (ADS)
Ganger, Robert; de Mel, Geeth; Pham, Tien; Rudnicki, Ronald; Schreiber, Yonatan
2016-05-01
Sensor-mission assignment involves the allocation of sensors and other information-providing resources to missions in order to cover the information needs of the individual tasks within each mission. The importance of efficient and effective means to find appropriate resources for tasks is exacerbated in the coalition context where the operational environment is dynamic and a multitude of critically important tasks need to achieve their collective goals to meet the objectives of the coalition. The Sensor Assignment to Mission (SAM) framework—a research product of the International Technology Alliance in Network and Information Sciences (NIS-ITA) program—provided the first knowledge intensive resource selection approach for the sensor network domain so that contextual information could be used to effectively select resources for tasks in coalition environments. Recently, CUBRC, Inc. was tasked with operationalizing the SAM framework through the use of the I2WD Common Core Ontologies for the Communications-Electronics Research, Development and Engineering Center (CERDEC) sponsored Actionable Intelligence Technology Enabled Capabilities Demonstration (AI-TECD). The demonstration event took place at Fort Dix, New Jersey during July 2015, and this paper discusses the integration and the successful demonstration of the SAM framework within the AI-TECD, lessons learned, and its potential impact in future operations.
NASA Astrophysics Data System (ADS)
Smith, D. Brent; Williams, David F.; Fujita, Akihiro
The paper traces the development of the Committee on Earth Observation Satellites (CEOS) since its November 1990 Plenary: its restructuring to include major intergovernmental user and international scientific organizational affiliates; its focus on data sharing issues and completion of a CEOS resolution guaranteeing global change researchers access to satellite data at the cost of filling a user request; unfolding of a CEOS-associated initiative of the UK Prime Minister reporting to UNCED delegations on the relevance of satellite missions to the study of the global environment; development of a "Dossier" providing detailed information on all CEOS agency satellite missions, including sensor specifications, ground systems, standard data products, and other information relevant to users; creation of a permanent CEOS Secretariat; and efforts currently underway to assess the feasibility of a global satellite observation information network. Of particular relevance to developing countries, the paper will discuss CEOS efforts to assure broad user access and to foster acceptance of applications in such important areas as disaster monitoring and mitigation, land cover change, weather forecasting, and long-term climate modeling.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-12-15
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Thundercloud: Domain specific information security training for the smart grid
NASA Astrophysics Data System (ADS)
Stites, Joseph
In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.
Charbonneau, Deborah H
2016-08-01
While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.
Fate of Zinc and Silver Engineered Nanoparticles in Sewerage Networks
Engineered zinc oxide (ZnO) and silver (Ag) nanoparticles (NPs) used in consumer products are largely released into the environment through the wastewater stream. Limited information is available regarding the transformations they undergo during their transit through sewerage sy...
REVIEW OF THE RADNET AIR MONITORING NETWORK UPGRADE AND EXPANSION
RadNet, formerly known as ERAMS, has been operating since the 1970's, monitoring environmental radiation across the country, supporting responses to radiological emergencies, and providing important information on background levels of radiation in the environment. The original ...
Q&A: How do gene regulatory networks control environmental responses in plants?
Sun, Ying; Dinneny, José R
2018-04-11
A gene regulatory network (GRN) describes the hierarchical relationship between transcription factors, associated proteins, and their target genes. Studying GRNs allows us to understand how a plant's genotype and environment are integrated to regulate downstream physiological responses. Current efforts in plants have focused on defining the GRNs that regulate functions such as development and stress response and have been performed primarily in genetically tractable model plant species such as Arabidopsis thaliana. Future studies will likely focus on how GRNs function in non-model plants and change over evolutionary time to allow for adaptation to extreme environments. This broader understanding will inform efforts to engineer GRNs to create tailored crop traits.
A robust low-rate coding scheme for packet video
NASA Technical Reports Server (NTRS)
Chen, Y. C.; Sayood, Khalid; Nelson, D. J.; Arikan, E. (Editor)
1991-01-01
Due to the rapidly evolving field of image processing and networking, video information promises to be an important part of telecommunication systems. Although up to now video transmission has been transported mainly over circuit-switched networks, it is likely that packet-switched networks will dominate the communication world in the near future. Asynchronous transfer mode (ATM) techniques in broadband-ISDN can provide a flexible, independent and high performance environment for video communication. For this paper, the network simulator was used only as a channel in this simulation. Mixture blocking coding with progressive transmission (MBCPT) has been investigated for use over packet networks and has been found to provide high compression rate with good visual performance, robustness to packet loss, tractable integration with network mechanics and simplicity in parallel implementation.
NASA Astrophysics Data System (ADS)
Leon, Barbara D.; Heller, Paul R.
1987-05-01
A surveillance network is a group of multiplatform sensors cooperating to improve network performance. Network control is distributed as a measure to decrease vulnerability to enemy threat. The network may contain diverse sensor types such as radar, ESM (Electronic Support Measures), IRST (Infrared search and track) and E-0 (Electro-Optical). Each platform may contain a single sensor or suite of sensors. In a surveillance network it is desirable to control sensors to make the overall system more effective. This problem has come to be known as sensor management and control (SM&C). Two major facets of network performance are surveillance and survivability. In a netted environment, surveillance can be enhanced if information from all sensors is combined and sensor operating conditions are controlled to provide a synergistic effect. In contrast, when survivability is the main concern for the network, the best operating status for all sensors would be passive or off. Of course, improving survivability tends to degrade surveillance. Hence, the objective of SM&C is to optimize surveillance and survivability of the network. Too voluminous data of various formats and the quick response time are two characteristics of this problem which make it an ideal application for Artificial Intelligence. A solution to the SM&C problem, presented as a computer simulation, will be presented in this paper. The simulation is a hybrid production written in LISP and FORTRAN. It combines the latest conventional computer programming methods with Artificial Intelligence techniques to produce a flexible state-of-the-art tool to evaluate network performance. The event-driven simulation contains environment models coupled with an expert system. These environment models include sensor (track-while-scan and agile beam) and target models, local tracking, and system tracking. These models are used to generate the environment for the sensor management and control expert system. The expert system, driven by a forward chaining inference engine, makes decisions based on the global database. The global database contains current track and sensor information supplied by the simulation. At present, the rule base emphasizes the surveillance features with rules grouped into three main categories: maintenance and enhancing track on prioritized targets; filling coverage holes and countering jamming; and evaluating sensor status. The paper will describe the architecture used for the expert system and the reasons for selecting the chosen methods. The SM&C simulation produces a graphical representation of sensors and their associated tracks such that the benefits of the sensor management and control expert system are evident. Jammer locations are also part of the display. The paper will describe results from several scenarios that best illustrate the sensor management and control concepts.
Caudell, Thomas P; Xiao, Yunhai; Healy, Michael J
2003-01-01
eLoom is an open source graph simulation software tool, developed at the University of New Mexico (UNM), that enables users to specify and simulate neural network models. Its specification language and libraries enables users to construct and simulate arbitrary, potentially hierarchical network structures on serial and parallel processing systems. In addition, eLoom is integrated with UNM's Flatland, an open source virtual environments development tool to provide real-time visualizations of the network structure and activity. Visualization is a useful method for understanding both learning and computation in artificial neural networks. Through 3D animated pictorially representations of the state and flow of information in the network, a better understanding of network functionality is achieved. ART-1, LAPART-II, MLP, and SOM neural networks are presented to illustrate eLoom and Flatland's capabilities.
Semantic Visualization of Wireless Sensor Networks for Elderly Monitoring
NASA Astrophysics Data System (ADS)
Stocklöw, Carsten; Kamieth, Felix
In the area of Ambient Intelligence, Wireless Sensor Networks are commonly used for user monitoring purposes like health monitoring and user localization. Existing work on visualization of wireless sensor networks focuses mainly on displaying individual nodes and logical, graph-based topologies. This way, the relation to the real-world deployment is lost. This paper presents a novel approach for visualization of wireless sensor networks and interaction with complex services on the nodes. The environment is realized as a 3D model, and multiple nodes, that are worn by a single individual, are grouped together to allow an intuitive interface for end users. We describe application examples and show that our approach allows easier access to network information and functionality by comparing it with existing solutions.
Analysis of Malicious Traffic in Modbus/TCP Communications
NASA Astrophysics Data System (ADS)
Kobayashi, Tiago H.; Batista, Aguinaldo B.; Medeiros, João Paulo S.; Filho, José Macedo F.; Brito, Agostinho M.; Pires, Paulo S. Motta
This paper presents the results of our analysis about the influence of Information Technology (IT) malicious traffic on an IP-based automation environment. We utilized a traffic generator, called MACE (Malicious trAffic Composition Environment), to inject malicious traffic in a Modbus/TCP communication system and a sniffer to capture and analyze network traffic. The realized tests show that malicious traffic represents a serious risk to critical information infrastructures. We show that this kind of traffic can increase latency of Modbus/TCP communication and that, in some cases, can put Modbus/TCP devices out of communication.
Cutting the Stovepipes: An Improved Staff Model for the Modern Unified Commander
2001-04-01
quick to point out, their profit was the result of creating an environment that liberated people’s creativity , nurtured their commitment, and inspired...production networks, and telecommuting .”23 These businesses operate in an electronic world (vice physical) and are facilitated by an array of information...achieve the efficiencies and creativity businesses have gained in the virtual and reengineered environments, while at the same time retaining the
From genomics to chemical genomics: new developments in KEGG
Kanehisa, Minoru; Goto, Susumu; Hattori, Masahiro; Aoki-Kinoshita, Kiyoko F.; Itoh, Masumi; Kawashima, Shuichi; Katayama, Toshiaki; Araki, Michihiro; Hirakawa, Mika
2006-01-01
The increasing amount of genomic and molecular information is the basis for understanding higher-order biological systems, such as the cell and the organism, and their interactions with the environment, as well as for medical, industrial and other practical applications. The KEGG resource () provides a reference knowledge base for linking genomes to biological systems, categorized as building blocks in the genomic space (KEGG GENES) and the chemical space (KEGG LIGAND), and wiring diagrams of interaction networks and reaction networks (KEGG PATHWAY). A fourth component, KEGG BRITE, has been formally added to the KEGG suite of databases. This reflects our attempt to computerize functional interpretations as part of the pathway reconstruction process based on the hierarchically structured knowledge about the genomic, chemical and network spaces. In accordance with the new chemical genomics initiatives, the scope of KEGG LIGAND has been significantly expanded to cover both endogenous and exogenous molecules. Specifically, RPAIR contains curated chemical structure transformation patterns extracted from known enzymatic reactions, which would enable analysis of genome-environment interactions, such as the prediction of new reactions and new enzyme genes that would degrade new environmental compounds. Additionally, drug information is now stored separately and linked to new KEGG DRUG structure maps. PMID:16381885
NASA Astrophysics Data System (ADS)
Soeharwinto; Sinulingga, Emerson; Siregar, Baihaqi
2017-01-01
An accurate information can be useful for authorities to make good policies for preventive and mitigation after volcano eruption disaster. Monitoring of environmental parameters of post-eruption volcano provides an important information for authorities. Such monitoring system can be develop using the Wireless Network Sensor technology. Many application has been developed using the Wireless Sensor Network technology, such as floods early warning system, sun radiation mapping, and watershed monitoring. This paper describes the implementation of a remote environment monitoring system of mount Sinabung post-eruption. The system monitor three environmental parameters: soil condition, water quality and air quality (outdoor). Motes equipped with proper sensors, as components of the monitoring system placed in sample locations. The measured value from the sensors periodically sends to data server using 3G/GPRS communication module. The data can be downloaded by the user for further analysis.The measurement and data analysis results generally indicate that the environmental parameters in the range of normal/standard condition. The sample locations are safe for living and suitable for cultivation, but awareness is strictly required due to the uncertainty of Sinabung status.
Functional brain networks for learning predictive statistics.
Giorgio, Joseph; Karlaftis, Vasilis M; Wang, Rui; Shen, Yuan; Tino, Peter; Welchman, Andrew; Kourtzi, Zoe
2017-08-18
Making predictions about future events relies on interpreting streams of information that may initially appear incomprehensible. This skill relies on extracting regular patterns in space and time by mere exposure to the environment (i.e., without explicit feedback). Yet, we know little about the functional brain networks that mediate this type of statistical learning. Here, we test whether changes in the processing and connectivity of functional brain networks due to training relate to our ability to learn temporal regularities. By combining behavioral training and functional brain connectivity analysis, we demonstrate that individuals adapt to the environment's statistics as they change over time from simple repetition to probabilistic combinations. Further, we show that individual learning of temporal structures relates to decision strategy. Our fMRI results demonstrate that learning-dependent changes in fMRI activation within and functional connectivity between brain networks relate to individual variability in strategy. In particular, extracting the exact sequence statistics (i.e., matching) relates to changes in brain networks known to be involved in memory and stimulus-response associations, while selecting the most probable outcomes in a given context (i.e., maximizing) relates to changes in frontal and striatal networks. Thus, our findings provide evidence that dissociable brain networks mediate individual ability in learning behaviorally-relevant statistics. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Quality of service policy control in virtual private networks
NASA Astrophysics Data System (ADS)
Yu, Yiqing; Wang, Hongbin; Zhou, Zhi; Zhou, Dongru
2004-04-01
This paper studies the QoS of VPN in an environment where the public network prices connection-oriented services based on source, destination and grade of service, and advertises these prices to its VPN customers (users). As different QoS technologies can produce different QoS, there are according different traffic classification rules and priority rules. The internet service provider (ISP) may need to build complex mechanisms separately for each node. In order to reduce the burden of network configuration, we need to design policy control technologies. We considers mainly directory server, policy server, policy manager and policy enforcers. Policy decision point (PDP) decide its control according to policy rules. In network, policy enforce point (PEP) decide its network controlled unit. For InterServ and DiffServ, we will adopt different policy control methods as following: (1) In InterServ, traffic uses resource reservation protocol (RSVP) to guarantee the network resource. (2) In DiffServ, policy server controls the DiffServ code points and per hop behavior (PHB), its PDP distributes information to each network node. Policy server will function as following: information searching; decision mechanism; decision delivering; auto-configuration. In order to prove the effectiveness of QoS policy control, we make the corrective simulation.
NASA Technical Reports Server (NTRS)
Howes, Norman R.
1986-01-01
The Space Station DMS (Data Management System) is the onboard component of the Space Station Information System (SSIS) that includes the computers, networks and software that support the various core and payload subsystems of the Space Station. TAVERNS (Test And Validation Environment for Remote Networked Systems) is a distributed approach for development and validation of application software for Space Station. The TAVERNS concept assumes that the different subsystems will be developed by different contractors who may be geographically separated. The TAVERNS Emulator is an Ada simulation of a TAVERNS on the ASD VAX. The software services described in the DMS Test Bed User's Manual are being emulated on the VAX together with simulations of some of the core subsystems and a simulation of the DCN. The TAVERNS Emulator will be accessible remotely from any VAX that can communicate with the ASD VAX.
A remote instruction system empowered by tightly shared haptic sensation
NASA Astrophysics Data System (ADS)
Nishino, Hiroaki; Yamaguchi, Akira; Kagawa, Tsuneo; Utsumiya, Kouichi
2007-09-01
We present a system to realize an on-line instruction environment among physically separated participants based on a multi-modal communication strategy. In addition to visual and acoustic information, commonly used communication modalities in network environments, our system provides a haptic channel to intuitively conveying partners' sense of touch. The human touch sensation, however, is very sensitive for delays and jitters in the networked virtual reality (NVR) systems. Therefore, a method to compensate for such negative factors needs to be provided. We show an NVR architecture to implement a basic framework that can be shared by various applications and effectively deals with the problems. We take a hybrid approach to implement both data consistency by client-server and scalability by peer-to-peer models. As an application system built on the proposed architecture, a remote instruction system targeted at teaching handwritten characters and line patterns on a Korea-Japan high-speed research network also is mentioned.
Napolitano, Rebecca; Blyth, Anna; Glisic, Branko
2018-01-16
Visualization of sensor networks, data, and metadata is becoming one of the most pivotal aspects of the structural health monitoring (SHM) process. Without the ability to communicate efficiently and effectively between disparate groups working on a project, an SHM system can be underused, misunderstood, or even abandoned. For this reason, this work seeks to evaluate visualization techniques in the field, identify flaws in current practices, and devise a new method for visualizing and accessing SHM data and metadata in 3D. More precisely, the work presented here reflects a method and digital workflow for integrating SHM sensor networks, data, and metadata into a virtual reality environment by combining spherical imaging and informational modeling. Both intuitive and interactive, this method fosters communication on a project enabling diverse practitioners of SHM to efficiently consult and use the sensor networks, data, and metadata. The method is presented through its implementation on a case study, Streicker Bridge at Princeton University campus. To illustrate the efficiency of the new method, the time and data file size were compared to other potential methods used for visualizing and accessing SHM sensor networks, data, and metadata in 3D. Additionally, feedback from civil engineering students familiar with SHM is used for validation. Recommendations on how different groups working together on an SHM project can create SHM virtual environment and convey data to proper audiences, are also included.
Napolitano, Rebecca; Blyth, Anna; Glisic, Branko
2018-01-01
Visualization of sensor networks, data, and metadata is becoming one of the most pivotal aspects of the structural health monitoring (SHM) process. Without the ability to communicate efficiently and effectively between disparate groups working on a project, an SHM system can be underused, misunderstood, or even abandoned. For this reason, this work seeks to evaluate visualization techniques in the field, identify flaws in current practices, and devise a new method for visualizing and accessing SHM data and metadata in 3D. More precisely, the work presented here reflects a method and digital workflow for integrating SHM sensor networks, data, and metadata into a virtual reality environment by combining spherical imaging and informational modeling. Both intuitive and interactive, this method fosters communication on a project enabling diverse practitioners of SHM to efficiently consult and use the sensor networks, data, and metadata. The method is presented through its implementation on a case study, Streicker Bridge at Princeton University campus. To illustrate the efficiency of the new method, the time and data file size were compared to other potential methods used for visualizing and accessing SHM sensor networks, data, and metadata in 3D. Additionally, feedback from civil engineering students familiar with SHM is used for validation. Recommendations on how different groups working together on an SHM project can create SHM virtual environment and convey data to proper audiences, are also included. PMID:29337877
Design and Evaluation of a Proxy-Based Monitoring System for OpenFlow Networks.
Taniguchi, Yoshiaki; Tsutsumi, Hiroaki; Iguchi, Nobukazu; Watanabe, Kenzi
2016-01-01
Software-Defined Networking (SDN) has attracted attention along with the popularization of cloud environment and server virtualization. In SDN, the control plane and the data plane are decoupled so that the logical topology and routing control can be configured dynamically depending on network conditions. To obtain network conditions precisely, a network monitoring mechanism is necessary. In this paper, we focus on OpenFlow which is a core technology to realize SDN. We propose, design, implement, and evaluate a network monitoring system for OpenFlow networks. Our proposed system acts as a proxy between an OpenFlow controller and OpenFlow switches. Through experimental evaluations, we confirm that our proposed system can capture packets and monitor traffic information depending on administrator's configuration. In addition, we show that our proposed system does not influence significant performance degradation to overall network performance.
LinkMind: link optimization in swarming mobile sensor networks.
Ngo, Trung Dung
2011-01-01
A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.
LinkMind: Link Optimization in Swarming Mobile Sensor Networks
Ngo, Trung Dung
2011-01-01
A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation. PMID:22164070
Design and Evaluation of a Proxy-Based Monitoring System for OpenFlow Networks
Taniguchi, Yoshiaki; Tsutsumi, Hiroaki; Iguchi, Nobukazu; Watanabe, Kenzi
2016-01-01
Software-Defined Networking (SDN) has attracted attention along with the popularization of cloud environment and server virtualization. In SDN, the control plane and the data plane are decoupled so that the logical topology and routing control can be configured dynamically depending on network conditions. To obtain network conditions precisely, a network monitoring mechanism is necessary. In this paper, we focus on OpenFlow which is a core technology to realize SDN. We propose, design, implement, and evaluate a network monitoring system for OpenFlow networks. Our proposed system acts as a proxy between an OpenFlow controller and OpenFlow switches. Through experimental evaluations, we confirm that our proposed system can capture packets and monitor traffic information depending on administrator's configuration. In addition, we show that our proposed system does not influence significant performance degradation to overall network performance. PMID:27006977
Shorov, Andrey; Kotenko, Igor
2014-01-01
The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed procedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine necessary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.
A seamless ubiquitous emergency medical service for crisis situations.
Lin, Bor-Shing
2016-04-01
In crisis situations, a seamless ubiquitous communication is necessary to provide emergency medical service to save people's lives. An excellent prehospital emergency medicine provides immediate medical care to increase the survival rate of patients. On their way to the hospital, ambulance personnel must transmit real-time and uninterrupted patient information to the hospital to apprise the physician of the situation and provide options to the ambulance personnel. In emergency and crisis situations, many communication channels can be unserviceable because of damage to equipment or loss of power. Thus, data transmission over wireless communication to achieve uninterrupted network services is a major obstacle. This study proposes a mobile middleware for cognitive radio (CR) for improving the wireless communication link. CRs can sense their operating environment and optimize the spectrum usage so that the mobile middleware can integrate the existing wireless communication systems with a seamless communication service in heterogeneous network environments. Eventually, the proposed seamless mobile communication middleware was ported into an embedded system, which is compatible with the actual network environment without the need for changing the original system architecture. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Central Limit Theorem: New SOCR Applet and Demonstration Activity
ERIC Educational Resources Information Center
Dinov, Ivo D.; Christou, Nicholas; Sanchez, Juana
2008-01-01
Modern approaches for information technology based blended education utilize a variety of novel instructional, computational and network resources. Such attempts employ technology to deliver integrated, dynamically linked, interactive content and multi-faceted learning environments, which may facilitate student comprehension and information…
Network-Centric Operations Support: Lessons Learned, Status, and Way-Ahead
2014-06-01
34 Information Sharing Environment (ISE) Presentation, Enterprise Architecture Conference, 2011 (http://goveaconference.com/Events/2011/Sessions/ Tuesday ...cgi-bin/GetTRDoc?AD=ADA525312) [35] Morris , Michael, et al. Widget and Mobile Technologies a Forcing Function for Acquisition Change: Paradigm Shift
Online Social Media in Crisis Events
ERIC Educational Resources Information Center
Palen, Leysia
2008-01-01
As social media--which includes blogs, social networking environments, person-to-person and broadcast messaging, and other Web 2.0 applications--becomes more pervasive, their use has significant implications for emergency management practice and policy. Information and communication technology (ICT) enables people--disaster survivors, curious…
Networks: The Telecommunications Infrastructure and Impacts of Change.
ERIC Educational Resources Information Center
Learn, Larry L.
1988-01-01
This overview of the telecommunications environment discusses: (1) influences of technology, economics, politics, and government; (2) legal separations and jurisdictions; (3) pricing policies; and (4) bypass of local facilities. Probable changes and impacts on national and local information servers, local telecommunications carriers, and…
Learning To Live with Complexity.
ERIC Educational Resources Information Center
Dosa, Marta
Neither the design of information systems and networks nor the delivery of library services can claim true user centricity without an understanding of the multifaceted psychological environment of users and potential users. The complexity of the political process, social problems, challenges to scientific inquiry, entrepreneurship, and…
ERIC Educational Resources Information Center
Pence, Harry E.
2012-01-01
The media environment is currently being dramatically changed by social networking, mobile computing, augmented reality, and transmedia. Of these four, transmedia is probably the least familiar to most educators. Transmedia enhances a central story idea with a variety of media components that provide additional information, give increased…
2011-04-01
a ‘strategy as process’ manner to develop capabilities that are flexible, adaptable and robust. 3.4 Future structures The need for agile...to develop models of the future security environment 3.4.10 Planning Under Deep Uncertainty Future structures The need for agile, flexible and... Organisation NEC Network Enabled Capability NGO Non Government Organisation NII Networking and Information Infrastructure PVO Private Voluntary
2014-09-01
and 20 “live” tweets were injected into the scenario itself 1 alternative power demonstration ( wind and solar) accomplished 7 remote wireless ...solved this issue. 2. Hastily Formed Networks (HFN) Alternative power sources were set up:RENEWS–a wind turbine , flexible solar panels, rigid...297 WORKS CONSULTED Akyildiz, I. (2011). Sensor networks in challenged environments. Wireless Technologies for Humanitarian Relief, 3(3).doi
The C2 Workstation and Data Replication over Disadvantaged Tactical Communication Links
2007-09-01
person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 14 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...PUBLIC RELEASE C2WS Physical Environment Zodiac Network Radio Network Combat Level Node (Vehicle) Radio Local Store Local Store Local Store To Other
The future of microarray technology: networking the genome search.
D'Ambrosio, C; Gatta, L; Bonini, S
2005-10-01
In recent years microarray technology has been increasingly used in both basic and clinical research, providing substantial information for a better understanding of genome-environment interactions responsible for diseases, as well as for their diagnosis and treatment. However, in genomic research using microarray technology there are several unresolved issues, including scientific, ethical and legal issues. Networks of excellence like GA(2)LEN may represent the best approach for teaching, cost reduction, data repositories, and functional studies implementation.
Implementation of a Prototype Generalized Network Technology for Hospitals *
Tolchin, S. G.; Stewart, R. L.; Kahn, S. A.; Bergan, E. S.; Gafke, G. P.; Simborg, D. W.; Whiting-O'Keefe, Q. E.; Chadwick, M. G.; McCue, G. E.
1981-01-01
A demonstration implementation of a distributed data processing hospital information system using an intelligent local area communications network (LACN) technology is described. This system is operational at the UCSF Medical Center and integrates four heterogeneous, stand-alone minicomputers. The applications systems are PID/Registration, Outpatient Pharmacy, Clinical Laboratory and Radiology/Medical Records. Functional autonomy of these systems has been maintained, and no operating system changes have been required. The LACN uses a fiber-optic communications medium and provides extensive communications protocol support within the network, based on the ISO/OSI Model. The architecture is reconfigurable and expandable. This paper describes system architectural issues, the applications environment and the local area network.
Forecasting Electric Power Generation of Photovoltaic Power System for Energy Network
NASA Astrophysics Data System (ADS)
Kudo, Mitsuru; Takeuchi, Akira; Nozaki, Yousuke; Endo, Hisahito; Sumita, Jiro
Recently, there has been an increase in concern about the global environment. Interest is growing in developing an energy network by which new energy systems such as photovoltaic and fuel cells generate power locally and electric power and heat are controlled with a communications network. We developed the power generation forecast method for photovoltaic power systems in an energy network. The method makes use of weather information and regression analysis. We carried out forecasting power output of the photovoltaic power system installed in Expo 2005, Aichi Japan. As a result of comparing measurements with a prediction values, the average prediction error per day was about 26% of the measured power.
Kestens, Yan; Chaix, Basile; Gerber, Philippe; Desprès, Michel; Gauvin, Lise; Klein, Olivier; Klein, Sylvain; Köppen, Bernhard; Lord, Sébastien; Naud, Alexandre; Payette, Hélène; Richard, Lucie; Rondier, Pierre; Shareck, Martine; Sueur, Cédric; Thierry, Benoit; Vallée, Julie; Wasfi, Rania
2016-05-05
Given the challenges of aging populations, calls have been issued for more sustainable urban re-development and implementation of local solutions to address global environmental and healthy aging issues. However, few studies have considered older adults' daily mobility to better understand how local built and social environments may contribute to healthy aging. Meanwhile, wearable sensors and interactive map-based applications offer novel means for gathering information on people's mobility, levels of physical activity, or social network structure. Combining such data with classical questionnaires on well-being, physical activity, perceived environments and qualitative assessment of experience of places opens new opportunities to assess the complex interplay between individuals and environments. In line with current gaps and novel analytical capabilities, this research proposes an international research agenda to collect and analyse detailed data on daily mobility, social networks and health outcomes among older adults using interactive web-based questionnaires and wearable sensors. Our study resorts to a battery of innovative data collection methods including use of a novel multisensor device for collection of location and physical activity, interactive map-based questionnaires on regular destinations and social networks, and qualitative assessment of experience of places. This rich data will allow advanced quantitative and qualitative analyses in the aim to disentangle the complex people-environment interactions linking urban local contexts to healthy aging, with a focus on active living, social networks and participation, and well-being. This project will generate evidence about what characteristics of urban environments relate to active mobility, social participation, and well-being, three important dimensions of healthy aging. It also sets the basis for an international research agenda on built environment and healthy aging based on a shared and comprehensive data collection protocol.
Networked information: Management issues for the acquisitions librarian
NASA Technical Reports Server (NTRS)
Lawrence, Gregory
1994-01-01
Historically, libraries have been the depositories and public access points to both domestic and international government information. A change in the information seeking behavior of the public is driving a change in government information publishing and dissemination. Patrons who traditionally used libraries for access to printed government information have become familiar and comfortable with the electronic environment. These data users are showing an increased interest in certain types of government information in electronic format, including indexes, numeric files, statistics, and hypertext documents. Government response to increased demand for electronic information has led to a flurry of special initiatives, with the production of information products on diskette, CD-ROM, and dissemination via the Internet. Libraries, and acquisitions units in particular, are being challenged to provide consistent and timely management of the information. The rapidly developing communications infrastructure, which frequently redesigns access to the information environment, poses significant obstacles to, and the tremendous opportunities for, making large bodies of government information available to a broad base of users.
2010-07-01
level information including: 1) previously collected geographic information systems (GIS) data about the social and built environment; and 2...of interest (discrimination), we also identified several other domains of interest to include in the questionnaire: stress, coping, social support...and social networks, social burden, patient-provider communication, cultural factors and beliefs, cultural health capital, sociodemographics
Albornoz, Facundo; Cole, Matthew A; Elliott, Robert J R; Ercolani, Marco G
2014-12-15
In the light of climate uncertainty and growing concern for the natural environment, an increasingly important aspect of global business is the environmental behaviour of firms. In this paper we consider the factors that influence firms' environmental actions (EAs). Our study of Argentinean firms concentrates on measures of environmental spillovers, informal and formal networks and absorptive capacity by testing four related hypotheses. We find that foreign-owned firms, large firms and those with a greater capacity to assimilate new environmental technologies are more likely to adopt EAs. We also show that formal and informal networks aid the adoption of EAs in the presence of traditional firm-level spillovers. Finally, we show that foreign-owned firms have different motives to domestic firms for undertaking EAs. Copyright © 2014 Elsevier Ltd. All rights reserved.
The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2015-01-01
This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.
A Game Theory Based Solution for Security Challenges in CRNs
NASA Astrophysics Data System (ADS)
Poonam; Nagpal, Chander Kumar
2018-03-01
Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.
Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network
NASA Astrophysics Data System (ADS)
Friedlander, David; Griffin, Christopher; Jacobson, Noah; Phoha, Shashi; Brooks, Richard R.
2003-12-01
Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.
Information-theoretic decomposition of embodied and situated systems.
Da Rold, Federico
2018-07-01
The embodied and situated view of cognition stresses the importance of real-time and nonlinear bodily interaction with the environment for developing concepts and structuring knowledge. In this article, populations of robots controlled by an artificial neural network learn a wall-following task through artificial evolution. At the end of the evolutionary process, time series are recorded from perceptual and motor neurons of selected robots. Information-theoretic measures are estimated on pairings of variables to unveil nonlinear interactions that structure the agent-environment system. Specifically, the mutual information is utilized to quantify the degree of dependence and the transfer entropy to detect the direction of the information flow. Furthermore, the system is analyzed with the local form of such measures, thus capturing the underlying dynamics of information. Results show that different measures are interdependent and complementary in uncovering aspects of the robots' interaction with the environment, as well as characteristics of the functional neural structure. Therefore, the set of information-theoretic measures provides a decomposition of the system, capturing the intricacy of nonlinear relationships that characterize robots' behavior and neural dynamics. Copyright © 2018 Elsevier Ltd. All rights reserved.
Learning to Predict Consequences as a Method of Knowledge Transfer in Reinforcement Learning.
Chalmers, Eric; Contreras, Edgar Bermudez; Robertson, Brandon; Luczak, Artur; Gruber, Aaron
2017-04-17
The reinforcement learning (RL) paradigm allows agents to solve tasks through trial-and-error learning. To be capable of efficient, long-term learning, RL agents should be able to apply knowledge gained in the past to new tasks they may encounter in the future. The ability to predict actions' consequences may facilitate such knowledge transfer. We consider here domains where an RL agent has access to two kinds of information: agent-centric information with constant semantics across tasks, and environment-centric information, which is necessary to solve the task, but with semantics that differ between tasks. For example, in robot navigation, environment-centric information may include the robot's geographic location, while agent-centric information may include sensor readings of various nearby obstacles. We propose that these situations provide an opportunity for a very natural style of knowledge transfer, in which the agent learns to predict actions' environmental consequences using agent-centric information. These predictions contain important information about the affordances and dangers present in a novel environment, and can effectively transfer knowledge from agent-centric to environment-centric learning systems. Using several example problems including spatial navigation and network routing, we show that our knowledge transfer approach can allow faster and lower cost learning than existing alternatives.
High-Surety Telemedicine in a Distributed, 'Plug-andPlan' Environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craft, Richard L.; Funkhouser, Donald R.; Gallagher, Linda K.
1999-05-17
Commercial telemedicine systems are increasingly functional, incorporating video-conferencing capabilities, diagnostic peripherals, medication reminders, and patient education services. However, these systems (1) rarely utilize information architectures which allow them to be easily integrated with existing health information networks and (2) do not always protect patient confidentiality with adequate security mechanisms. Using object-oriented methods and software wrappers, we illustrate the transformation of an existing stand-alone telemedicine system into `plug-and-play' components that function in a distributed medical information environment. We show, through the use of open standards and published component interfaces, that commercial telemedicine offerings which were once incompatible with electronic patient recordmore » systems can now share relevant data with clinical information repositories while at the same time hiding the proprietary implementations of the respective systems. Additionally, we illustrate how leading-edge technology can secure this distributed telemedicine environment, maintaining patient confidentiality and the integrity of the associated electronic medical data. Information surety technology also encourages the development of telemedicine systems that have both read and write access to electronic medical records containing patient-identifiable information. The win-win approach to telemedicine information system development preserves investments in legacy software and hardware while promoting security and interoperability in a distributed environment.« less
Semantic integration of data on transcriptional regulation
Baitaluk, Michael; Ponomarenko, Julia
2010-01-01
Motivation: Experimental and predicted data concerning gene transcriptional regulation are distributed among many heterogeneous sources. However, there are no resources to integrate these data automatically or to provide a ‘one-stop shop’ experience for users seeking information essential for deciphering and modeling gene regulatory networks. Results: IntegromeDB, a semantic graph-based ‘deep-web’ data integration system that automatically captures, integrates and manages publicly available data concerning transcriptional regulation, as well as other relevant biological information, is proposed in this article. The problems associated with data integration are addressed by ontology-driven data mapping, multiple data annotation and heterogeneous data querying, also enabling integration of the user's data. IntegromeDB integrates over 100 experimental and computational data sources relating to genomics, transcriptomics, genetics, and functional and interaction data concerning gene transcriptional regulation in eukaryotes and prokaryotes. Availability: IntegromeDB is accessible through the integrated research environment BiologicalNetworks at http://www.BiologicalNetworks.org Contact: baitaluk@sdsc.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:20427517
Wireless technology applied to GIS
NASA Astrophysics Data System (ADS)
Casademont, Jordi; Lopez-Aguilera, Elena; Paradells, Josep; Rojas, Alfonso; Calveras, Anna; Barceló, Francisco; Cotrina, Josep
2004-07-01
At present, there is a growing interest in wireless applications, due to the fact that the technology begins to support them at reasonable costs. In this paper, we present the technology currently available for use in wireless environments, focusing on Geographic Information Systems. As an example, we present a newly developed platform for the commercialization of advanced geographical information services for use in portable devices. This platform uses available mobile telephone networks and wireless local area networks, but it is completely scalable to new technologies such as third generation mobile networks. Users access the service using a vector map player that runs on a Personal Digital Assistant with wireless access facilities and a Global Positioning System receiver. Before accessing the information, the player will request authorization from the server and download the requested map from it, if necessary. The platform also includes a system for improving Global Positioning System localization with the Real Time Differential Global Positioning System, which uses short GSM messages as the transmission medium.
Source-Adaptation-Based Wireless Video Transport: A Cross-Layer Approach
NASA Astrophysics Data System (ADS)
Qu, Qi; Pei, Yong; Modestino, James W.; Tian, Xusheng
2006-12-01
Real-time packet video transmission over wireless networks is expected to experience bursty packet losses that can cause substantial degradation to the transmitted video quality. In wireless networks, channel state information is hard to obtain in a reliable and timely manner due to the rapid change of wireless environments. However, the source motion information is always available and can be obtained easily and accurately from video sequences. Therefore, in this paper, we propose a novel cross-layer framework that exploits only the motion information inherent in video sequences and efficiently combines a packetization scheme, a cross-layer forward error correction (FEC)-based unequal error protection (UEP) scheme, an intracoding rate selection scheme as well as a novel intraframe interleaving scheme. Our objective and subjective results demonstrate that the proposed approach is very effective in dealing with the bursty packet losses occurring on wireless networks without incurring any additional implementation complexity or delay. Thus, the simplicity of our proposed system has important implications for the implementation of a practical real-time video transmission system.
A mobile mapping system for spatial information based on DGPS/EGIS
NASA Astrophysics Data System (ADS)
Pei, Ling; Wang, Qing; Gu, Juan
2007-11-01
With the rapid developments of mobile device and wireless communication, it brings a new challenge for acquiring the spatial information. A mobile mapping system based on differential global position system (DGPS) integrated with embedded geographic information system (EGIS) is designed. A mobile terminal adapts to various GPS differential environments such as single base mode and network GPS mode like Virtual Reference Station (VRS) and Master- Auxiliary Concept (MAC) by the mobile communication technology. The spatial information collected through DGPS is organized in an EGIS running in the embedded device. A set of mobile terminal in real-time DGPS based on GPRS adopting multithreading technique of serial port in manner of simulating overlapped I/O operating is developed, further more, the GPS message analysis and checkout based on Strategy Pattern for various receivers are included in the process of development. A mobile terminal accesses to the GPS network successfully by NTRIP (Networked Transport of RTCM via Internet Protocol) compliance. Finally, the accuracy and reliability of the mobile mapping system are proved by a lot of testing in 9 provinces all over the country.
Lessons learned in building a global information network on chemicals (GINC).
Kaminuma, Tsuguchika
2005-09-01
The Global Information Network on Chemicals (GINC) was a project to construct a worldwide information network linking international, national, and other organizations working for the safe management of chemicals. Proposed in 1993, the project started the next year and lasted almost 10 years. It was begun as a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP), and later endorsed by the Intergovernmental Forum on Chemical Safety (IFCS). Asia, particularly East Asia and the Pacific islands, was chosen as the feasibility study region. The author's group then at the National Institute of Health Sciences (NIHS) of Japan led this initiative and hosted numerous meetings. At these meetings, tutorial sessions for communicating chemical safety expertise and emerging new information technologies relevant to the safe management of chemicals were offered. Our experience with this project, particularly the Web-based system and the tutorial sessions, may be of use to others involved with Web-based instruction and the training of chemical safety specialists from both developed and developing countries.
Structure and formation of ant transportation networks
Latty, Tanya; Ramsch, Kai; Ito, Kentaro; Nakagaki, Toshiyuki; Sumpter, David J. T.; Middendorf, Martin; Beekman, Madeleine
2011-01-01
Many biological systems use extensive networks for the transport of resources and information. Ants are no exception. How do biological systems achieve efficient transportation networks in the absence of centralized control and without global knowledge of the environment? Here, we address this question by studying the formation and properties of inter-nest transportation networks in the Argentine ant (Linepithema humile). We find that the formation of inter-nest networks depends on the number of ants involved in the construction process. When the number of ants is sufficient and networks do form, they tend to have short total length but a low level of robustness. These networks are topologically similar to either minimum spanning trees or Steiner networks. The process of network formation involves an initial construction of multiple links followed by a pruning process that reduces the number of trails. Our study thus illuminates the conditions under and the process by which minimal biological transport networks can be constructed. PMID:21288958
Emerging computer technologies and the news media of the future
NASA Technical Reports Server (NTRS)
Vrabel, Debra A.
1993-01-01
The media environment of the future may be dramatically different from what exists today. As new computing and communications technologies evolve and synthesize to form a global, integrated communications system of networks, public domain hardware and software, and consumer products, it will be possible for citizens to fulfill most information needs at any time and from any place, to obtain desired information easily and quickly, to obtain information in a variety of forms, and to experience and interact with information in a variety of ways. This system will transform almost every institution, every profession, and every aspect of human life--including the creation, packaging, and distribution of news and information by media organizations. This paper presents one vision of a 21st century global information system and how it might be used by citizens. It surveys some of the technologies now on the market that are paving the way for new media environment.
Mobility in hospital work: towards a pervasive computing hospital environment.
Morán, Elisa B; Tentori, Monica; González, Víctor M; Favela, Jesus; Martínez-Garcia, Ana I
2007-01-01
Handheld computers are increasingly being used by hospital workers. With the integration of wireless networks into hospital information systems, handheld computers can provide the basis for a pervasive computing hospital environment; to develop this designers need empirical information to understand how hospital workers interact with information while moving around. To characterise the medical phenomena we report the results of a workplace study conducted in a hospital. We found that individuals spend about half of their time at their base location, where most of their interactions occur. On average, our informants spent 23% of their time performing information management tasks, followed by coordination (17.08%), clinical case assessment (15.35%) and direct patient care (12.6%). We discuss how our results offer insights for the design of pervasive computing technology, and directions for further research and development in this field such as transferring information between heterogeneous devices and integration of the physical and digital domains.
2015-02-01
networking provides 24-hour access to data and information between friends and strangers alike. Technology also has played a significant role in the world’s...economic environment, many or- ganizations look at cyber budgets as areas to cut back. And many top-level managers and members of the acquisition
Home Learning, Technology, and Tomorrow's Workplace.
ERIC Educational Resources Information Center
Rieseberg, Rhonda L.
1995-01-01
Discusses characteristics and trends of home schools and workplaces. Use of computers and computer applications (CD-ROMS, interactive software, and networking) in home schooling provides a compatible environment for future home-based businesses and telecommuting trends. Sidebars include information on home schools on line; standardized test…
Technology Options for Libraries. ERIC Digest.
ERIC Educational Resources Information Center
Schamber, Linda
This two-page digest briefly outlines some of the technological trends in updating a library, and briefly discusses the administrative issues and strategies involved. It begins by describing the wholly integrated information environment, which would include: (1) public-access personal and professional communications networks; (2) information…
Trends in Transforming Scholarly Communication and Their Implications.
ERIC Educational Resources Information Center
Liu, Ziming
2003-01-01
Explores trends in transforming scholarly publishing and possible implications for electronic publishing and digital libraries. Topics include changes in collaborative research; changes in volume of information production; and age of cited documents and how older documents are used in today's network environment. (Author/LRW)
Organizational Effectiveness in Higher Education: Faculty Informal Structure as Social Capital
ERIC Educational Resources Information Center
Dose, Jennifer J.
2012-01-01
Higher education institutions encounter complex external environments, requiring increasing responsiveness and innovation. Research on social capital has demonstrated that highly connected employee relational networks are more creative, effective, and exhibit higher member satisfaction. The present study examines one college to demonstrate how…
78 FR 23329 - Aircraft Access to SWIM Working Group Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-18
... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Aircraft Access to SWIM Working Group... in FAA NextGen technologies to attend and participate in an Aircraft Access to SWIM Working Group... information environment. The AAtS initiative will utilize commercial air/ground network providers...
Signaling Network of Environmental Sensing and Adaptation in Plants:. Key Roles of Calcium Ion
NASA Astrophysics Data System (ADS)
Kurusu, Takamitsu; Kuchitsu, Kazuyuki
2011-01-01
Considering the important issues concerning food, environment, and energy that humans are facing in the 21st century, humans mostly depend on plants. Unlike animals which move from an inappropriate environment, plants do not move, but rapidly sense diverse environmental changes or invasion by other organisms such as pathogens and insects in the place they root, and adapt themselves by changing their own bodies, through which they developed adaptability. Whole genetic information corresponding to the blueprints of many biological systems has recently been analyzed, and comparative genomic studies facilitated tracing strategies of each organism in their evolutional processes. Comparison of factors involved in intracellular signal transduction between animals and plants indicated diversification of different gene sets. Reversible binding of Ca2+ to sensor proteins play key roles as a molecular switch both in animals and plants. Molecular mechanisms for signaling network of environmental sensing and adaptation in plants will be discussed with special reference to Ca2+ as a key element in information processing.
Filippoupolitis, Avgoustinos; Oliff, William; Takand, Babak; Loukas, George
2017-05-27
Activity recognition in indoor spaces benefits context awareness and improves the efficiency of applications related to personalised health monitoring, building energy management, security and safety. The majority of activity recognition frameworks, however, employ a network of specialised building sensors or a network of body-worn sensors. As this approach suffers with respect to practicality, we propose the use of commercial off-the-shelf devices. In this work, we design and evaluate an activity recognition system composed of a smart watch, which is enhanced with location information coming from Bluetooth Low Energy (BLE) beacons. We evaluate the performance of this approach for a variety of activities performed in an indoor laboratory environment, using four supervised machine learning algorithms. Our experimental results indicate that our location-enhanced activity recognition system is able to reach a classification accuracy ranging from 92% to 100%, while without location information classification accuracy it can drop to as low as 50% in some cases, depending on the window size chosen for data segmentation.
Secure dissemination of electronic healthcare records in distributed wireless environments.
Belsis, Petros; Vassis, Dimitris; Skourlas, Christos; Pantziou, Grammati
2008-01-01
A new networking paradigm has emerged with the appearance of wireless computing. Among else ad-hoc networks, mobile and ubiquitous environments can boost the performance of systems in which they get applied. Among else, medical environments are a convenient example of their applicability. With the utilisation of wireless infrastructures, medical data may be accessible to healthcare practitioners, enabling continuous access to medical data. Due to the critical nature of medical information, the design and implementation of these infrastructures demands special treatment in order to meet specific requirements; among else, special care should be taken in order to manage interoperability, security, and in order to deal with bandwidth and hardware resource constraints that characterize the wireless topology. In this paper we present an architecture that attempts to deal with these issues; moreover, in order to prove the validity of our approach we have also evaluated the performance of our platform through simulation in different operating scenarios.
Secure Large-Scale Airport Simulations Using Distributed Computational Resources
NASA Technical Reports Server (NTRS)
McDermott, William J.; Maluf, David A.; Gawdiak, Yuri; Tran, Peter; Clancy, Dan (Technical Monitor)
2001-01-01
To fully conduct research that will support the far-term concepts, technologies and methods required to improve the safety of Air Transportation a simulation environment of the requisite degree of fidelity must first be in place. The Virtual National Airspace Simulation (VNAS) will provide the underlying infrastructure necessary for such a simulation system. Aerospace-specific knowledge management services such as intelligent data-integration middleware will support the management of information associated with this complex and critically important operational environment. This simulation environment, in conjunction with a distributed network of supercomputers, and high-speed network connections to aircraft, and to Federal Aviation Administration (FAA), airline and other data-sources will provide the capability to continuously monitor and measure operational performance against expected performance. The VNAS will also provide the tools to use this performance baseline to obtain a perspective of what is happening today and of the potential impact of proposed changes before they are introduced into the system.
Calibration Testing of Network Tap Devices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Popovsky, Barbara; Chee, Brian; Frincke, Deborah A.
2007-11-14
Abstract: Understanding the behavior of network forensic devices is important to support prosecutions of malicious conduct on computer networks as well as legal remedies for false accusations of network management negligence. Individuals who seek to establish the credibility of network forensic data must speak competently about how the data was gathered and the potential for data loss. Unfortunately, manufacturers rarely provide information about the performance of low-layer network devices at a level that will survive legal challenges. This paper proposes a first step toward an independent calibration standard by establishing a validation testing methodology for evaluating forensic taps against manufacturermore » specifications. The methodology and the theoretical analysis that led to its development are offered as a conceptual framework for developing a standard and to "operationalize" network forensic readiness. This paper also provides details of an exemplar test, testing environment, procedures and results.« less
NASA Communications Augmentation network
NASA Technical Reports Server (NTRS)
Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.
1990-01-01
The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.
Rube, Kate; Veatch, Maggie; Huang, Katy; Lent, Megan; Goldstein, Gail P.; Lee, Karen K.
2014-01-01
Local health departments (LHDs) have a key role to play in developing built environment policies and programs to encourage physical activity and combat obesity and related chronic diseases. However, information to guide LHDs’ effective engagement in this arena is lacking. During 2011–2012, the New York City Department of Health and Mental Hygiene (DOHMH) facilitated a built environment peer mentoring program for 14 LHDs nationwide. Program objectives included supporting LHDs in their efforts to achieve built environment goals, offering examples from DOHMH’s built environment work to guide LHDs, and building a healthy built environment learning network. We share lessons learned that can guide LHDs in developing successful healthy built environment agendas. PMID:24625166
Optimal route discovery for soft QOS provisioning in mobile ad hoc multimedia networks
NASA Astrophysics Data System (ADS)
Huang, Lei; Pan, Feng
2007-09-01
In this paper, we propose an optimal routing discovery algorithm for ad hoc multimedia networks whose resource keeps changing, First, we use stochastic models to measure the network resource availability, based on the information about the location and moving pattern of the nodes, as well as the link conditions between neighboring nodes. Then, for a certain multimedia packet flow to be transmitted from a source to a destination, we formulate the optimal soft-QoS provisioning problem as to find the best route that maximize the probability of satisfying its desired QoS requirements in terms of the maximum delay constraints. Based on the stochastic network resource model, we developed three approaches to solve the formulated problem: A centralized approach serving as the theoretical reference, a distributed approach that is more suitable to practical real-time deployment, and a distributed dynamic approach that utilizes the updated time information to optimize the routing for each individual packet. Examples of numerical results demonstrated that using the route discovered by our distributed algorithm in a changing network environment, multimedia applications could achieve better QoS statistically.
NASA Astrophysics Data System (ADS)
Zhao, Lei; Wang, Zengcai; Wang, Xiaojin; Qi, Yazhou; Liu, Qing; Zhang, Guoxin
2016-09-01
Human fatigue is an important cause of traffic accidents. To improve the safety of transportation, we propose, in this paper, a framework for fatigue expression recognition using image-based facial dynamic multi-information and a bimodal deep neural network. First, the landmark of face region and the texture of eye region, which complement each other in fatigue expression recognition, are extracted from facial image sequences captured by a single camera. Then, two stacked autoencoder neural networks are trained for landmark and texture, respectively. Finally, the two trained neural networks are combined by learning a joint layer on top of them to construct a bimodal deep neural network. The model can be used to extract a unified representation that fuses landmark and texture modalities together and classify fatigue expressions accurately. The proposed system is tested on a human fatigue dataset obtained from an actual driving environment. The experimental results demonstrate that the proposed method performs stably and robustly, and that the average accuracy achieves 96.2%.
NASA Technical Reports Server (NTRS)
Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.
2006-01-01
Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.
A Bayesian network to predict vulnerability to sea-level rise: data report
Gutierrez, Benjamin T.; Plant, Nathaniel G.; Thieler, E. Robert
2011-01-01
During the 21st century, sea-level rise is projected to have a wide range of effects on coastal environments, development, and infrastructure. Consequently, there has been an increased focus on developing modeling or other analytical approaches to evaluate potential impacts to inform coastal management. This report provides the data that were used to develop and evaluate the performance of a Bayesian network designed to predict long-term shoreline change due to sea-level rise. The data include local rates of relative sea-level rise, wave height, tide range, geomorphic classification, coastal slope, and shoreline-change rate compiled as part of the U.S. Geological Survey Coastal Vulnerability Index for the U.S. Atlantic coast. In this project, the Bayesian network is used to define relationships among driving forces, geologic constraints, and coastal responses. Using this information, the Bayesian network is used to make probabilistic predictions of shoreline change in response to different future sea-level-rise scenarios.
NASA Operational Environment Team (NOET): NASA's key to environmental technology
NASA Technical Reports Server (NTRS)
Cook, Beth
1993-01-01
NASA has stepped forward to face the environmental challenge to eliminate the use of Ozone-Layer Depleting Substances (OLDS) and to reduce our Hazardous Air Pollutants (HAP) by 50 percent in 1995. These requirements have been issued by the Clean Air Act, the Montreal Protocol, and various other legislative acts. A proactive group, the NASA Operational Environment Team or NOET, received its charter in April 1992 and was tasked with providing a network through which replacement activities and development experiences can be shared. This is a NASA-wide team which supports the research and development community by sharing information both in person and via a computerized network, assisting in specification and standard revisions, developing cleaner propulsion systems, and exploring environmentally-compliant alternatives to current processes.
NASA Technical Reports Server (NTRS)
Noor, Ahmed K. (Compiler)
2003-01-01
An overview of the advanced learning technologies is given in this presentation along with a brief description of their impact on future aerospace workforce development. The presentation is divided into five parts (see Figure 1). In the first part, a brief historical account of the evolution of learning technologies is given. The second part describes the current learning activities. The third part describes some of the future aerospace systems, as examples of high-tech engineering systems, and lists their enabling technologies. The fourth part focuses on future aerospace research, learning and design environments. The fifth part lists the objectives of the workshop and some of the sources of information on learning technologies and learning networks.
Frisch, Noreen; Atherton, Pat; Borycki, Elizabeth; Mickelson, Grace; Cordeiro, Jennifer; Novak Lauscher, Helen; Black, Agnes
2014-02-21
Use of Web 2.0 and social media technologies has become a new area of research among health professionals. Much of this work has focused on the use of technologies for health self-management and the ways technologies support communication between care providers and consumers. This paper addresses a new use of technology in providing a platform for health professionals to support professional development, increase knowledge utilization, and promote formal/informal professional communication. Specifically, we report on factors necessary to attract and sustain health professionals' use of a network designed to increase nurses' interest in and use of health services research and to support knowledge utilization activities in British Columbia, Canada. "InspireNet", a virtual professional network for health professionals, is a living laboratory permitting documentation of when and how professionals take up Web 2.0 and social media. Ongoing evaluation documents our experiences in establishing, operating, and evaluating this network. Overall evaluation methods included (1) tracking website use, (2) conducting two member surveys, and (3) soliciting member feedback through focus groups and interviews with those who participated in electronic communities of practice (eCoPs) and other stakeholders. These data have been used to learn about the types of support that seem relevant to network growth. Network growth exceeded all expectations. Members engaged with varying aspects of the network's virtual technologies, such as teams of professionals sharing a common interest, research teams conducting their work, and instructional webinars open to network members. Members used wikis, blogs, and discussion groups to support professional work, as well as a members' database with contact information and areas of interest. The database is accessed approximately 10 times per day. InspireNet public blog posts are accessed roughly 500 times each. At the time of writing, 21 research teams conduct their work virtually using the InspireNet platform; 10 topic-based Action Teams meet to address issues of mutual concern. Nursing and other health professionals, even those who rated themselves as computer literate, required significant mentoring and support in their efforts to adopt their practice to a virtual environment. There was a steep learning curve for professionals to learn to work in a virtual environment and to benefit from the available technologies. Virtual professional networks can be positioned to make a significant contribution to ongoing professional practice and to creating environments supportive of information sharing, mentoring, and learning across geographical boundaries. Nonetheless, creation of a Web 2.0 and social media platform is not sufficient, in and of itself, to attract or sustain a vibrant community of professionals interested in improving their practice. Essential support includes instruction in the use of Web-based activities and time management, a biweekly e-Newsletter, regular communication from leaders, and an annual face-to-face conference.
Decentralized Dimensionality Reduction for Distributed Tensor Data Across Sensor Networks.
Liang, Junli; Yu, Guoyang; Chen, Badong; Zhao, Minghua
2016-11-01
This paper develops a novel decentralized dimensionality reduction algorithm for the distributed tensor data across sensor networks. The main contributions of this paper are as follows. First, conventional centralized methods, which utilize entire data to simultaneously determine all the vectors of the projection matrix along each tensor mode, are not suitable for the network environment. Here, we relax the simultaneous processing manner into the one-vector-by-one-vector (OVBOV) manner, i.e., determining the projection vectors (PVs) related to each tensor mode one by one. Second, we prove that in the OVBOV manner each PV can be determined without modifying any tensor data, which simplifies corresponding computations. Third, we cast the decentralized PV determination problem as a set of subproblems with consensus constraints, so that it can be solved in the network environment only by local computations and information communications among neighboring nodes. Fourth, we introduce the null space and transform the PV determination problem with complex orthogonality constraints into an equivalent hidden convex one without any orthogonality constraint, which can be solved by the Lagrange multiplier method. Finally, experimental results are given to show that the proposed algorithm is an effective dimensionality reduction scheme for the distributed tensor data across the sensor networks.
Need low-cost networking? Consider DeviceNet
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moss, W.H.
1996-11-01
The drive to reduce production costs and optimize system performance in manufacturing facilities causes many end users to invest in network solutions. Because of distinct differences between the way tasks are performed and the way data are handled for various applications, it is clear than more than one network will be needed in most facilities. What is not clear is which network is most appropriate for a given application. The information layer is the link between automation and information environments via management information systems (MISs) and manufacturing execution systems (MESs) and manufacturing execution systems (MESs). Here the market has chosenmore » a de facto standard in Ethernet, primarily transmission control protocol/internet protocol (TCP/IP) and secondarily manufacturing messaging system (MMS). There is no single standard at the device layer. However, the DeviceNet communication standard has made strides to reach this goal. This protocol eliminates expensive hardwiring and provides improved communication between devices and important device-level diagnostics not easily accessible or available through hardwired I/O interfaces. DeviceNet is a low-cost communications link connecting industrial devices to a network. Many original equipment manufacturers and end users have chosen the DeviceNet platform for several reasons, but most frequently because of four key features: interchangeability; low cost; advanced diagnostics; insert devices under power.« less
NASA Astrophysics Data System (ADS)
Niculescu, S.; Ienco, D.; Hanganu, J.
2018-04-01
Land cover is a fundamental variable for regional planning, as well as for the study and understanding of the environment. This work propose a multi-temporal approach relying on a fusion of radar multi-sensor data and information collected by the latest sensor (Sentinel-1) with a view to obtaining better results than traditional image processing techniques. The Danube Delta is the site for this work. The spatial approach relies on new spatial analysis technologies and methodologies: Deep Learning of multi-temporal Sentinel-1. We propose a deep learning network for image classification which exploits the multi-temporal characteristic of Sentinel-1 data. The model we employ is a Gated Recurrent Unit (GRU) Network, a recurrent neural network that explicitly takes into account the time dimension via a gated mechanism to perform the final prediction. The main quality of the GRU network is its ability to consider only the important part of the information coming from the temporal data discarding the irrelevant information via a forgetting mechanism. We propose to use such network structure to classify a series of images Sentinel-1 (20 Sentinel-1 images acquired between 9.10.2014 and 01.04.2016). The results are compared with results of the classification of Random Forest.
CytoViz: an artistic mapping of network measurements as living organisms in a VR application
NASA Astrophysics Data System (ADS)
López Silva, Brenda A.; Renambot, Luc
2007-02-01
CytoViz is an artistic, real-time information visualization driven by statistical information gathered during gigabit network transfers to the Scalable Adaptive Graphical Environment (SAGE) at various events. Data streams are mapped to cellular organisms defining their structure and behavior as autonomous agents. Network bandwidth drives the growth of each entity and the latency defines its physics-based independent movements. The collection of entity is bound within the 3D representation of the local venue. This visual and animated metaphor allows the public to experience the complexity of high-speed network streams that are used in the scientific community. Moreover, CytoViz displays the presence of discoverable Bluetooth devices carried by nearby persons. The concept is to generate an event-specific, real-time visualization that creates informational 3D patterns based on actual local presence. The observed Bluetooth traffic is put in opposition of the wide-area networking traffic by overlaying 2D animations on top of the 3D world. Each device is mapped to an animation fading over time while displaying the name of the detected device and its unique physical address. CytoViz was publicly presented at two major international conferences in 2005 (iGrid2005 in San Diego, CA and SC05 in Seattle, WA).
The ISES: A non-intrusive medium for in-space experiments in on-board information extraction
NASA Technical Reports Server (NTRS)
Murray, Nicholas D.; Katzberg, Stephen J.; Nealy, Mike
1990-01-01
The Information Science Experiment System (ISES) represents a new approach in applying advanced systems technology and techniques to on-board information extraction in the space environment. Basically, what is proposed is a 'black box' attached to the spacecraft data bus or local area network. To the spacecraft the 'black box' appears to be just another payload requiring power, heat rejection, interfaces, adding weight, and requiring time on the data management and communication system. In reality, the 'black box' is a programmable computational resource which eavesdrops on the data network, taking and producing selectable, real-time science data back on the network. This paper will present a brief overview of the ISES Concept and will discuss issues related to applying the ISES to the polar platform and Space Station Freedom. Critical to the operation of ISES is the viability of a payload-like interface to the spacecraft data bus or local area network. Study results that address this question will be reviewed vis-a-vis the solar platform and the core space station. Also, initial results of processing science and other requirements for onboard, real-time information extraction will be presented with particular emphasis on the polar platform. Opportunities for a broader range of applications on the core space station will also be discussed.
NASA Astrophysics Data System (ADS)
Rababaah, Haroun; Shirkhodaie, Amir
2009-04-01
The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.
Recognizing Successive Dolphin Echoes with an Integrator Gateway Network
1993-11-01
S) WU: DN300017 P Moore, H. Roitblat , and P Nachtigall 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER...amplitude spectral information, 3.91 kHz percategories corresponding to each of the stimuli (see bin, ranging from 31.25 kHz to 146.5 kHz. Each echo Roitblat ...in a natural that of our network. Roitblat , et al. (1990b) reported environment containing, for example, many moving fish, that the dolphin was 94.5
Qin, Junping; Sun, Shiwen; Deng, Qingxu; Liu, Limin; Tian, Yonghong
2017-06-02
Object tracking and detection is one of the most significant research areas for wireless sensor networks. Existing indoor trajectory tracking schemes in wireless sensor networks are based on continuous localization and moving object data mining. Indoor trajectory tracking based on the received signal strength indicator ( RSSI ) has received increased attention because it has low cost and requires no special infrastructure. However, RSSI tracking introduces uncertainty because of the inaccuracies of measurement instruments and the irregularities (unstable, multipath, diffraction) of wireless signal transmissions in indoor environments. Heuristic information includes some key factors for trajectory tracking procedures. This paper proposes a novel trajectory tracking scheme based on Delaunay triangulation and heuristic information (TTDH). In this scheme, the entire field is divided into a series of triangular regions. The common side of adjacent triangular regions is regarded as a regional boundary. Our scheme detects heuristic information related to a moving object's trajectory, including boundaries and triangular regions. Then, the trajectory is formed by means of a dynamic time-warping position-fingerprint-matching algorithm with heuristic information constraints. Field experiments show that the average error distance of our scheme is less than 1.5 m, and that error does not accumulate among the regions.
Walkability for Different Urban Granularities
NASA Astrophysics Data System (ADS)
Hollenstein, D.; Bleisch, S.
2016-06-01
The positive effects of low-intensity physical activity are widely acknowledged and in this context walking is often promoted as an active form of transport. Under the concept of walkability the role of the built environment in encouraging walking is investigated. For that purpose, walkability is quantified area-wise by measuring a varying set of built environment attributes. In purely GIS-based approaches to studying walkability, indices are generally built using existing and easily accessible data. These include street network design, population density, land use mix, and access to destinations. Access to destinations is usually estimated using either a fixed radius, or distances in the street network. In this paper, two approaches to approximate a footpath network are presented. The two footpath networks were built making different assumptions regarding the walkability of different street types with respect to more or less restrictive safety preferences. Information on sidewalk presence, pedestrian crossings, and traffic restrictions were used to build both networks. The first network comprises car traffic free areas only. The second network includes streets with low speed limits that have no sidewalks. Both networks are compared to the more commonly used street network in an access-to-distance analysis. The results suggest that for the generally highly walkable study area, access to destination mostly depends on destination density within the defined walkable distance. However, on single street segments access to destinations is diminished when only car traffic free spaces are assumed to be walkable.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-01-01
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. PMID:29244776
Peer-to-peer model for the area coverage and cooperative control of mobile sensor networks
NASA Astrophysics Data System (ADS)
Tan, Jindong; Xi, Ning
2004-09-01
This paper presents a novel model and distributed algorithms for the cooperation and redeployment of mobile sensor networks. A mobile sensor network composes of a collection of wireless connected mobile robots equipped with a variety of sensors. In such a sensor network, each mobile node has sensing, computation, communication, and locomotion capabilities. The locomotion ability enhances the autonomous deployment of the system. The system can be rapidly deployed to hostile environment, inaccessible terrains or disaster relief operations. The mobile sensor network is essentially a cooperative multiple robot system. This paper first presents a peer-to-peer model to define the relationship between neighboring communicating robots. Delaunay Triangulation and Voronoi diagrams are used to define the geometrical relationship between sensor nodes. This distributed model allows formal analysis for the fusion of spatio-temporal sensory information of the network. Based on the distributed model, this paper discusses a fault tolerant algorithm for autonomous self-deployment of the mobile robots. The algorithm considers the environment constraints, the presence of obstacles and the nonholonomic constraints of the robots. The distributed algorithm enables the system to reconfigure itself such that the area covered by the system can be enlarged. Simulation results have shown the effectiveness of the distributed model and deployment algorithms.
How can social network analysis contribute to social behavior research in applied ethology?
Makagon, Maja M; McCowan, Brenda; Mench, Joy A
2012-05-01
Social network analysis is increasingly used by behavioral ecologists and primatologists to describe the patterns and quality of interactions among individuals. We provide an overview of this methodology, with examples illustrating how it can be used to study social behavior in applied contexts. Like most kinds of social interaction analyses, social network analysis provides information about direct relationships (e.g. dominant-subordinate relationships). However, it also generates a more global model of social organization that determines how individual patterns of social interaction relate to individual and group characteristics. A particular strength of this approach is that it provides standardized mathematical methods for calculating metrics of sociality across levels of social organization, from the population and group levels to the individual level. At the group level these metrics can be used to track changes in social network structures over time, evaluate the effect of the environment on social network structure, or compare social structures across groups, populations or species. At the individual level, the metrics allow quantification of the heterogeneity of social experience within groups and identification of individuals who may play especially important roles in maintaining social stability or information flow throughout the network.
Practical use of a framework for network science experimentation
NASA Astrophysics Data System (ADS)
Toth, Andrew; Bergamaschi, Flavio
2014-06-01
In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA)1 In Network and Information Sciences, to address fundamental issues concerning Network and Information Sciences that will enhance decision making for coalition operations and enable rapid, secure formation of ad hoc teams in coalition environments and enhance US and UK capabilities to conduct coalition warfare. Research conducted under the ITA was extended through collaboration between ARL and IBM UK to characterize and dene a software stack and tooling that has become the reference framework for network science experimentation in support for validation of theoretical research. This paper discusses the composition of the reference framework for experimentation resulting from the ARL/IBM UK collaboration and its use, by the Network Science Collaborative Technology Alliance (NS CTA)2 , in a recent network science experiment conducted at ARL. It also discusses how the experiment was modeled using the reference framework, the integration of two new components, the Apollo Fact-Finder3 tool and the Medusa Crowd Sensing4 application, the limitations identified and how they shall be addressed in future work.
Social network size can influence linguistic malleability and the propagation of linguistic change.
Lev-Ari, Shiri
2018-07-01
We learn language from our social environment, but the more sources we have, the less informative each source is, and therefore, the less weight we ascribe its input. According to this principle, people with larger social networks should give less weight to new incoming information, and should therefore be less susceptible to the influence of new speakers. This paper tests this prediction, and shows that speakers with smaller social networks indeed have more malleable linguistic representations. In particular, they are more likely to adjust their lexical boundary following exposure to a new speaker. Experiment 2 uses computational simulations to test whether this greater malleability could lead people with smaller social networks to be important for the propagation of linguistic change despite the fact that they interact with fewer people. The results indicate that when innovators were connected with people with smaller rather than larger social networks, the population exhibited greater and faster diffusion. Together these experiments show that the properties of people's social networks can influence individuals' learning and use as well as linguistic phenomena at the community level. Copyright © 2018 Elsevier B.V. All rights reserved.
Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks
Jurdak, Raja; Nafaa, Abdelhamid; Barbirato, Alessio
2008-01-01
Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper. PMID:27873941
A Neural Network Approach to Intention Modeling for User-Adapted Conversational Agents
Griol, David
2016-01-01
Spoken dialogue systems have been proposed to enable a more natural and intuitive interaction with the environment and human-computer interfaces. In this contribution, we present a framework based on neural networks that allows modeling of the user's intention during the dialogue and uses this prediction to dynamically adapt the dialogue model of the system taking into consideration the user's needs and preferences. We have evaluated our proposal to develop a user-adapted spoken dialogue system that facilitates tourist information and services and provide a detailed discussion of the positive influence of our proposal in the success of the interaction, the information and services provided, and the quality perceived by the users. PMID:26819592
Neuromorphic device architectures with global connectivity through electrolyte gating
NASA Astrophysics Data System (ADS)
Gkoupidenis, Paschalis; Koutsouras, Dimitrios A.; Malliaras, George G.
2017-05-01
Information processing in the brain takes place in a network of neurons that are connected with each other by an immense number of synapses. At the same time, neurons are immersed in a common electrochemical environment, and global parameters such as concentrations of various hormones regulate the overall network function. This computational paradigm of global regulation, also known as homeoplasticity, has important implications in the overall behaviour of large neural ensembles and is barely addressed in neuromorphic device architectures. Here, we demonstrate the global control of an array of organic devices based on poly(3,4ethylenedioxythiophene):poly(styrene sulf) that are immersed in an electrolyte, a behaviour that resembles homeoplasticity phenomena of the neural environment. We use this effect to produce behaviour that is reminiscent of the coupling between local activity and global oscillations in the biological neural networks. We further show that the electrolyte establishes complex connections between individual devices, and leverage these connections to implement coincidence detection. These results demonstrate that electrolyte gating offers significant advantages for the realization of networks of neuromorphic devices of higher complexity and with minimal hardwired connectivity.
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
Bio-inspired Autonomic Structures: a middleware for Telecommunications Ecosystems
NASA Astrophysics Data System (ADS)
Manzalini, Antonio; Minerva, Roberto; Moiso, Corrado
Today, people are making use of several devices for communications, for accessing multi-media content services, for data/information retrieving, for processing, computing, etc.: examples are laptops, PDAs, mobile phones, digital cameras, mp3 players, smart cards and smart appliances. One of the most attracting service scenarios for future Telecommunications and Internet is the one where people will be able to browse any object in the environment they live: communications, sensing and processing of data and services will be highly pervasive. In this vision, people, machines, artifacts and the surrounding space will create a kind of computational environment and, at the same time, the interfaces to the network resources. A challenging technological issue will be interconnection and management of heterogeneous systems and a huge amount of small devices tied together in networks of networks. Moreover, future network and service infrastructures should be able to provide Users and Application Developers (at different levels, e.g., residential Users but also SMEs, LEs, ASPs/Web2.0 Service roviders, ISPs, Content Providers, etc.) with the most appropriate "environment" according to their context and specific needs. Operators must be ready to manage such level of complication enabling their latforms with technological advanced allowing network and services self-supervision and self-adaptation capabilities. Autonomic software solutions, enhanced with innovative bio-inspired mechanisms and algorithms, are promising areas of long term research to face such challenges. This chapter proposes a bio-inspired autonomic middleware capable of leveraging the assets of the underlying network infrastructure whilst, at the same time, supporting the development of future Telecommunications and Internet Ecosystems.
Space Station Information System - Concepts and international issues
NASA Technical Reports Server (NTRS)
Williams, R. B.; Pruett, David; Hall, Dana L.
1987-01-01
The Space Station Information System (SSIS) is outlined in terms of its functions and probable physical facilities. The SSIS includes flight element systems as well as existing and planned institutional systems such as the NASA Communications System, the Tracking and Data Relay Satellite System, and the data and communications networks of the international partners. The SSIS strives to provide both a 'user friendly' environment and a software environment which will allow for software transportability and interoperability across the SSIS. International considerations are discussed as well as project management, software commonality, data communications standards, data security, documentation commonality, transaction management, data flow cross support, and key technologies.
Syed, Mustafa H; Karpinets, Tatiana V; Leuze, Michael R; Kora, Guruprasad H; Romine, Margaret R; Uberbacher, Edward C
2009-01-01
Shewanella oneidensis MR-1 is an important model organism for environmental research as it has an exceptional metabolic and respiratory versatility regulated by a complex regulatory network. We have developed a database to collect experimental and computational data relating to regulation of gene and protein expression, and, a visualization environment that enables integration of these data types. The regulatory information in the database includes predictions of DNA regulator binding sites, sigma factor binding sites, transcription units, operons, promoters, and RNA regulators including non-coding RNAs, riboswitches, and different types of terminators. Availability http://shewanella-knowledgebase.org:8080/Shewanella/gbrowserLanding.jsp PMID:20198195
SuperSchools: Education in the Information Age and Beyond.
ERIC Educational Resources Information Center
Ameritech Foundation, Chicago, IL.
This document discusses how improvements in the capabilities of the intelligent communications network are making new enhancements and advances available to educators, administrators, students, parents, and the community, focusing on the role of Ameritech. Modern technologies can create dynamic and appropriate learning environments for children…
User Authentication and Authorization Challenges in a Networked Library Environment.
ERIC Educational Resources Information Center
Machovec, George S.
1997-01-01
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
DOT National Transportation Integrated Search
2000-06-01
Micro-scale design (MSD) is a term that has been coined recently by transportation and land use planners to describe the human-scale features of the built environment. This concept focuses on accessibility to desired activities rather than on mobilit...
Possibilities for Proactive Library Services.
ERIC Educational Resources Information Center
Morgan, Eric Lease
1999-01-01
Considers ways in which library services can be more proactive in today's networked-computer environment. Discusses how to find and use patterns of behavior, such as borrowing behavior and profiles of patrons' interests; making a CD-ROM with information describing the library's services and products; and reviving telephone reference. (LRW)
The Role of Teacher's Initiation in Online Pedagogy
ERIC Educational Resources Information Center
Tsai, Chia-Wen
2012-01-01
Purpose: The author redesigned a course titled "Applied Information Technology: Networking" and applied online collaborative learning (CL) with initiation and self-regulated learning (SRL) to improve students' involvement in this course in an environment that is full of free online games, shopping websites, and social networking…
Social network and decision-making in primates: a report on Franco-Japanese research collaborations.
Sueur, Cédric; Pelé, Marie
2016-07-01
Sociality is suggested to evolve as a strategy for animals to cope with challenges in their environment. Within a population, each individual can be seen as part of a network of social interactions that vary in strength, type and dynamics (Sueur et al. 2011a). The structure of this social network can strongly impact upon not only on the fitness of individuals and their decision-making, but also on the ecology of populations and the evolution of a species. Our Franco-Japanese collaboration allowed us to study social networks in several species (Japanese macaques, chimpanzees, colobines, etc.) and on different topics (social epidemiology, social evolution, information transmission). Individual attributes such as stress, rank or age can affect how individuals take decisions and the structure of the social network. This heterogeneity is linked to the assortativity of individuals and to the efficiency of the flow within a network. It is important, therefore, that this heterogeneity is integrated in the process or pattern under study in order to provide a better resolution of investigation and, ultimately, a better understanding of behavioural strategies, social dynamics and social evolution. How social information affects decision-making could be important to understand how social groups make collective decisions and how information may spread throughout the social group. In human beings, road-crossing behaviours in the presence of other individuals is a good way to study the influence of social information on individual behaviour and decision-making, for instance. Culture directly affects which information - personal vs social - individuals prefer to follow. Our collaboration contributed to the understanding of the relative influence of different factors, cultural and ecological, on primate, including human, sociality.
ERIC Educational Resources Information Center
Powell, Margaret S.
Since 1895, the Federal Depository Library Program (FDLP), administered by the U.S. Government Printing Office (GPO), has provided no-fee public access to information generated by the U.S. government through a network of libraries. For 200 years, print-on-paper remained the dominant format. By 1978, publications were also distributed in…
Kotenko, Igor
2014-01-01
The paper outlines a bioinspired approach named “network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described. PMID:25254229
The plant perceptron connects environment to development.
Scheres, Ben; van der Putten, Wim H
2017-03-15
Plants cope with the environment in a variety of ways, and ecological analyses attempt to capture this through life-history strategies or trait-based categorization. These approaches are limited because they treat the trade-off mechanisms that underlie plant responses as a black box. Approaches that involve the molecular or physiological analysis of plant responses to the environment have elucidated intricate connections between developmental and environmental signals, but in only a few well-studied model species. By considering diversity in the plant response to the environment as the adaptation of an information-processing network, new directions can be found for the study of life-history strategies, trade-offs and evolution in plants.
A Prize-Collecting Steiner Tree Approach for Transduction Network Inference
NASA Astrophysics Data System (ADS)
Bailly-Bechet, Marc; Braunstein, Alfredo; Zecchina, Riccardo
Into the cell, information from the environment is mainly propagated via signaling pathways which form a transduction network. Here we propose a new algorithm to infer transduction networks from heterogeneous data, using both the protein interaction network and expression datasets. We formulate the inference problem as an optimization task, and develop a message-passing, probabilistic and distributed formalism to solve it. We apply our algorithm to the pheromone response in the baker’s yeast S. cerevisiae. We are able to find the backbone of the known structure of the MAPK cascade of pheromone response, validating our algorithm. More importantly, we make biological predictions about some proteins whose role could be at the interface between pheromone response and other cellular functions.
Tools to manage the enterprise-wide picture archiving and communications system environment.
Lannum, L M; Gumpf, S; Piraino, D
2001-06-01
The presentation will focus on the implementation and utilization of a central picture archiving and communications system (PACS) network-monitoring tool that allows for enterprise-wide operations management and support of the image distribution network. The MagicWatch (Siemens, Iselin, NJ) PACS/radiology information system (RIS) monitoring station from Siemens has allowed our organization to create a service support structure that has given us proactive control of our environment and has allowed us to meet the service level performance expectations of the users. The Radiology Help Desk has used the MagicWatch PACS monitoring station as an applications support tool that has allowed the group to monitor network activity and individual systems performance at each node. Fast and timely recognition of the effects of single events within the PACS/RIS environment has allowed the group to proactively recognize possible performance issues and resolve problems. The PACS/operations group performs network management control, image storage management, and software distribution management from a single, central point in the enterprise. The MagicWatch station allows for the complete automation of software distribution, installation, and configuration process across all the nodes in the system. The tool has allowed for the standardization of the workstations and provides a central configuration control for the establishment and maintenance of the system standards. This report will describe the PACS management and operation prior to the implementation of the MagicWatch PACS monitoring station and will highlight the operational benefits of a centralized network and system-monitoring tool.
Sonification of network traffic flow for monitoring and situational awareness
2018-01-01
Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators’ situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen. PMID:29672543
Sonification of network traffic flow for monitoring and situational awareness.
Debashi, Mohamed; Vickers, Paul
2018-01-01
Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators' situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen.
Health Social Networks as Online Life Support Groups for Patients With Cardiovascular Diseases
Medina, Edhelmira Lima; Loques, Orlando; Mesquita, Cláudio Tinoco
2013-01-01
The number of patients who use the internet in search for information that might improve their health conditions has increased. Among them, those looking for virtual environments to share experiences, doubts, opinions, and emotions, and to foster relationships aimed at giving and getting support stand out. Therefore, there is an increasing need to assess how those environments can affect the patients' health. This study was aimed at identifying scientific studies on the proliferation and impact of virtual communities, known as health social networks or online support groups, directed to cardiovascular diseases, which might be useful to patients with certain conditions, providing them with information and emotional support. A systematic review of the literature was conducted with articles published from 2007 to 2012, related to cardiovascular diseases and collected from the following databases: PubMed; Association for Computing Machinery(ACM); and Institute of Electrical and Electronics Engineers (IEEE). Four articles meeting the inclusion criteria were selected. The results were interesting and relevant from the health viewpoint, identifying therapeutic benefits, such as provision of emotional support, greater compliance to treatment, and information sharing on diseases and on life experiences. PMID:24030085
Output power distributions of terminals in a 3G mobile communication network.
Persson, Tomas; Törnevik, Christer; Larsson, Lars-Eric; Lovén, Jan
2012-05-01
The objective of this study was to examine the distribution of the output power of mobile phones and other terminals connected to a 3G network in Sweden. It is well known that 3G terminals can operate with very low output power, particularly for voice calls. Measurements of terminal output power were conducted in the Swedish TeliaSonera 3G network in November 2008 by recording network statistics. In the analysis, discrimination was made between rural, suburban, urban, and dedicated indoor networks. In addition, information about terminal output power was possible to collect separately for voice and data traffic. Information from six different Radio Network Controllers (RNCs) was collected during at least 1 week. In total, more than 800000 h of voice calls were collected and in addition to that a substantial amount of data traffic. The average terminal output power for 3G voice calls was below 1 mW for any environment including rural, urban, and dedicated indoor networks. This is <1% of the maximum available output power. For data applications the average output power was about 6-8 dB higher than for voice calls. For rural areas the output power was about 2 dB higher, on average, than in urban areas. Copyright © 2011 Wiley Periodicals, Inc.
Application of UWB and MIMO Wireless Technologies to Tactical Networks in Austere Environments
2010-09-01
Electromagnetic Environmental Noise FCC Federal Communications Commission GB Gigabit GHz Gigahertz GIG Global Information Grid xvi Gbps... light foliage -2 dB foundation/ground -15 dB Table 1. RF absorption rates in austere environments [after: Coleman & Westcott, 2009] 11 2...wavelength in meters, c is the speed of light and f is the known frequency in hertz. So, when applying this formula to an 802.11g OFDM signal, or 2.45GHz
DICOM static and dynamic representation through unified modeling language
NASA Astrophysics Data System (ADS)
Martinez-Martinez, Alfonso; Jimenez-Alaniz, Juan R.; Gonzalez-Marquez, A.; Chavez-Avelar, N.
2004-04-01
The DICOM standard, as all standards, specifies in generic way the management in network and storage media environments of digital medical images and their related information. However, understanding the specifications for particular implementation is not a trivial work. Thus, this work is about understanding and modelling parts of the DICOM standard using Object Oriented methodologies, as part of software development processes. This has offered different static and dynamic views, according with the standard specifications, and the resultant models have been represented through the Unified Modelling Language (UML). The modelled parts are related to network conformance claim: Network Communication Support for Message Exchange, Message Exchange, Information Object Definitions, Service Class Specifications, Data Structures and Encoding, and Data Dictionary. The resultant models have given a better understanding about DICOM parts and have opened the possibility of create a software library to develop DICOM conformable PACS applications.
Optical Meteor Systems Used by the NASA Meteoroid Environment Office
NASA Technical Reports Server (NTRS)
Kingery, A. M.; Blaauw, R. C.; Cooke, W. J.; Moser, D. E.
2015-01-01
The NASA Meteoroid Environment Office (MEO) uses two main meteor camera networks to characterize the meteoroid environment: an all sky system and a wide field system to study cm and mm size meteors respectively. The NASA All Sky Fireball Network consists of fifteen meteor video cameras in the United States, with plans to expand to eighteen cameras by the end of 2015. The camera design and All-Sky Guided and Real-time Detection (ASGARD) meteor detection software [1, 2] were adopted from the University of Western Ontario's Southern Ontario Meteor Network (SOMN). After seven years of operation, the network has detected over 12,000 multi-station meteors, including meteors from at least 53 different meteor showers. The network is used for speed distribution determination, characterization of meteor showers and sporadic sources, and for informing the public on bright meteor events. The NASA Wide Field Meteor Network was established in December of 2012 with two cameras and expanded to eight cameras in December of 2014. The two camera configuration saw 5470 meteors over two years of operation with two cameras, and has detected 3423 meteors in the first five months of operation (Dec 12, 2014 - May 12, 2015) with eight cameras. We expect to see over 10,000 meteors per year with the expanded system. The cameras have a 20 degree field of view and an approximate limiting meteor magnitude of +5. The network's primary goal is determining the nightly shower and sporadic meteor fluxes. Both camera networks function almost fully autonomously with little human interaction required for upkeep and analysis. The cameras send their data to a central server for storage and automatic analysis. Every morning the servers automatically generates an e-mail and web page containing an analysis of the previous night's events. The current status of the networks will be described, alongside with preliminary results. In addition, future projects, CCD photometry and broadband meteor color camera system, will be discussed.
Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo
2014-04-21
Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.
Phenotypic constraints promote latent versatility and carbon efficiency in metabolic networks.
Bardoscia, Marco; Marsili, Matteo; Samal, Areejit
2015-07-01
System-level properties of metabolic networks may be the direct product of natural selection or arise as a by-product of selection on other properties. Here we study the effect of direct selective pressure for growth or viability in particular environments on two properties of metabolic networks: latent versatility to function in additional environments and carbon usage efficiency. Using a Markov chain Monte Carlo (MCMC) sampling based on flux balance analysis (FBA), we sample from a known biochemical universe random viable metabolic networks that differ in the number of directly constrained environments. We find that the latent versatility of sampled metabolic networks increases with the number of directly constrained environments and with the size of the networks. We then show that the average carbon wastage of sampled metabolic networks across the constrained environments decreases with the number of directly constrained environments and with the size of the networks. Our work expands the growing body of evidence about nonadaptive origins of key functional properties of biological networks.
Self-Orientation Modulates the Neural Correlates of Global and Local Processing
Liddell, Belinda J.; Das, Pritha; Battaglini, Eva; Malhi, Gin S.; Felmingham, Kim L.; Whitford, Thomas J.; Bryant, Richard A.
2015-01-01
Differences in self-orientation (or “self-construal”) may affect how the visual environment is attended, but the neural and cultural mechanisms that drive this remain unclear. Behavioral studies have demonstrated that people from Western backgrounds with predominant individualistic values are perceptually biased towards local-level information; whereas people from non-Western backgrounds that support collectivist values are preferentially focused on contextual and global-level information. In this study, we compared two groups differing in predominant individualistic (N = 15) vs collectivistic (N = 15) self-orientation. Participants completed a global/local perceptual conflict task whilst undergoing functional Magnetic Resonance Imaging (fMRI) scanning. When participants high in individualistic values attended to the global level (ignoring the local level), greater activity was observed in the frontoparietal and cingulo-opercular networks that underpin attentional control, compared to the match (congruent) baseline. Participants high in collectivistic values activated similar attentional control networks o only when directly compared with global processing. This suggests that global interference was stronger than local interference in the conflict task in the collectivistic group. Both groups showed increased activity in dorsolateral prefrontal regions involved in resolving perceptual conflict during heightened distractor interference. The findings suggest that self-orientation may play an important role in driving attention networks to facilitate interaction with the visual environment. PMID:26270820
Self-Orientation Modulates the Neural Correlates of Global and Local Processing.
Liddell, Belinda J; Das, Pritha; Battaglini, Eva; Malhi, Gin S; Felmingham, Kim L; Whitford, Thomas J; Bryant, Richard A
2015-01-01
Differences in self-orientation (or "self-construal") may affect how the visual environment is attended, but the neural and cultural mechanisms that drive this remain unclear. Behavioral studies have demonstrated that people from Western backgrounds with predominant individualistic values are perceptually biased towards local-level information; whereas people from non-Western backgrounds that support collectivist values are preferentially focused on contextual and global-level information. In this study, we compared two groups differing in predominant individualistic (N = 15) vs collectivistic (N = 15) self-orientation. Participants completed a global/local perceptual conflict task whilst undergoing functional Magnetic Resonance Imaging (fMRI) scanning. When participants high in individualistic values attended to the global level (ignoring the local level), greater activity was observed in the frontoparietal and cingulo-opercular networks that underpin attentional control, compared to the match (congruent) baseline. Participants high in collectivistic values activated similar attentional control networks o only when directly compared with global processing. This suggests that global interference was stronger than local interference in the conflict task in the collectivistic group. Both groups showed increased activity in dorsolateral prefrontal regions involved in resolving perceptual conflict during heightened distractor interference. The findings suggest that self-orientation may play an important role in driving attention networks to facilitate interaction with the visual environment.
Modulation of the brain's functional network architecture in the transition from wake to sleep
Larson-Prior, Linda J.; Power, Jonathan D.; Vincent, Justin L.; Nolan, Tracy S.; Coalson, Rebecca S.; Zempel, John; Snyder, Abraham Z.; Schlaggar, Bradley L.; Raichle, Marcus E.; Petersen, Steven E.
2013-01-01
The transition from quiet wakeful rest to sleep represents a period over which attention to the external environment fades. Neuroimaging methodologies have provided much information on the shift in neural activity patterns in sleep, but the dynamic restructuring of human brain networks in the transitional period from wake to sleep remains poorly understood. Analysis of electrophysiological measures and functional network connectivity of these early transitional states shows subtle shifts in network architecture that are consistent with reduced external attentiveness and increased internal and self-referential processing. Further, descent to sleep is accompanied by the loss of connectivity in anterior and posterior portions of the default-mode network and more locally organized global network architecture. These data clarify the complex and dynamic nature of the transitional period between wake and sleep and suggest the need for more studies investigating the dynamics of these processes. PMID:21854969
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
New Delivery Systems for the 21st Century.
ERIC Educational Resources Information Center
Van Patten, James J.
This paper presents an historical perspective on the development of educational delivery systems, and then turns to the challenges of the information age and the issues of developing new delivery systems in this challenging environment. The paper discusses the fragility of power sources and of the networked world; technological weaknesses; freedom…
ERIC Educational Resources Information Center
Schuch, Dan
2001-01-01
"The Research Assistant," was developed to help graduate students and faculty manage the quantity of available information, to be able to read it, synthesize it, and create new insights and knowledge. "The Research Assistant" was designed using the Filemaker Pro relational database and can be set up in a networked environment to be used in…
2004-05-01
grounded in structuration theory (Giddens, 1984), social information processing theory (Salancik and Pfeffer, 1978) and symbolic interactionism (Manis...and B. N. Meltzer. Symbolic interaction: A reader in social psychology. Boston: Allyn & Bacon. 1978 Mcpherson, J. M. and L. Smith-Lovin
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-11
... Association; Animal Welfare Institute; Bush Warriors; Center for Biological Diversity; International Fund for... Specialist Group; Oceana; Pew Environment Group; Shark Advocates International; Species Survival Network... and biological information on all of these taxa. Based on these assessments, we made provisional...
Department of Defense Information Enterprise: Strategic Plan 2010-2012
2010-04-01
migrate from circuit-based technology to a converged (voice, video , and data) IP network and UC services environment. Ensure the optimal...Kevin Coleman, “Cyber Attacks on Supply Chain Systems,” Defense Tech, April 15, 2009 8 Lolita C. Baldor, “Federal Web Sites Knocked Out by Cyber Attack
Remote Labs and Game-Based Learning for Process Control
ERIC Educational Resources Information Center
Zualkernan, Imran A.; Husseini, Ghaleb A.; Loughlin, Kevin F.; Mohebzada, Jamshaid G.; El Gaml, Moataz
2013-01-01
Social networking platforms and computer games represent a natural informal learning environment for the current generation of learners in higher education. This paper explores the use of game-based learning in the context of an undergraduate chemical engineering remote laboratory. Specifically, students are allowed to manipulate chemical…
Future Leaders' Views on Organizational Culture
ERIC Educational Resources Information Center
Maloney, Krisellen; Antelman, Kristin; Arlitsch, Kenning; Butler, John
2010-01-01
Research libraries will continue to be affected by rapid and transformative changes in information technology and the networked environment for the foreseeable future. The pace and direction of these changes will profoundly challenge libraries and their staffs to respond effectively. This paper presents the results of a survey that was designed to…
ERIC Educational Resources Information Center
Jokela, Paivi; Karlsudd, Peter
2007-01-01
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
A Study on Corporate Security Awareness and Compliance Behavior Intent
ERIC Educational Resources Information Center
Clark, Christine Y.
2013-01-01
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Chen, Liang; Xue, Wei; Tokuda, Naoyuki
2010-08-01
In many pattern classification/recognition applications of artificial neural networks, an object to be classified is represented by a fixed sized 2-dimensional array of uniform type, which corresponds to the cells of a 2-dimensional grid of the same size. A general neural network structure, called an undistricted neural network, which takes all the elements in the array as inputs could be used for problems such as these. However, a districted neural network can be used to reduce the training complexity. A districted neural network usually consists of two levels of sub-neural networks. Each of the lower level neural networks, called a regional sub-neural network, takes the elements in a region of the array as its inputs and is expected to output a temporary class label, called an individual opinion, based on the partial information of the entire array. The higher level neural network, called an assembling sub-neural network, uses the outputs (opinions) of regional sub-neural networks as inputs, and by consensus derives the label decision for the object. Each of the sub-neural networks can be trained separately and thus the training is less expensive. The regional sub-neural networks can be trained and performed in parallel and independently, therefore a high speed can be achieved. We prove theoretically in this paper, using a simple model, that a districted neural network is actually more stable than an undistricted neural network in noisy environments. We conjecture that the result is valid for all neural networks. This theory is verified by experiments involving gender classification and human face recognition. We conclude that a districted neural network is highly recommended for neural network applications in recognition or classification of 2-dimensional array patterns in highly noisy environments. Copyright (c) 2010 Elsevier Ltd. All rights reserved.
Park, Jihoon; Mori, Hiroki; Okuyama, Yuji; Asada, Minoru
2017-01-01
Chaotic itinerancy is a phenomenon in which the state of a nonlinear dynamical system spontaneously explores and attracts certain states in a state space. From this perspective, the diverse behavior of animals and its spontaneous transitions lead to a complex coupled dynamical system, including a physical body and a brain. Herein, a series of simulations using different types of non-linear oscillator networks (i.e., regular, small-world, scale-free, random) with a musculoskeletal model (i.e., a snake-like robot) as a physical body are conducted to understand how the chaotic itinerancy of bodily behavior emerges from the coupled dynamics between the body and the brain. A behavior analysis (behavior clustering) and network analysis for the classified behavior are then applied. The former consists of feature vector extraction from the motions and classification of the movement patterns that emerged from the coupled dynamics. The network structures behind the classified movement patterns are revealed by estimating the "information networks" different from the given non-linear oscillator networks based on the transfer entropy which finds the information flow among neurons. The experimental results show that: (1) the number of movement patterns and their duration depend on the sensor ratio to control the balance of strength between the body and the brain dynamics and on the type of the given non-linear oscillator networks; and (2) two kinds of information networks are found behind two kinds movement patterns with different durations by utilizing the complex network measures, clustering coefficient and the shortest path length with a negative and a positive relationship with the duration periods of movement patterns. The current results seem promising for a future extension of the method to a more complicated body and environment. Several requirements are also discussed.
An integrated approach for fusion of environmental and human health data for disease surveillance.
Burkom, Howard S; Ramac-Thomas, Liane; Babin, Steven; Holtry, Rekha; Mnatsakanyan, Zaruhi; Yund, Cynthia
2011-02-28
This paper describes the problem of public health monitoring for waterborne disease outbreaks using disparate evidence from health surveillance data streams and environmental sensors. We present a combined monitoring approach along with examples from a recent project at the Johns Hopkins University Applied Physics Laboratory in collaboration with the U.S. Environmental Protection Agency. The project objective was to build a module for the Electronic Surveillance System for the Early Notification of Community-based Epidemics (ESSENCE) to include water quality data with health indicator data for the early detection of waterborne disease outbreaks. The basic question in the fused surveillance application is 'What is the likelihood of the public health threat of interest given recent information from available sources of evidence?' For a scientific perspective, we formulate this question in terms of the estimation of positive predictive value customary in classical epidemiology, and we present a solution framework using Bayesian Networks (BN). An overview of the BN approach presents advantages, disadvantages, and required adaptations needed for a fused surveillance capability that is scalable and robust relative to the practical data environment. In the BN project, we built a top-level health/water-quality fusion BN informed by separate waterborne-disease-related networks for the detection of water contamination and human health effects. Elements of the art of developing networks appropriate to this environment are discussed with examples. Results of applying these networks to a simulated contamination scenario are presented. Copyright © 2011 John Wiley & Sons, Ltd.
The Impact of Different Sources of Fluctuations on Mutual Information in Biochemical Networks
Chevalier, Michael; Venturelli, Ophelia; El-Samad, Hana
2015-01-01
Stochastic fluctuations in signaling and gene expression limit the ability of cells to sense the state of their environment, transfer this information along cellular pathways, and respond to it with high precision. Mutual information is now often used to quantify the fidelity with which information is transmitted along a cellular pathway. Mutual information calculations from experimental data have mostly generated low values, suggesting that cells might have relatively low signal transmission fidelity. In this work, we demonstrate that mutual information calculations might be artificially lowered by cell-to-cell variability in both initial conditions and slowly fluctuating global factors across the population. We carry out our analysis computationally using a simple signaling pathway and demonstrate that in the presence of slow global fluctuations, every cell might have its own high information transmission capacity but that population averaging underestimates this value. We also construct a simple synthetic transcriptional network and demonstrate using experimental measurements coupled to computational modeling that its operation is dominated by slow global variability, and hence that its mutual information is underestimated by a population averaged calculation. PMID:26484538
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
NASA Astrophysics Data System (ADS)
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
Animal welfare: a social networks perspective.
Kleinhappel, Tanja K; John, Elizabeth A; Pike, Thomas W; Wilkinson, Anna; Burman, Oliver H P
2016-01-01
Social network theory provides a useful tool to study complex social relationships in animals. The possibility to look beyond dyadic interactions by considering whole networks of social relationships allows researchers the opportunity to study social groups in more natural ways. As such, network-based analyses provide an informative way to investigate the factors influencing the social environment of group-living animals, and so has direct application to animal welfare. For example, animal groups in captivity are frequently disrupted by separations, reintroductions and/or mixing with unfamiliar individuals and this can lead to social stress and associated aggression. Social network analysis ofanimal groups can help identify the underlying causes of these socially-derived animal welfare concerns. In this review we discuss how this approach can be applied, and how it could be used to identify potential interventions and solutions in the area of animal welfare.
NASA Astrophysics Data System (ADS)
Wang, Yubao; Zhu, Zhaohui; Wang, Lu; Bai, Jian
2016-05-01
A novel GPON-oriented sensing data digitalization system is proposed to achieve remote monitoring of fiber grating sensing networks utilizing existing optical communication networks in some harsh environments. In which, Quick digitalization of sensing information obtained from the reflected lightwaves by fiber Bragg grating (FBG) sensor is realized, and a novel frame format of sensor signal is designed to suit for public transport so as to facilitate sensor monitoring center to receive and analyze the sensor data. The delay effect, identification method of the sensor data, and various interference factors which influence the sensor data to be correctly received are analyzed. The system simulation is carried out with OptiSystem/Matlab co-simulation approach. The theoretical analysis and simulation results verify the feasibility of the integration of the sensor network and communication network.
Modeling a Wireless Network for International Space Station
NASA Technical Reports Server (NTRS)
Alena, Richard; Yaprak, Ece; Lamouri, Saad
2000-01-01
This paper describes the application of wireless local area network (LAN) simulation modeling methods to the hybrid LAN architecture designed for supporting crew-computing tools aboard the International Space Station (ISS). These crew-computing tools, such as wearable computers and portable advisory systems, will provide crew members with real-time vehicle and payload status information and access to digital technical and scientific libraries, significantly enhancing human capabilities in space. A wireless network, therefore, will provide wearable computer and remote instruments with the high performance computational power needed by next-generation 'intelligent' software applications. Wireless network performance in such simulated environments is characterized by the sustainable throughput of data under different traffic conditions. This data will be used to help plan the addition of more access points supporting new modules and more nodes for increased network capacity as the ISS grows.
Data from selected U.S. Geological Survey National Stream Water-Quality Networks (WQN)
Alexander, Richard B.; Slack, J.R.; Ludtke, A.S.; Fitzgerald, K.K.; Schertz, T.L.; Briel, L.I.; Buttleman, K.P.
1996-01-01
This CD-ROM set contains data from two USGS national stream water-quality networks, the Hydrologic Benchmark Network (HBN) and the National Stream Quality Accounting Network (NASQAN), operated during the past 30 years. These networks were established to provide national and regional descriptions of stream water-quality conditions and trends, based on uniform monitoring of selected watersheds throughout the United States, and to improve our understanding of the effects of the natural environment and human activities on water quality. The HBN, consisting of 63 relatively small, minimally disturbed watersheds, provides data for investigating naturally induced changes in streamflow and water quality and the effects of airborne substances on water quality. NASQAN, consisting of 618 larger, more culturally influenced watersheds, provides information for tracking water-quality conditions in major U.S. rivers and streams.
NASA Astrophysics Data System (ADS)
Denardini, Clezio Marcos; Dal Lago, Alisson; Mendes, Odim; Batista, Inez S.; SantAnna, Nilson; Gatto, Rubens; Takahashi, Hisao; Costa, D. Joaquim; Banik Padua, Marcelo; Campos Velho, Haroldo
2016-07-01
On August 2007 the National Institute for Space Research started a task force to develop and operate a space weather program, which is known by the acronyms Embrace that stands for the Portuguese statement "Estudo e Monitoramento BRAasileiro de Clima Espacial" Program (Brazilian Space Weather Study and Monitoring program). The mission of the Embrace/INPE program is to monitor the Solar-Terrestrial environment, the magnetosphere, the upper atmosphere and the ground induced currents to prevent effects on technological and economic activities. The Embrace/INPE system monitors the physical parameters of the Sun-Earth environment, such as Active Regions (AR) in the Sun and solar radiation by using radio telescope, Coronal Mass Ejection (CME) information by satellite and ground-based cosmic ray monitoring, geomagnetic activity by the magnetometer network, and ionospheric disturbance by ionospheric sounders and using data collected by four GPS receiver network, geomagnetic activity by a magnetometer network, and provides a forecasting for Total Electronic Content (TEC) - 24 hours ahead - using a version of the SUPIM model which assimilates the two latter data using nudging approach. Most of these physical parameters are daily published on the Brazilian space weather program web portal, related to the entire network sensors available. Regarding outreach, it has being published a daily bulletin in Portuguese and English with the status of the space weather environment on the Sun, the Interplanetary Medium and close to the Earth. Since December 2011, all these activities are carried out at the Embrace Headquarter, a building located at the INPE's main campus. Recently, a comprehensive data bank and an interface layer are under commissioning to allow an easy and direct access to all the space weather data collected by Embrace through the Embrace web Portal. The information being released encompasses data from: (a) the Embrace Digisonde Network (Embrace DigiNet) that monitors the ionospheric profiles in two equatorial sites and in two low latitude sites; (b) several solar radio telescopes to monitor solar activity (under development); (c) the matrix of the GNSS TEC map over South America; (d) the Embrace Airglow All-sky Imagers Network (Embrace GlowNet); and (d) the Embrace Magnetometer Network (Embrace Magnet), all of them in South America. Also, the system allows subscription to space weather alerts and reports. Contacting Author: C. M. Denardini (clezio.denardin@inpe.br)
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
NASA Technical Reports Server (NTRS)
Greenspan, Sol; Feblowitz, Mark
1992-01-01
ACME is an experimental environment for investigating new approaches to modeling and analysis of system requirements and designs. ACME is built on and extends object-oriented conceptual modeling techniques and knowledge representation and reasoning (KRR) tools. The most immediate intended use for ACME is to help represent, understand, and communicate system designs during the early stages of system planning and requirements engineering. While our research is ostensibly aimed at software systems in general, we are particularly motivated to make an impact in the telecommunications domain, especially in the area referred to as Intelligent Networks (IN's). IN systems contain the software to provide services to users of a telecommunications network (e.g., call processing services, information services, etc.) as well as the software that provides the internal infrastructure for providing the services (e.g., resource management, billing, etc.). The software includes not only systems developed by the network proprietors but also by a growing group of independent service software providers.
Li, Xiaofang; Xu, Lizhong; Wang, Huibin; Song, Jie; Yang, Simon X.
2010-01-01
The traditional Low Energy Adaptive Cluster Hierarchy (LEACH) routing protocol is a clustering-based protocol. The uneven selection of cluster heads results in premature death of cluster heads and premature blind nodes inside the clusters, thus reducing the overall lifetime of the network. With a full consideration of information on energy and distance distribution of neighboring nodes inside the clusters, this paper proposes a new routing algorithm based on differential evolution (DE) to improve the LEACH routing protocol. To meet the requirements of monitoring applications in outdoor environments such as the meteorological, hydrological and wetland ecological environments, the proposed algorithm uses the simple and fast search features of DE to optimize the multi-objective selection of cluster heads and prevent blind nodes for improved energy efficiency and system stability. Simulation results show that the proposed new LEACH routing algorithm has better performance, effectively extends the working lifetime of the system, and improves the quality of the wireless sensor networks. PMID:22219670
Transparent data service with multiple wireless access
NASA Technical Reports Server (NTRS)
Dean, Richard A.; Levesque, Allen H.
1993-01-01
The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.
Zheng, Wei; Yan, Xiaoyong; Zhao, Wei; Qian, Chengshan
2017-12-20
A novel large-scale multi-hop localization algorithm based on regularized extreme learning is proposed in this paper. The large-scale multi-hop localization problem is formulated as a learning problem. Unlike other similar localization algorithms, the proposed algorithm overcomes the shortcoming of the traditional algorithms which are only applicable to an isotropic network, therefore has a strong adaptability to the complex deployment environment. The proposed algorithm is composed of three stages: data acquisition, modeling and location estimation. In data acquisition stage, the training information between nodes of the given network is collected. In modeling stage, the model among the hop-counts and the physical distances between nodes is constructed using regularized extreme learning. In location estimation stage, each node finds its specific location in a distributed manner. Theoretical analysis and several experiments show that the proposed algorithm can adapt to the different topological environments with low computational cost. Furthermore, high accuracy can be achieved by this method without setting complex parameters.
Ontology-Based Architecture for Intelligent Transportation Systems Using a Traffic Sensor Network.
Fernandez, Susel; Hadfi, Rafik; Ito, Takayuki; Marsa-Maestre, Ivan; Velasco, Juan R
2016-08-15
Intelligent transportation systems are a set of technological solutions used to improve the performance and safety of road transportation. A crucial element for the success of these systems is the exchange of information, not only between vehicles, but also among other components in the road infrastructure through different applications. One of the most important information sources in this kind of systems is sensors. Sensors can be within vehicles or as part of the infrastructure, such as bridges, roads or traffic signs. Sensors can provide information related to weather conditions and traffic situation, which is useful to improve the driving process. To facilitate the exchange of information between the different applications that use sensor data, a common framework of knowledge is needed to allow interoperability. In this paper an ontology-driven architecture to improve the driving environment through a traffic sensor network is proposed. The system performs different tasks automatically to increase driver safety and comfort using the information provided by the sensors.
Ontology-Based Architecture for Intelligent Transportation Systems Using a Traffic Sensor Network
Fernandez, Susel; Hadfi, Rafik; Ito, Takayuki; Marsa-Maestre, Ivan; Velasco, Juan R.
2016-01-01
Intelligent transportation systems are a set of technological solutions used to improve the performance and safety of road transportation. A crucial element for the success of these systems is the exchange of information, not only between vehicles, but also among other components in the road infrastructure through different applications. One of the most important information sources in this kind of systems is sensors. Sensors can be within vehicles or as part of the infrastructure, such as bridges, roads or traffic signs. Sensors can provide information related to weather conditions and traffic situation, which is useful to improve the driving process. To facilitate the exchange of information between the different applications that use sensor data, a common framework of knowledge is needed to allow interoperability. In this paper an ontology-driven architecture to improve the driving environment through a traffic sensor network is proposed. The system performs different tasks automatically to increase driver safety and comfort using the information provided by the sensors. PMID:27537878
A Secure Framework for Location Verification in Pervasive Computing
NASA Astrophysics Data System (ADS)
Liu, Dawei; Lee, Moon-Chuen; Wu, Dan
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
NASA Astrophysics Data System (ADS)
Elliott, E. M.; Bain, D. J.; Divers, M. T.; Crowley, K. J.; Povis, K.; Scardina, A.; Steiner, M.
2012-12-01
We describe a newly funded collaborative NSF initiative, ENERGY-NET (Energy, Environment and Society Learning Network), that brings together the Carnegie Museum of Natural History (CMNH) with the Learning Science and Geoscience research strengths at the University of Pittsburgh. ENERGY-NET aims to create rich opportunities for participatory learning and public education in the arena of energy, the environment, and society using an Earth systems science framework. We build upon a long-established teen docent program at CMNH and to form Geoscience Squads comprised of underserved teens. Together, the ENERGY-NET team, including museum staff, experts in informal learning sciences, and geoscientists spanning career stage (undergraduates, graduate students, faculty) provides inquiry-based learning experiences guided by Earth systems science principles. Together, the team works with Geoscience Squads to design "Exploration Stations" for use with CMNH visitors that employ an Earth systems science framework to explore the intersecting lenses of energy, the environment, and society. The goals of ENERGY-NET are to: 1) Develop a rich set of experiential learning activities to enhance public knowledge about the complex dynamics between Energy, Environment, and Society for demonstration at CMNH; 2) Expand diversity in the geosciences workforce by mentoring underrepresented teens, providing authentic learning experiences in earth systems science and life skills, and providing networking opportunities with geoscientists; and 3) Institutionalize ENERGY-NET collaborations among geosciences expert, learning researchers, and museum staff to yield long-term improvements in public geoscience education and geoscience workforce recruiting.
Sen, Alper; Gümüsay, M Umit; Kavas, Aktül; Bulucu, Umut
2008-09-25
Wireless communication networks offer subscribers the possibilities of free mobility and access to information anywhere at any time. Therefore, electromagnetic coverage calculations are important for wireless mobile communication systems, especially in Wireless Local Area Networks (WLANs). Before any propagation computation is performed, modeling of indoor radio wave propagation needs accurate geographical information in order to avoid the interruption of data transmissions. Geographic Information Systems (GIS) and spatial interpolation techniques are very efficient for performing indoor radio wave propagation modeling. This paper describes the spatial interpolation of electromagnetic field measurements using a feed-forward back-propagation neural network programmed as a tool in GIS. The accuracy of Artificial Neural Networks (ANN) and geostatistical Kriging were compared by adjusting procedures. The feedforward back-propagation ANN provides adequate accuracy for spatial interpolation, but the predictions of Kriging interpolation are more accurate than the selected ANN. The proposed GIS ensures indoor radio wave propagation model and electromagnetic coverage, the number, position and transmitter power of access points and electromagnetic radiation level. Pollution analysis in a given propagation environment was done and it was demonstrated that WLAN (2.4 GHz) electromagnetic coverage does not lead to any electromagnetic pollution due to the low power levels used. Example interpolated electromagnetic field values for WLAN system in a building of Yildiz Technical University, Turkey, were generated using the selected network architectures to illustrate the results with an ANN.
Şen, Alper; Gümüşay, M. Ümit; Kavas, Aktül; Bulucu, Umut
2008-01-01
Wireless communication networks offer subscribers the possibilities of free mobility and access to information anywhere at any time. Therefore, electromagnetic coverage calculations are important for wireless mobile communication systems, especially in Wireless Local Area Networks (WLANs). Before any propagation computation is performed, modeling of indoor radio wave propagation needs accurate geographical information in order to avoid the interruption of data transmissions. Geographic Information Systems (GIS) and spatial interpolation techniques are very efficient for performing indoor radio wave propagation modeling. This paper describes the spatial interpolation of electromagnetic field measurements using a feed-forward back-propagation neural network programmed as a tool in GIS. The accuracy of Artificial Neural Networks (ANN) and geostatistical Kriging were compared by adjusting procedures. The feedforward back-propagation ANN provides adequate accuracy for spatial interpolation, but the predictions of Kriging interpolation are more accurate than the selected ANN. The proposed GIS ensures indoor radio wave propagation model and electromagnetic coverage, the number, position and transmitter power of access points and electromagnetic radiation level. Pollution analysis in a given propagation environment was done and it was demonstrated that WLAN (2.4 GHz) electromagnetic coverage does not lead to any electromagnetic pollution due to the low power levels used. Example interpolated electromagnetic field values for WLAN system in a building of Yildiz Technical University, Turkey, were generated using the selected network architectures to illustrate the results with an ANN. PMID:27873854
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caschili, Simone, E-mail: s.caschili@ucl.ac.uk; De Montis, Andrea; Ganciu, Amedeo
2014-07-01
Academic literature has been continuously growing at such a pace that it can be difficult to follow the progression of scientific achievements; hence, the need to dispose of quantitative knowledge support systems to analyze the literature of a subject. In this article we utilize network analysis tools to build a literature review of scientific documents published in the multidisciplinary field of Strategic Environment Assessment (SEA). The proposed approach helps researchers to build unbiased and comprehensive literature reviews. We collect information on 7662 SEA publications and build the SEA Bibliographic Network (SEABN) employing the basic idea that two publications are interconnectedmore » if one cites the other. We apply network analysis at macroscopic (network architecture), mesoscopic (sub graph) and microscopic levels (node) in order to i) verify what network structure characterizes the SEA literature, ii) identify the authors, disciplines and journals that are contributing to the international discussion on SEA, and iii) scrutinize the most cited and important publications in the field. Results show that the SEA is a multidisciplinary subject; the SEABN belongs to the class of real small world networks with a dominance of publications in Environmental studies over a total of 12 scientific sectors. Christopher Wood, Olivia Bina, Matthew Cashmore, and Andrew Jordan are found to be the leading authors while Environmental Impact Assessment Review is by far the scientific journal with the highest number of publications in SEA studies. - Highlights: • We utilize network analysis to analyze scientific documents in the SEA field. • We build the SEA Bibliographic Network (SEABN) of 7662 publications. • We apply network analysis at macroscopic, mesoscopic and microscopic network levels. • We identify SEABN architecture, relevant publications, authors, subjects and journals.« less
Keeling, Jonathan W; Pryde, Julie A; Merrill, Jacqueline A
2013-01-01
The nation's 2862 local health departments (LHDs) are the primary means for assuring public health services for all populations. The objective of this study is to assess the effect of organizational network analysis on management decisions in LHDs and to demonstrate the technique's ability to detect organizational adaptation over time. We conducted a longitudinal network analysis in a full-service LHD with 113 employees serving about 187,000 persons. Network survey data were collected from employees at 3 times: months 0, 8, and 34. At time 1 the initial analysis was presented to LHD managers as an intervention with information on evidence-based management strategies to address the findings. At times 2 and 3 interviews documented managers' decision making and events in the task environment. Response rates for the 3 network analyses were 90%, 97%, and 83%. Postintervention (time 2) results showed beneficial changes in network measures of communication and integration. Screening and case identification increased for chlamydia and for gonorrhea. Outbreak mitigation was accelerated by cross-divisional teaming. Network measurements at time 3 showed LHD adaptation to H1N1 and budget constraints with increased centralization. Task redundancy increased dramatically after National Incident Management System training. Organizational network analysis supports LHD management with empirical evidence that can be translated into strategic decisions about communication, allocation of resources, and addressing knowledge gaps. Specific population health outcomes were traced directly to management decisions based on network evidence. The technique can help managers improve how LHDs function as organizations and contribute to our understanding of public health systems.
Şahin, Charlotte; Iseringhausen, Olaf; Hower, Kira; Liebe, Constanze; Rethmeier-Hanke, Anja; Wedmann, Bernd
2018-04-01
Regional planning of healthcare requires special consideration for the complex needs of elderly, multimorbid people living in a domestic environment. In the District of Lippe, a hospital (Klinikum Lippe) and network of ambulatory care physicians (Ärztenetz Lippe) developed and tested a geriatric care network based on case management for geriatric patients living in a domestic environment. The establishment of the geriatric care network (e.g. promoting networking acceptance and implementation) was formatively evaluated, e. g. with qualitative methods. Data were acquired by guideline-based interviews with experts and analyzed by qualitative content analysis according to Mayring. Structural effects included forming a cross-sectoral and interdisciplinary network for a functioning care network and a geriatric care pathway. The practical work of case managers (CM) is essential for communication with patients, family members and care providers as well as integrating providers into the network. A critical factor was working together with general practitioners and the close cooperation with the hospital's department of geriatric. The quality of care is improved because of exchange of information between sectors and continuity in the course of care. In the District of Lippe the quality of care was improved and structures of care were integrated by the network according to the needs of the target group. The integrative perspective was achieved in particular by the geriatric care pathway and integration of providers into the communication and care process; however, the scope of this care model could not be extended into routine care due to the rigid and subdivided health care system.
Intoxigenic digital spaces? Youth, social networking sites and alcohol marketing.
Griffiths, Richard; Casswell, Sally
2010-09-01
To examine how young people in New Zealand engage with alcohol and reproduce alcohol marketing messages and alcohol-related branding in 'Bebo', a popular social networking site (SNS) on the Internet. Data are drawn from information posted on approximately 150 Bebo Web pages and analysed by way of textual analysis and cyberspace ethnography. Social networking sites, such as Bebo, provide young people with a digital space in which to share a range of alcohol marketing messages via peer-to-peer transmission. Bebo also enables youth to communicate to one another how they consume alcohol and their views of alcohol marketing messages. The information being shared by young people who use Bebo is openly provided in the form of personal information, forum comments, digital photographs and answering quizzes about their engagement with alcohol. Through this sharing of information in the digital Internet environment, young people are creating 'intoxigenic social identities' as well as 'intoxigenic digital spaces' that further contribute towards the normalisation of youth consumption of alcohol. A better understanding of how youth are using the Internet to share their experiences with alcohol and engagement with alcohol-related messages is crucial to public health research as alcohol marketing practices rapidly evolve.
A Network Coverage Information-Based Sensor Registry System for IoT Environments
Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon
2016-01-01
The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user’s mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance. PMID:27463717
A Network Coverage Information-Based Sensor Registry System for IoT Environments.
Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon
2016-07-25
The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.
Visual sensory networks and effective information transfer in animal groups.
Strandburg-Peshkin, Ariana; Twomey, Colin R; Bode, Nikolai W F; Kao, Albert B; Katz, Yael; Ioannou, Christos C; Rosenthal, Sara B; Torney, Colin J; Wu, Hai Shan; Levin, Simon A; Couzin, Iain D
2013-09-09
Social transmission of information is vital for many group-living animals, allowing coordination of motion and effective response to complex environments. Revealing the interaction networks underlying information flow within these groups is a central challenge. Previous work has modeled interactions between individuals based directly on their relative spatial positions: each individual is considered to interact with all neighbors within a fixed distance (metric range), a fixed number of nearest neighbors (topological range), a 'shell' of near neighbors (Voronoi range), or some combination (Figure 1A). However, conclusive evidence to support these assumptions is lacking. Here, we employ a novel approach that considers individual movement decisions to be based explicitly on the sensory information available to the organism. In other words, we consider that while spatial relations do inform interactions between individuals, they do so indirectly, through individuals' detection of sensory cues. We reconstruct computationally the visual field of each individual throughout experiments designed to investigate information propagation within fish schools (golden shiners, Notemigonus crysoleucas). Explicitly considering visual sensing allows us to more accurately predict the propagation of behavioral change in these groups during leadership events. Furthermore, we find that structural properties of visual interaction networks differ markedly from those of metric and topological counterparts, suggesting that previous assumptions may not appropriately reflect information flow in animal groups. Copyright © 2013 Elsevier Ltd. All rights reserved.
A nested virtualization tool for information technology practical education.
Pérez, Carlos; Orduña, Juan M; Soriano, Francisco R
2016-01-01
A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that would otherwise be unfeasible. Also, its portability allows to reproduce classroom activities, as well as the students' autonomous work.
Frank, Lawrence D; Fox, Eric H; Ulmer, Jared M; Chapman, James E; Kershaw, Suzanne E; Sallis, James F; Conway, Terry L; Cerin, Ester; Cain, Kelli L; Adams, Marc A; Smith, Graham R; Hinckson, Erica; Mavoa, Suzanne; Christiansen, Lars B; Hino, Adriano Akira F; Lopes, Adalberto A S; Schipperijn, Jasper
2017-01-23
Advancements in geographic information systems over the past two decades have increased the specificity by which an individual's neighborhood environment may be spatially defined for physical activity and health research. This study investigated how different types of street network buffering methods compared in measuring a set of commonly used built environment measures (BEMs) and tested their performance on associations with physical activity outcomes. An internationally-developed set of objective BEMs using three different spatial buffering techniques were used to evaluate the relative differences in resulting explanatory power on self-reported physical activity outcomes. BEMs were developed in five countries using 'sausage,' 'detailed-trimmed,' and 'detailed,' network buffers at a distance of 1 km around participant household addresses (n = 5883). BEM values were significantly different (p < 0.05) for 96% of sausage versus detailed-trimmed buffer comparisons and 89% of sausage versus detailed network buffer comparisons. Results showed that BEM coefficients in physical activity models did not differ significantly across buffering methods, and in most cases BEM associations with physical activity outcomes had the same level of statistical significance across buffer types. However, BEM coefficients differed in significance for 9% of the sausage versus detailed models, which may warrant further investigation. Results of this study inform the selection of spatial buffering methods to estimate physical activity outcomes using an internationally consistent set of BEMs. Using three different network-based buffering methods, the findings indicate significant variation among BEM values, however associations with physical activity outcomes were similar across each buffering technique. The study advances knowledge by presenting consistently assessed relationships between three different network buffer types and utilitarian travel, sedentary behavior, and leisure-oriented physical activity outcomes.
Simulation Modeling and Performance Evaluation of Space Networks
NASA Technical Reports Server (NTRS)
Jennings, Esther H.; Segui, John
2006-01-01
In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions
Hamada, Yuki; O'Connor, Ben L.; Orr, Andrew B.; ...
2016-03-26
In this paper, understanding the spatial patterns of ephemeral streams is crucial for understanding how hydrologic processes influence the abundance and distribution of wildlife habitats in desert regions. Available methods for mapping ephemeral streams at the watershed scale typically underestimate the size of channel networks. Although remote sensing is an effective means of collecting data and obtaining information on large, inaccessible areas, conventional techniques for extracting channel features are not sufficient in regions that have small topographic gradients and subtle target-background spectral contrast. By using very high resolution multispectral imagery, we developed a new algorithm that applies landscape information tomore » map ephemeral channels in desert regions of the Southwestern United States where utility-scale solar energy development is occurring. Knowledge about landscape features and structures was integrated into the algorithm using a series of spectral transformation and spatial statistical operations to integrate information about landscape features and structures. The algorithm extracted ephemeral stream channels at a local scale, with the result that approximately 900% more ephemeral streams was identified than what were identified by using the U.S. Geological Survey’s National Hydrography Dataset. The accuracy of the algorithm in detecting channel areas was as high as 92%, and its accuracy in delineating channel center lines was 91% when compared to a subset of channel networks that were digitized by using the very high resolution imagery. Although the algorithm captured stream channels in desert landscapes across various channel sizes and forms, it often underestimated stream headwaters and channels obscured by bright soils and sparse vegetation. While further improvement is warranted, the algorithm provides an effective means of obtaining detailed information about ephemeral streams, and it could make a significant contribution toward improving the hydrological modelling of desert environments.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamada, Yuki; O'Connor, Ben L.; Orr, Andrew B.
In this paper, understanding the spatial patterns of ephemeral streams is crucial for understanding how hydrologic processes influence the abundance and distribution of wildlife habitats in desert regions. Available methods for mapping ephemeral streams at the watershed scale typically underestimate the size of channel networks. Although remote sensing is an effective means of collecting data and obtaining information on large, inaccessible areas, conventional techniques for extracting channel features are not sufficient in regions that have small topographic gradients and subtle target-background spectral contrast. By using very high resolution multispectral imagery, we developed a new algorithm that applies landscape information tomore » map ephemeral channels in desert regions of the Southwestern United States where utility-scale solar energy development is occurring. Knowledge about landscape features and structures was integrated into the algorithm using a series of spectral transformation and spatial statistical operations to integrate information about landscape features and structures. The algorithm extracted ephemeral stream channels at a local scale, with the result that approximately 900% more ephemeral streams was identified than what were identified by using the U.S. Geological Survey’s National Hydrography Dataset. The accuracy of the algorithm in detecting channel areas was as high as 92%, and its accuracy in delineating channel center lines was 91% when compared to a subset of channel networks that were digitized by using the very high resolution imagery. Although the algorithm captured stream channels in desert landscapes across various channel sizes and forms, it often underestimated stream headwaters and channels obscured by bright soils and sparse vegetation. While further improvement is warranted, the algorithm provides an effective means of obtaining detailed information about ephemeral streams, and it could make a significant contribution toward improving the hydrological modelling of desert environments.« less
The Earth System CoG Collaboration Environment
NASA Astrophysics Data System (ADS)
DeLuca, C.; Murphy, S.; Cinquini, L.; Treshansky, A.; Wallis, J. C.; Rood, R. B.; Overeem, I.
2013-12-01
The Earth System CoG supports collaborative Earth science research and product development in virtual organizations that span multiple projects and communities. It provides access to data, metadata, and visualization services along with tools that support open project governance, and it can be used to host individual projects or to profile projects hosted elsewhere. All projects on CoG are described using a project ontology - an organized common vocabulary - that exposes information needed for collaboration and decision-making. Projects can be linked into a network, and the underlying ontology enables consolidated views of information across the network. This access to information promotes the creation of active and knowledgeable project governance, at both individual and aggregate project levels. CoG is being used to support software development projects, model intercomparison projects, training classes, and scientific programs. Its services and ontology are customizable by project. This presentation will provide an overview of CoG, review examples of current use, and discuss how CoG can be used as knowledge and coordination hub for networks of projects in the Earth Sciences.
Visualizing Complex Environments in the Geo- and BioSciences
NASA Astrophysics Data System (ADS)
Prabhu, A.; Fox, P. A.; Zhong, H.; Eleish, A.; Ma, X.; Zednik, S.; Morrison, S. M.; Moore, E. K.; Muscente, D.; Meyer, M.; Hazen, R. M.
2017-12-01
Earth's living and non-living components have co-evolved for 4 billion years through numerous positive and negative feedbacks. Earth and life scientists have amassed vast amounts of data in diverse fields related to planetary evolution through deep time-mineralogy and petrology, paleobiology and paleontology, paleotectonics and paleomagnetism, geochemistry and geochrononology, genomics and proteomics, and more. Integrating the data from these complimentary disciplines is very useful in gaining an understanding of the evolution of our planet's environment. The integrated data however, represent many extremely complex environments. In order to gain insights and make discoveries using this data, it is important for us to model and visualize these complex environments. As part of work in understanding the "Co-Evolution of Geo and Biospheres using Data Driven Methodologies," we have developed several visualizations to help represent the information stored in the datasets from complimentary disciplines. These visualizations include 2D and 3D force directed Networks, Chord Diagrams, 3D Klee Diagrams. Evolving Network Diagrams, Skyline Diagrams and Tree Diagrams. Combining these visualizations with the results of machine learning and data analysis methods leads to a powerful way to discover patterns and relationships about the Earth's past and today's changing environment.
Information Power Grid Posters
NASA Technical Reports Server (NTRS)
Vaziri, Arsi
2003-01-01
This document is a summary of the accomplishments of the Information Power Grid (IPG). Grids are an emerging technology that provide seamless and uniform access to the geographically dispersed, computational, data storage, networking, instruments, and software resources needed for solving large-scale scientific and engineering problems. The goal of the NASA IPG is to use NASA's remotely located computing and data system resources to build distributed systems that can address problems that are too large or complex for a single site. The accomplishments outlined in this poster presentation are: access to distributed data, IPG heterogeneous computing, integration of large-scale computing node into distributed environment, remote access to high data rate instruments,and exploratory grid environment.
Breaking the ice and forging links: the importance of socializing in research.
Stobbe, Miranda; Mishra, Tarun; Macintyre, Geoff
2013-01-01
When meeting someone for the first time-whether another PhD student, or the Founding Editor-in-chief of PLOS Computational Biology-nothing breaks the ice like eating pancakes or having drinks together. A social atmosphere provides a relaxed, informal environment where people can connect, share ideas, and form collaborations. Being able to build a network and thrive in a social environment is crucial to a successful scientific career. This article highlights the importance of bringing people together who speak the same scientific language in an informal setting. Using examples of events held by Regional Student Groups of the ISCB's Student Council, this article shows that socializing is much more than simply sharing a drink.
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
Li, Xing; Chen, Dexin; Li, Chunyan; Wang, Liangmin
2015-07-03
With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people's lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.
Bennett, Rachel; Chepngeno-Langat, Gloria; Evandrou, Maria; Falkingham, Jane
2015-03-01
Older people in slum settings are a vulnerable sub-group during crises, yet have received minimal attention in the development discourse. This paper examines the protective role of different types of social networks for older slum dwellers' wellbeing during adversity by investigating the relationship between social networks, the Kenyan 2007/08 post-election violence, and dimensions of wellbeing namely self-rated health, life satisfaction and happiness amongst older people in the Korogocho slum, Nairobi. The analyses are based on conditional change logistic regression models using data from a unique longitudinal survey of the health and wellbeing of older people. The results show that maintaining or increasing formal local networks reduced the detrimental effects of the post-election violence for older people's wellbeing, whilst household environment and informal local and non-local networks did not influence the relationship. Consequently, the paper provides evidence that supporting inclusive community organisations which are accessible to older people can be valuable in promoting the resilience of this population group. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.