127 results on '"Network component"'
Search Results
2. Evolutions of SINET
- Author
-
Zhang, Hongke, Su, Wei, Quan, Wei, Zhang, Hongke, Su, Wei, and Quan, Wei
- Published
- 2016
- Full Text
- View/download PDF
3. Pedestrian Modelling in NetLogo
- Author
-
Procházka, Jan, Cimler, Richard, Olševičová, Kamila, Kacprzyk, Janusz, Series editor, Sinčák, Peter, editor, Hartono, Pitoyo, editor, Virčíková, Mária, editor, Vaščák, Ján, editor, and Jakša, Rudolf, editor
- Published
- 2015
- Full Text
- View/download PDF
4. Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks
- Author
-
Papadopoulos, Stavros, Mavroudis, Vasilios, Drosou, Anastasios, Tzovaras, Dimitrios, Czachórski, Tadeusz, editor, Gelenbe, Erol, editor, and Lent, Ricardo, editor
- Published
- 2014
- Full Text
- View/download PDF
5. Evaluation approach for network components performance using trustworthiness measurement
- Author
-
Gang XIONG, Ju-long LAN, Yu-xiang HU, and Shi-ran LIU
- Subjects
network component ,trustworthiness ,combination weight ,network controller ,Telecommunication ,TK5101-6720 - Abstract
For the network components selecting problem involved the process of building the new network and net-work service,a network component evaluation method was proposed based on the trustworthiness measurement and the model of the multiple attribute decision analysis.First of all,according to the flexible characteristics of the network ap-plication environment,an on-demand driven and dynamic strategy was designed for constructing trustworthiness index tree.Secondly,the uncertainty of the subjective weight was reduced by using the fuzzy analytic hierarchy process,and the combination weight calculated from the subjective objective weight was used to improve the fairness of weight-ing operation.Next,in the decision stage,the evaluation results were obtained through the integrated use of processing strategies which include the index data utility transformation,the trustworthiness attribute vector construction and the calculation of vector relative approximation degree.Finally,the rationality,applicability and validity of the presented ap-proach are demonstrated with the evaluation of the software defined network controllers,and the results contribute to provide operators more decision information.
- Published
- 2016
- Full Text
- View/download PDF
6. Assessment of Network Coding Mechanism for the Network Protocol Stack 802.15.4/6LoWPAN
- Author
-
Byłak, Michał, Laskowski, Dariusz, Zamojski, Wojciech, editor, Mazurkiewicz, Jacek, editor, Sugier, Jarosław, editor, Walkowiak, Tomasz, editor, and Kacprzyk, Janusz, editor
- Published
- 2013
- Full Text
- View/download PDF
7. Network Monitoring Using Intelligent Mobile Agents
- Author
-
Sladić, Goran, Vidaković, Milan, Konjović, Zora, and Pap, Endre, editor
- Published
- 2013
- Full Text
- View/download PDF
8. A Robustness Testing Method for Network Security
- Author
-
Fu, Yulong, Kone, Ousmane, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Georgiadis, Christos K., editor, Jahankhani, Hamid, editor, Pimenidis, Elias, editor, Bashroush, Rabih, editor, and Al-Nemrat, Ameer, editor
- Published
- 2012
- Full Text
- View/download PDF
9. Network Securing against Threatening Requests
- Author
-
Fu, Yulong, Kone, Ousmane, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Garcia-Alfaro, Joaquin, editor, Navarro-Arribas, Guillermo, editor, Cuppens-Boulahia, Nora, editor, and de Capitani di Vimercati, Sabrina, editor
- Published
- 2012
- Full Text
- View/download PDF
10. Integrated 3D Modeling of Multi-utility Networks and Their Interdependencies for Critical Infrastructure Analysis
- Author
-
Becker, T., Nagel, C., Kolbe, T. H., Kolbe, Thomas H., editor, König, Gerhard, editor, and Nagel, Claus, editor
- Published
- 2011
- Full Text
- View/download PDF
11. The CODESNET Approach to SME Networks Analysis
- Author
-
Villa, Agostino, Antonelli, Dario, Caroleo, Brunella, Taurino, Teresa, Villa, Agostino, editor, and Antonelli, Dario, editor
- Published
- 2009
- Full Text
- View/download PDF
12. Evaluation of the Cost Advantage of Application and Context Aware Networking
- Author
-
Giacomazzi, P., Poli, A., D’Atri, Alessandro, De Marco, Marco, and Casalino, Nunzio
- Published
- 2008
- Full Text
- View/download PDF
13. Design and Implementation of Storage of Network Component Based on NetFPGA10G
- Author
-
Shuolin Zhang and Hongbin Luo
- Subjects
next generation network ,network component ,storage function ,NetFPGA10G ,Telecommunication ,TK5101-6720 ,Technology - Abstract
Presently, it is hot to do research about the next generation network architecture based on the content centric network. The network component, as an important part of it, will be able to forward as well as save the content in the meantime inevitably. New type of network component was designed and implemented, based on NetFPGA10G hardware platform, to forward the data and store the content at the same time, thus to improve the utilization rate of network resources.
- Published
- 2014
14. Optimal Monitoring Equipment Placement for Fault and Attack Location in Transparent Optical Networks
- Author
-
Machuca, Carmen Mas, Tomkos, Ioannis, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Mitrou, Nikolas, editor, Kontovasilis, Kimon, editor, Rouskas, George N., editor, Iliadis, Ilias, editor, and Merakos, Lazaros, editor
- Published
- 2004
- Full Text
- View/download PDF
15. A Role of DEVS Simulation for Information Assurance
- Author
-
Chi, Sung-Do, Park, Jong Sou, Lee, Jang-Se, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Chae, Ki-Joon, editor, and Yung, Moti, editor
- Published
- 2004
- Full Text
- View/download PDF
16. Summary
- Author
-
Oliver, Dev, Zdonik, Stan, Series editor, Shekhar, Shashi, Series editor, Katz, Jonathan, Series editor, Wu, Xindong, Series editor, Jain, Lakhmi C., Series editor, Padua, David, Series editor, Shen, Xuemin Sherman, Series editor, Furht, Borko, Series editor, Subrahmanian, V.S., Series editor, Hebert, Martial, Series editor, Ikeuchi, Katsushi, Series editor, Siciliano, Bruno, Series editor, Jajodia, Sushil, Series editor, Lee, Newton, Series editor, and Oliver, Dev
- Published
- 2016
- Full Text
- View/download PDF
17. Visualising the Internal Components of Networks
- Author
-
Woodward, Clinton, Murray, Gerard, Carbonell, Jaime G., editor, Siekmann, Jörg, editor, Chung, Paul W. H., editor, Hinde, Chris, editor, and Ali, Moonis, editor
- Published
- 2003
- Full Text
- View/download PDF
18. Modeling Business Collaborations in Context
- Author
-
Hofreiter, Birgit, Huemer, Christian, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Meersman, Robert, editor, and Tari, Zahir, editor
- Published
- 2003
- Full Text
- View/download PDF
19. SECUSIM: A Tool for the Cyber-Attack Simulation
- Author
-
Park, Jong Sou, Lee, Jang-Se, Kim, Hwan Kuk, Jeong, Jeong-Rye, Yeom, Dong-Bok, Chi, Sung-Do, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Qing, Sihan, editor, Okamoto, Tatsuaki, editor, and Zhou, Jianying, editor
- Published
- 2001
- Full Text
- View/download PDF
20. FORMATION AND ANALYSIS OF REGULATED AND FREELY NEGOTIATED PRICES OF ELECTRICITY IN BULGARIA.
- Author
-
Angelova, J.
- Subjects
- *
ELECTRIC power production , *ECONOMICS ,ENERGY consumption management ,BULGARIAN economic policy - Abstract
Moving from a state monopoly to a competitive environment is a major challenge for all energy companies. Under a regulated market, the recognition of costs passes through the regulator regardless of how effective the spending of the funds is. By creating a free energy market, it aims at streamlining production costs, improving energy efficiency and introducing competition in the sector. For the purpose of the analysis, information on the free market price chain is used and an analysis of the share distribution of the network component with VAT and excise is made. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
21. Low-cost Security for Next-generation IoT Networks
- Author
-
Daniel Steinmetzer, Tolga Arul, Saad Ahmad, Stefan Katzenbeisser, Matthias Hollick, and Nikolaos Athanasios Anagnostopoulos
- Subjects
Router ,Network component ,Network module ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Physical unclonable function ,020206 networking & telecommunications ,02 engineering and technology ,020202 computer hardware & architecture ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Communications protocol ,Internet of Things ,business ,5G - Abstract
In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the pervasive character of next-generation communication protocols, such as the 5G technology, have become widely evident. In this work, we identify the need for low-cost security in current and next-generation IoT networks and address this demand through the implementation, testing, and validation of an intrinsic low-cost and low-overhead hardware-based security primitive within an inherent network component. In particular, an intrinsic Physical Unclonable Function (PUF) is implemented in the peripheral network module of a tri-band commercial off-the-shelf router. Subsequently, we demonstrate the robustness of this PUF to ambient temperature variations and to limited natural aging, and examine in detail its potential for securing the next generation of IoT networks and other applications. Finally, the security of the proposed PUF-based schemes is briefly assessed and discussed.
- Published
- 2020
- Full Text
- View/download PDF
22. Chemical Biology Framework to Illuminate Proteostasis
- Author
-
Rebecca M. Sebastian and Matthew D. Shoulders
- Subjects
Protein Folding ,Proteome ,Computer science ,Chemical biology ,Molecular Probe Techniques ,Computational biology ,Network composition ,Protein Engineering ,Biochemistry ,Article ,Small Molecule Libraries ,Protein Aggregates ,03 medical and health sciences ,0302 clinical medicine ,Animals ,Humans ,Proteostasis Deficiencies ,030304 developmental biology ,Network component ,0303 health sciences ,Protein Transport ,Proteostasis ,Gene Expression Regulation ,Unfolded Protein Response ,CRISPR-Cas Systems ,Heat-Shock Response ,030217 neurology & neurosurgery ,Half-Life ,Molecular Chaperones ,Signal Transduction - Abstract
© 2020 Annual Reviews Inc.. All rights reserved. Protein folding in the cell is mediated by an extensive network of >1,000 chaperones, quality control factors, and trafficking mechanisms collectively termed the proteostasis network. While the components and organization of this network are generally well established, our understanding of how protein-folding problems are identified, how the network components integrate to successfully address challenges, and what types of biophysical issues each proteostasis network component is capable of addressing remains immature. We describe a chemical biology-informed framework for studying cellular proteostasis that relies on selection of interesting protein-folding problems and precise researcher control of proteostasis network composition and activities. By combining these methods with multifaceted strategies to monitor protein folding, degradation, trafficking, and aggregation in cells, researchers continue to rapidly generate new insights into cellular proteostasis.
- Published
- 2020
- Full Text
- View/download PDF
23. Universal gap scaling in percolation
- Author
-
Jun Meng, Jingfang Fan, Yang Liu, Abbas Ali Saberi, Jürgen Kurths, and Jan Nagler
- Subjects
Physics ,Network component ,Social connectedness ,Critical phenomena ,General Physics and Astronomy ,01 natural sciences ,010305 fluids & plasmas ,Universality (dynamical systems) ,Critical scaling ,Gumbel distribution ,0103 physical sciences ,Statistical physics ,010306 general physics ,Scaling - Abstract
Universality is a principle that fundamentally underlies many critical phenomena, ranging from epidemic spreading to the emergence or breakdown of global connectivity in networks. Percolation, the transition to global connectedness on gradual addition of links, may exhibit substantial gaps in the size of the largest connected network component. We uncover that the largest gap statistics is governed by extreme-value theory. This allows us to unify continuous and discontinuous percolation by virtue of universal critical scaling functions, obtained from normal and extreme-value statistics. Specifically, we show that the universal scaling function of the size of the largest gap is given by the extreme-value Gumbel distribution. This links extreme-value statistics to universality and criticality in percolation. Percolation transitions underpin a generic class of phenomena associated with the degree of connectedness in networks. A detailed numerical study now uncovers a universal scaling in the size of the largest cluster identified in such percolation models.
- Published
- 2020
- Full Text
- View/download PDF
24. Probing pluripotency gene regulatory networks with quantitative live cell imaging
- Author
-
Anne L. Plant, Jeffrey Stinson, and Michael Halter
- Subjects
Pluripotency ,Computer science ,Systems biology ,lcsh:Biotechnology ,Biophysics ,Gene regulatory network ,Computational biology ,Review Article ,Biochemistry ,Dynamic fluctuations ,03 medical and health sciences ,Phenotype heterogeneity ,0302 clinical medicine ,Structural Biology ,Live cell imaging ,lcsh:TP248.13-248.65 ,Genetics ,Transcription factors ,Induced pluripotent stem cell ,030304 developmental biology ,Network model ,Network component ,Quantitative light microscopy ,0303 health sciences ,End point ,Systems Biology ,Computer Science Applications ,Dynamic cell response ,iPS cells ,030220 oncology & carcinogenesis ,Fluorescent reporter cell lines ,Biotechnology ,Network analysis - Abstract
Live cell imaging uniquely enables the measurement of dynamic events in single cells, but it has not been used often in the study of gene regulatory networks. Network components can be examined in relation to one another by quantitative live cell imaging of fluorescent protein reporter cell lines that simultaneously report on more than one network component. A series of dual-reporter cell lines would allow different combinations of network components to be examined in individual cells. Dynamical information about interacting network components in individual cells is critical to predictive modeling of gene regulatory networks, and such information is not accessible through omics and other end point techniques. Achieving this requires that gene-edited cell lines are appropriately designed and adequately characterized to assure the validity of the biological conclusions derived from the expression of the reporters. In this brief review we discuss what is known about the importance of dynamics to network modeling and review some recent advances in optical microscopy methods and image analysis approaches that are making the use of quantitative live cell imaging for network analysis possible. We also discuss how strategies for genetic engineering of reporter cell lines can influence the biological relevance of the data.
- Published
- 2020
25. Sensitivity analysis and risk assessment
- Author
-
Stordahl, Kjell, Sharrock, Stuart, editor, and Ims, Leif Aarthun, editor
- Published
- 1998
- Full Text
- View/download PDF
26. Agent-based schemes for plug-and-play network components
- Author
-
Bieszczad, Andrzej, Raza, Syed Kamran, Pagurek, Bernard, White, Tony, Carbonell, Jaime G., editor, Siekmann, Jöorg, editor, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Albayrak, Sahin, editor, and Garijo, Francisco J., editor
- Published
- 1998
- Full Text
- View/download PDF
27. Distributed fault location in networks using mobile agents
- Author
-
White, Tony, Bieszczad, Andrzej, Pagurek, Bernard, Carbonell, Jaime G., editor, Siekmann, Jöorg, editor, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Albayrak, Sahin, editor, and Garijo, Francisco J., editor
- Published
- 1998
- Full Text
- View/download PDF
28. Enabling a Mobile Network Manager (MNM) through mobile agents
- Author
-
Sahai, Akhil, Morin, Christine, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Rothermel, Kurt, editor, and Hohl, Fritz, editor
- Published
- 1998
- Full Text
- View/download PDF
29. Mnemosyne
- Author
-
Siqi Liu, Philipp Moll, and Lixia Zhang
- Subjects
010302 applied physics ,Network component ,Immutability ,Computer science ,Event (computing) ,Logging ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Content based networking ,computer.software_genre ,01 natural sciences ,Proof-of-work system ,0103 physical sciences ,Distributed ledger ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,computer - Abstract
This poster describes the design of Mnemosyne, a distributed logger running over Named Data Networking. Mnemosyne utilizes proof of authenticity instead of proof of work. It assures immutability of logged events by interlocking all event records in a DAG mesh. By using a distributed design, Mnemosyne provides both a high logging throughput and system resiliency in face of network component failures.
- Published
- 2021
- Full Text
- View/download PDF
30. Network security policy models
- Author
-
Varadharajan, Vijay, Goos, G., editor, Hartmanis, J., editor, Barstow, D., editor, Brauer, W., editor, Brinch Hansen, P., editor, Gries, D., editor, Luckham, D., editor, Moler, C., editor, Pnueli, A., editor, Seegmüller, G., editor, Stoer, J., editor, Wirth, N., editor, Seberry, Jennifer, editor, and Pieprzyk, Josef, editor
- Published
- 1990
- Full Text
- View/download PDF
31. Factors Associated With Human Immunodeficiency Virus Infections Linked in Genetic Clusters But Disconnected in Partner Tracing
- Author
-
Dana K. Pasquale, William C. Miller, Joseph Sebastian, Peter A. Leone, Sue L. Ledford, Lynne A Sampson, Irene A. Doherty, and Ann M Dennis
- Subjects
Adult ,Male ,Microbiology (medical) ,medicine.medical_specialty ,Human immunodeficiency virus (HIV) ,HIV Infections ,Dermatology ,medicine.disease_cause ,Transgender Persons ,Article ,03 medical and health sciences ,0302 clinical medicine ,North Carolina ,medicine ,Cluster Analysis ,Humans ,030212 general & internal medicine ,Multivariable model ,Generalized estimating equation ,Network component ,Models, Statistical ,030505 public health ,business.industry ,Public health ,Public Health, Environmental and Occupational Health ,HIV ,Odds ratio ,Middle Aged ,Partner notification ,Infectious Diseases ,pol Gene Products, Human Immunodeficiency Virus ,Female ,Contact Tracing ,0305 other medical science ,business ,Demography ,Dyad - Abstract
BACKGROUND Successful partner notification can improve community-level outcomes by increasing the proportion of persons living with human immunodeficiency virus (HIV) who are linked to HIV care and virally suppressed, but it is resource intensive. Understanding where HIV transmission pathways may be undetected by routine partner notification may help improve case finding strategies. METHODS We combined partner notification interview and HIV sequence data for persons diagnosed with HIV in Wake County, NC in 2012 to 2013 to evaluate partner contact networks among persons with HIV pol gene sequences 2% or less pairwise genetic distance. We applied a set of multivariable generalized estimating equations to identify correlates of disparate membership in genetic versus partner contact networks. RESULTS In the multivariable model, being in a male-male pair (adjusted odds ratio [AOR], 16.7; P = 0.01), chronic HIV infection status (AOR, 4.5; P < 0.01), and increasing percent genetic distance between each dyad member's HIV pol gene sequence (AOR, 8.3 per each 1% increase, P < 0.01) were all associated with persons with HIV clustering but not being identified in the partner notification network component. Having anonymous partners or other factors typically associated with risk behavior were not associated. CONCLUSIONS Based on genetic networks, partnerships which may be stigmatized, may have occurred farther back in time or may have an intervening partner were more likely to be unobserved in the partner contact network. The HIV genetic cluster information contributes to public health understanding of HIV transmission networks in these settings where partner identifying information is not available.
- Published
- 2019
- Full Text
- View/download PDF
32. Robust voltage control algorithm incorporating model uncertainty impacts
- Author
-
François Vallée, Jean-François Toubeau, Bashir Bakhshideh Zad, and Jacques Lobry
- Subjects
Network component ,Computer science ,020209 energy ,Voltage control ,020208 electrical & electronic engineering ,Monte Carlo method ,Control variable ,Energy Engineering and Power Technology ,02 engineering and technology ,law.invention ,Control and Systems Engineering ,law ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Robust control ,Transformer ,Algorithm ,Network model ,Voltage - Abstract
This study addresses the voltage control problem of the medium-voltage distribution systems under uncertainty of the network model. A robust voltage control algorithm (RVCA) is developed in order to manage the voltage constraints considering uncertainties associated with the parameters of load, line, and transformer models. The RVCA determines a corrective solution that remains immunised against any realisation of uncertainty associated with the parameters of the network model. To this end, prior to formulating the voltage control problem, Monte Carlo (MC) simulations are used to characterise uncertain parameters of the network component models and load flow (LF) calculations are carried out to evaluate their impacts. The voltage constraints management under the uncertain environment is then formulated as a robust optimisation (RO) problem. The latter is constructed based on the results obtained through the MC simulations and LF calculations. Once the RO is solved, in order to check the robustness of the solution, system voltages are evaluated using the LF calculations considering the new set-points of control variables and uncertainty of network parameters. The simulation results reveal that neglecting model uncertainty in the voltage control problem can lead to infeasible solutions while the proposed RVCA, at an extra cost, determines a corrective solution which remains protected against the studied uncertainties.
- Published
- 2019
- Full Text
- View/download PDF
33. Quantitative Efficiency Evaluation Method for Transportation Networks.
- Author
-
Jin Qin, Yuxin He, and Linglin Ni
- Abstract
An effective evaluation of transportation network efficiency/performance is essential to the establishment of sustainable development in any transportation system. Based on a redefinition of transportation network efficiency, a quantitative efficiency evaluation method for transportation network is proposed, which could reflect the effects of network structure, traffic demands, travel choice, and travel costs on network efficiency. Furthermore, the efficiency-oriented importance measure for network components is presented, which can be used to help engineers identify the critical nodes and links in the network. The numerical examples show that, compared with existing efficiency evaluation methods, the network efficiency value calculated by the method proposed in this paper can portray the real operation situation of the transportation network as well as the effects of main factors on network efficiency. We also find that the network efficiency and the importance values of the network components both are functions of demands and network structure in the transportation network. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
34. Power System Failures
- Author
-
Bart W. Tuinema, Mart A. M. M. van der Meijden, José Luis Rueda Torres, Francisco Gonzalez-Longatt, and Alexandru Stefanov
- Subjects
Network component ,Electric power system ,Computer science ,Blackout ,Redundancy (engineering) ,Probabilistic logic ,medicine ,medicine.symptom ,Reliability engineering - Abstract
Power systems can fail because of various reasons. Often, the effect of smaller failures is limited to the failure and repair of a single network component, as the power system is designed and operated considering \(N-1\,\) redundancy. Serious failures of the power system are therefore caused by combinations of component failures and other influencing factors. In probabilistic reliability analysis, the reliability of the power system is determined based on the reliability of individual components. This chapter discusses how failures of power system components can lead to a large blackout. Failure statistics of components are analyzed and historical blackouts are studied to obtain more insight into this matter.
- Published
- 2020
- Full Text
- View/download PDF
35. Fluid-Based Modeling of Transport Protocol for Information-Centric Networking
- Author
-
Ryo Nakamura, Soma Yamamoto, and Hiroyuki Ohsaki
- Subjects
Network component ,Router ,Network architecture ,Focus (computing) ,business.industry ,Computer science ,Network packet ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,0508 media and communications ,Information-centric networking ,Packet aggregation ,0202 electrical engineering, electronic engineering, information engineering ,business ,Protocol (object-oriented programming) ,Computer network - Abstract
In this paper, by utilizing fluid approximation, we develop a fluid model for an ICN (Information-Centric Networking) network comprised of multiple entities, multiple routers, and multiple repositories, at the transport level. Since ICN is a more complicated network architecture than IP and the complex interaction among content caching, request packet aggregation, and the behavior of a transport protocol must be considered, ICN requires more complicated modeling approach than IP. In the literature, several mathematical analyses of transport protocol for ICN have been performed. However, these mathematical analyses cannot be utilized to analyze the dynamics of transport protocols in ICN because these studies focus on steady state characteristics. In this paper, we develop a fluid model of a large-scale ICN network, by constructing network component models (i.e., entity, router, and repository) with uniform inputs and outputs (i.e., receiving and sending rate of request packets and content packets).
- Published
- 2020
- Full Text
- View/download PDF
36. A Quantitative Model of Glucose Signaling in Yeast Reveals an Incoherent Feed Forward Loop Leading to a Specific, Transient Pulse of Transcription
- Author
-
KuttyKrishnan, Sooraj, Sabina, Jeffrey, Langton, Laura, Johnston, Mark, Brent, Michael R., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Istrail, Sorin, editor, Pevzner, Pavel, editor, Waterman, Michael S., editor, Bafna, Vineet, editor, and Sahinalp, S. Cenk, editor
- Published
- 2011
- Full Text
- View/download PDF
37. On the network economic, technical and reliability characteristics improvement through demand‐response implementation considering consumers’ behaviour
- Author
-
Behrooz Vahidi and Akbar Dadkhah
- Subjects
Network component ,Operations research ,Computer science ,020209 energy ,Energy Engineering and Power Technology ,Rationality ,02 engineering and technology ,Energy security ,Grid ,Reliability engineering ,Supply and demand ,Demand response ,Electric power system ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Transmission system operator ,Electrical and Electronic Engineering - Abstract
Demand response (DR) is one of the fundamental components of deregulated power systems which face uncertainty because of unpredictable network component contingencies. In this study, a security-constrained model is proposed to coordinate supply and demand sides in a proper way toward a flexible, secure and economic grid. In the proposed model, generation units are committed to enhance the flexibility by providing up- and down-spinning reserves while an optimal real-time pricing scheme provides demand-side flexibility. Real-time pricing is developed by utilising consumers' behaviour. Different levels of rationality are given by extending demand-price elasticity matrices for different types of consumers. The proposed method can assist independent system operators to schedule generating units a day-ahead in a more reliable manner. Customers also can make the most beneficial plans by joining DR programmes and schedule their consumption optimally according to defined rates in the case of an emergency. The applicability of the proposed model is tested on the IEEE 24-bus reliability test system and its effects on operation cost, technical data of the network and the expected load not served are discussed.
- Published
- 2017
- Full Text
- View/download PDF
38. The role of vulnerable environments in support for homegrown terrorism: Fieldwork using the 3N model
- Author
-
Jocelyn J. Bélanger, Roberto M. Lobato, Humberto M. Trujillo, and Manuel Moyano
- Subjects
Network component ,Radicalization ,05 social sciences ,Perspective (graphical) ,050109 social psychology ,Criminology ,Violence ,Social Environment ,Violent extremism ,Aggression ,Social integration ,Arts and Humanities (miscellaneous) ,Spain ,Terrorism ,Developmental and Educational Psychology ,Humans ,0501 psychology and cognitive sciences ,Narrative ,Sociology ,Practical implications ,General Psychology ,050104 developmental & child psychology - Abstract
The 3N model of radicalization proposes that violent radicalization is the result of the contribution of needs, networks, and narratives. Although research has mainly been supportive of this perspective, a substantial amount of ground remains uncovered regarding the network component of the model. Within this framework, we examine why individuals living in certain social environments tend to harbor more positive attitudes toward homegrown terrorism than others. Building on prior research, we hypothesized that individuals living in social environments known to be vulnerable (vs. less vulnerable) are more likely to experience a sense of significance loss (i.e., lack of social integration, perceived conflicts between religious groups), find solace in religious social networks (i.e., mosques), and thus adhere to radical narratives (i.e., legitimization of terrorism). A study with 365 young Muslims from different cities in Spain (Almeria, Barcelona, Ceuta, and Melilla)supported these predictions. Theoretical and practical implications for the study of violent extremism are discussed.
- Published
- 2019
39. Hybrid Parallel Computation for Sparse Network Component Analysis
- Author
-
Safwat Hamad, Mohamed F. Tolba, Howida A. Shedeed, and Dina Elsayad
- Subjects
Network component ,Speedup ,Component analysis ,Computer science ,Gene regulatory network ,Topological order ,Network component analysis ,Parallel computing - Abstract
The gene regulatory network analysis primary goal is understanding the gene interactions topological order and how the genes influence each other. Network component analysis is a vital technique for build gene regulatory network. However, the network component analysis technique is time consuming and computational intensive. Therefore, parallel techniques are required. PSparseNCA is a parallel network component algorithm. This work present an improved version of PSparseNCA, referred as hPSparseNCA (Hybrid Parallel Computation for Sparse Network Component Analysis). hPSparseNCA uses the hybrid computational model to enhance the performance of PSparseNCA. hPSparseNCA is outperformed PSparseNCA achieving speedup reached 192.77 instead of 36.03 for PSparseNCA on 40 processing nodes. Furthermore, the speedup of the proposed algorithm reached 728.48 when running on 256 processing nodes.
- Published
- 2019
- Full Text
- View/download PDF
40. Design and Development of Fire Fighting System Using Hot Redundant PLC in COVID Situation
- Author
-
Papun Biswas, Sudip Das, Abakash Das, Biswamoy Pal, Abhishek Dhar, and Pritam Kumar Gayen
- Subjects
Distribution system ,Network component ,History ,Backup ,Computer science ,Storage tank ,Human life ,Reliability (computer networking) ,Firefighting ,Fail-safe ,Computer Science Applications ,Education ,Reliability engineering - Abstract
A firefighting system is the most foremost part of any industry and buildings as its aim to protect property, human and industrial equipment. In any pandemic situation like COVID19 it is utmost requirement to increase reliability of all important instruments which are directly involve to human life. In case of fire fighter fight against fire, this required time and skilled man power. Under these pandemic situation chances of infection spreading in firefighters and social distancing will not maintain during this situation. Only one way to resolve this problem is by implementation of fully automated reliable system. In this system we are trying to automate the total system by using hot redundant PLC which is fail safe. It consists of mainly three basic parts - fire storage tank, fire pumps and automated distribution system. Fire storage tank contains the water that used against fire. Fire pumps helps to fill the tank and automated distribution system will be activated during fire and instantly distribute water. There are three pumps one is main electrical pump, second one is diesel backup pump and last one is jockey pump.In redundant configuration there are two PLC acting simultaneously and the entire network component and power supply also has back up so that it will never fail. If one of the PLC fails during operation then second PLC automatically take care of the system within few millisecond. Similarly if power supply failure then UPS supply is also there for uninterrupted power supply.
- Published
- 2021
- Full Text
- View/download PDF
41. The problem of finding the maximum multiple flow in the divisible network and its special cases
- Author
-
Alexander V. Smirnov
- Subjects
Network component ,Discrete mathematics ,0209 industrial biotechnology ,Maximum flow problem ,Multiplicity (mathematics) ,02 engineering and technology ,Flow network ,Polynomial algorithm ,Vertex (geometry) ,Combinatorics ,020901 industrial engineering & automation ,Control and Systems Engineering ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Time complexity ,Software ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
In the article the problem of finding the maximum multiple flow in the network of any natural multiplicity k is studied. There are arcs of three types: ordinary arcs, multiple arcs and multi-arcs. Each multiple and multi-arc is a union of k linked arcs, which are adjusted with each other. The network constructing rules are described. The definitions of a divisible network and some associated subjects are stated. The important property of the divisible network is that every divisible network can be partitioned into k parts, which are adjusted on the linked arcs of each multiple and multi-arc. Each part is the ordinary transportation network. The main results of the article are the following subclasses of the problem of finding the maximum multiple flow in the divisible network. 1. The divisible networks with the multi-arc constraints. Assume that only one vertex is the ending vertex for a multi-arc in s network parts. In this case the problem can be solved in a polynomial time. 2. The divisible networks with the weak multi-arc constraints. Assume that only one vertex is the ending vertex for a multi-arc in k-1 network parts (1 ≤ s < k − 1) and other parts have at least two such vertices. In that case the multiplicity of the maximum multiple flow problem can be decreased to k - s. 3. The divisible network of the parallel structure. Assume that the divisible network component, which consists of all multiple arcs, can be partitioned into subcomponents, each of them containing exactly one vertex-beginning of a multi-arc. Suppose that intersection of each pair of subcomponents is the only vertex-network source x0. If k=2, the maximum flow problem can be solved in a polynomial time. If k ≥ 3, the problem is NP-complete. The algorithms for each polynomial subclass are suggested. Also, the multiplicity decreasing algorithm for the divisible network with weak multi-arc constraints is formulated.
- Published
- 2016
- Full Text
- View/download PDF
42. Epilepsy surgery: Evaluating robustness using dynamic network models
- Author
-
Leandro Junges, Oscar Benjamin, John R. Terry, and Wessel Woldman
- Subjects
medicine.medical_specialty ,Dynamic network analysis ,Computer science ,General Physics and Astronomy ,01 natural sciences ,010305 fluids & plasmas ,Resection ,Cohort Studies ,Epilepsy ,Physical medicine and rehabilitation ,Seizures ,Robustness (computer science) ,0103 physical sciences ,medicine ,Humans ,Epilepsy surgery ,Clinical imaging ,010306 general physics ,Mathematical Physics ,Network component ,Applied Mathematics ,Brain ,Electroencephalography ,Statistical and Nonlinear Physics ,medicine.disease ,Term (time) - Abstract
Epilepsy is one of the most common neurological conditions affecting over 65 million people worldwide. Over one third of people with epilepsy are considered refractory: they do not respond to drug treatments. For this significant cohort of people, surgery is a potentially transformative treatment. However, only a small minority of people with refractory epilepsy are considered suitable for surgery, and long-term seizure freedom is only achieved in half the cases. Recently, several computational approaches have been proposed to support presurgical planning. Typically, these approaches use a dynamic network model to explore the potential impact of surgical resection in silico. The network component of the model is informed by clinical imaging data and is considered static thereafter. This assumption critically overlooks the plasticity of the brain and, therefore, how continued evolution of the brain network post-surgery may impact upon the success of a resection in the longer term. In this work, we use a simplified dynamic network model, which describes transitions to seizures, to systematically explore how the network structure influences seizure propensity, both before and after virtual resections. We illustrate key results in small networks, before extending our findings to larger networks. We demonstrate how the evolution of brain networks post resection can result in a return to increased seizure propensity. Our results effectively determine the robustness of a given resection to possible network reconfigurations and so provide a potential strategy for optimizing long-term seizure freedom.
- Published
- 2020
- Full Text
- View/download PDF
43. A quantitative approach for assessment and improvement of network resilience
- Author
-
Gino J. Lim, Jaeyoung Cho, Selim Bora, and Navid Ahmadian
- Subjects
Network component ,021110 strategic, defence & security studies ,021103 operations research ,Computer science ,media_common.quotation_subject ,0211 other engineering and technologies ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Risk analysis (engineering) ,Conceptual framework ,Component (UML) ,Resilience index ,Supply chain network ,Safety, Risk, Reliability and Quality ,Resilience (network) ,Function (engineering) ,Budget constraint ,media_common - Abstract
This paper proposes a quantitative approach for measuring the resilience of the network components and the network itself. This study introduces a conceptual framework featuring the ability of the network system to adopt alternative plans when a component is disrupted. As a first step toward measuring network resilience, the component resilience is defined and quantified as a function of criticality, disruption frequency, disruption impact, and recovery capability. This quantification approach reflects the effect of component level disruption on the network. Hence, it is proposed that the network resilience is measured by the resilience of network component having the lowest resilience index. Efforts to enhance network resilience often require financial resources. Therefore, an optimization model is further introduced to maximize the network resilience under budget constraint through reinforcing the weakest components in the network. The proposed approach can help decision-makers assess the network resilience status and compare with it other networks, identify and improve components with low resilience, evaluate the cost of resilience improvement, and determine the extent of enhancement that can be achieved under a given budget limitation. Numerical experiments are conducted to illustrate our methodology using a supply chain network and a power network. Both examples show that considering the ability of the network to use alternative plans can enhance network resilience and result in lower demand loss when a disruption occurs.
- Published
- 2020
- Full Text
- View/download PDF
44. Social capital and payout policies
- Author
-
Ahsan Habib and Mostafa Monzur Hasan
- Subjects
Network component ,050208 finance ,business.industry ,05 social sciences ,Accounting ,050201 accounting ,Monetary economics ,Large sample ,0502 economics and business ,Economics ,Positive relationship ,Corporate social responsibility ,Dividend ,Endogeneity ,business ,Stock (geology) ,Social capital - Abstract
In this paper, we investigate the relationship between regional social capital and corporate payout policies. Using a large sample of US data, we find a positive relationship between regional social capital and both the likelihood and the amount of cash dividend payouts. However, we find that social capital has no bearing on the likelihood and amount of stock repurchases. The results from additional analyses show that the relationship between social capital and dividends is more pronounced for less geographically dispersed firms. We also find that the network component of social capital has a greater effect on dividends than the social norm component. Our results are robust to alternative specifications of dividends and social capital and to the use of a two-stage least squares (2SLS) analysis to alleviate endogeneity concerns. Overall, we document that regional social capital plays an important role in influencing cash dividend payout policies.
- Published
- 2020
- Full Text
- View/download PDF
45. State Estimation in Unbalanced Three Phase Distribution Network through Accurate Modelling of Network Elements
- Author
-
Rasool Kazemzadeh, Omid Eghbali, and Karim Amiri
- Subjects
Network component ,Distribution networks ,Energy management ,Computer science ,020209 energy ,Load modeling ,020208 electrical & electronic engineering ,Control engineering ,02 engineering and technology ,law.invention ,Network element ,Three-phase ,law ,0202 electrical engineering, electronic engineering, information engineering ,Transformer - Abstract
State estimation in active distribution networks which is the heart of energy management central is of great importance. Considering the increase in complexity and realtime management of active distribution networks, knowing network information at each time instant is one of the important measures for exploitation, control and protection of these networks. In this paper, state estimation in unbalanced three phase networks is investigated. In order to obtain a high accuracy procedure which is close to reality, elements comprising distribution network should be modelled accurately. In this paper, different components including line, transformer, load and regulator are modelled. In addition, equations regarding real and virtual measurements used in state estimation of three-phase networks are given. Then, network component and measurement modelling in standard IEEE 13-bus network is implemented and simulated.
- Published
- 2018
- Full Text
- View/download PDF
46. Impact of network component temperature variation on long haul White Rabbit links
- Author
-
Manuel Rodríguez-Álvarez, Javier Diaz, and Jose Lopez-Jimenez
- Subjects
Network component ,Offset (computer science) ,010308 nuclear & particles physics ,Network packet ,Computer science ,Real-time computing ,01 natural sciences ,Telecommunications network ,UTC offset ,Kilometer ,0103 physical sciences ,010306 general physics ,White rabbit ,Time synchronization - Abstract
This paper shows an analysis of the time offset error introduced into a highly accurate packet-based time synchronization link by the most frequently deployed long distance network components. Translating the sub-nanosecond accuracy of a White Rabbit timing link into long distance fiber communication networks is a very demanding task. With the increased distance the need for devices that keep the integrity of the signal and maintain its power across hundreds of kilometers is beyond question. Some of these devices might suffer from large disparities in their environmental conditions due to being placed in distant locations from each other, potentially varying their behavior. The results demonstrate that moderate temperature disparities can lead to timing offset errors of several nanoseconds. This outcome can be seen as the foundation laid for a series of compensation techniques to be developed in future work.
- Published
- 2018
- Full Text
- View/download PDF
47. Cancer-mutation network and the number and specificity of driver mutations
- Author
-
Eugene V. Koonin, Jaime Iranzo, and Inigo Martincorena
- Subjects
0301 basic medicine ,Genetics ,Network component ,Mutation ,Multidisciplinary ,Models, Genetic ,Cancer ,Genomics ,Biology ,medicine.disease ,medicine.disease_cause ,03 medical and health sciences ,030104 developmental biology ,PNAS Plus ,Neoplasms ,medicine ,Cancer gene ,Humans ,Gene Regulatory Networks ,Gene ,human activities ,Genes, Neoplasm - Abstract
Cancer genomics has produced extensive information on cancer-associated genes, but the number and specificity of cancer-driver mutations remains a matter of debate. We constructed a bipartite network in which 7,665 tumors from 30 cancer types are connected via shared mutations in 198 previously identified cancer genes. We show that about 27% of the tumors can be assigned to statistically supported modules, most of which encompass one or two cancer types. The rest of the tumors belong to a diffuse network component suggesting lower gene specificity of driver mutations. Linear regression of the mutational loads in cancer genes was used to estimate the number of drivers required for the onset of different cancers. The mean number of drivers in known cancer genes is approximately two, with a range of one to five. Cancers that are associated with modules had more drivers than those from the diffuse network component, suggesting that unidentified and/or interchangeable drivers exist in the latter.
- Published
- 2018
48. Does supply chain innovation pay off?
- Author
-
Jan Stentoft, Christopher Rajkumar, Moreira , António Carrizo, Ferreira , Luís Miguel D. F, and Zimmermann , Ricardo A.
- Subjects
Structure (mathematical logic) ,Network component ,Financial performance ,Business process ,media_common.quotation_subject ,Supply chain ,05 social sciences ,03 medical and health sciences ,0302 clinical medicine ,Supplier relationship management ,0502 economics and business ,030221 ophthalmology & optometry ,Conceptual model ,Business ,Empirical evidence ,050203 business & management ,Industrial organization ,media_common - Abstract
The purpose of this chapter is to investigate the relationship among supply chain innovation and performance in terms of market and operational performance. The chapter is built on empirically data subject to 187 useable responses from a questionnaire-survey among Danish manufacturers. A conceptual model was developed and subsequently two major hypotheses were formulated. Linear regression was performed using SPSS software 22.0 to tests the developed hypotheses. Supply chain innovation is unfolded through the components of business processes, networks structure and technology. Data reveals that supply chain innovation does pay off in terms of improved market and operational performance. The chapter also reveals that the strongest relationship is obtained with supply chain innovation and operational performance. Market performance may be influenced by a number of different factors beyond supply chain innovation. The chapter provides interesting findings of the network component with empirical evidence that it has a positive influence on both market and operation performance. The chapter concludes by suggesting new areas of research including also the relationship to financial performance.
- Published
- 2018
- Full Text
- View/download PDF
49. An Assessment Between Ict Network Component And Ict Storage On Judiciary Performance: Case Of Eldoret Law Courts
- Author
-
Sanja Michael Mutongwa, Rose Mugeni Ndombi, and Jenepher Munyua
- Subjects
Network component ,ICT Network Component ,ICT Storage and Judiciary Performance ,Computer science ,business.industry ,Information and Communications Technology ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Telecommunications ,business - Abstract
This research seeks to perform an Assessment between ICT Network Component and ICT Storage on Judiciary Performance in Eldoret Law Courts. The questions are: how does ICT Network component influence judiciary performance and does ICT storage influence judiciary performance in Eldoret law courts? The study adopted Correlational research design. The target group was Judges, Magistrates, ICT personnel and Advocates. A sample size of 272 was achieved from a target population of 899 employees in the Judiciary < 0.05 was considered significant. Data will be analyzed by SPSS V 20; regression was used to test the hypotheses. Correlation and multiple regressions were used to measure: Effects. The p
- Published
- 2018
- Full Text
- View/download PDF
50. Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
- Author
-
D. K. Lobiyal, Yue Cao, Ram Shringar Raw, Ahmed Aliyu, Abdul Hanan Abdullah, Mohammed Joda Usman, Omprakash Kaiwartya, and Sushil Kumar
- Subjects
Network component ,business.product_category ,Computer science ,business.industry ,Multitier architecture ,Distributed computing ,G400 ,020206 networking & telecommunications ,020302 automobile design & engineering ,Cloud computing ,02 engineering and technology ,Application layer ,0203 mechanical engineering ,Taxonomy (general) ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Electrical and Electronic Engineering ,Architecture ,business ,Dissemination ,Computer network - Abstract
Cloud Computing in VANETs (CC-V) has been investigated into two major themes of research including Vehicular Cloud Computing (VCC) and Vehicle using Cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, number of advancements have been made to address the issues and challenges in VCC and VuC. This paper qualitatively reviews CC-V with the emphasis on layered architecture, network component, taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed including perception, co-ordination, artificial intelligence and smart application layers. Three network component of CC-V namely, vehicle, connection and computation are explored with their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. Related literature on each theme are critically investigated with comparative assessment of recent advances. Finally, some open research challenges are identified as future issues. The challenges are the outcome of the critical and qualitative assessment of literature on CC-V.
- Published
- 2018
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.