Powered by Deep Web Technologies
Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

2

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

3

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

4

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

5

U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, 4: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information October 4, 2012 - 6:00am Addthis PROBLEM: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information PLATFORM: HP Network Node Manager I (NNMi) v9.20 for HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. reference LINKS: HP Security Bulletin: c03507708 SecurityTracker Alert ID: 1027605 Security Focus: 524302 CVE-2012-3267 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Network Node

6

Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes  

E-Print Network (OSTI)

the number of bits to transmit ([3], [15]), making a node to go into power saving modes: (sleepEfficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes Vinod Sharma, Utpal Mukherji and Vinay Joseph Abstract-- We study sensor networks with energy harvesting nodes

Sharma, Vinod

7

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

8

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

9

NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node  

E-Print Network (OSTI)

NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node Muhammad Shoaib an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic a virtual node layer for mobility management in the Network of Information. Therefore, by adopting

Paris-Sud XI, Université de

10

A Network Processor Based Passive Measurement Node  

E-Print Network (OSTI)

Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA 01003 {rramaswa a richer set of network management applications and traffic profiling capabilities, traffic is collected on the measurement node to reduce the load on the centralized collection system. If traffic statistics match

Shenoy, Prashant

11

Persistent Nodes for Reliable Memory in Geographically Local Networks  

E-Print Network (OSTI)

A Persistent Node is a redundant distributed mechanism for storing a key/value pair reliably in a geographically local network. In this paper, I develop a method of establishing Persistent Nodes in an amorphous matrix. I ...

Beal, Jacob

2003-04-15T23:59:59.000Z

12

Node Connectivity in Vehicular Ad Hoc Networks with Structured Mobility  

E-Print Network (OSTI)

in vehicular networks; 2) we demonstrate, through simulation, the impacts of marco- and micro-mobility modelsNode Connectivity in Vehicular Ad Hoc Networks with Structured Mobility Ivan W. H. Ho, Kin K. Leung@cmu.edu Abstract1 Vehicular Ad hoc NETworks (VANETs) is a subclass of Mobile Ad hoc NETworks (MANETs). However

Leung, Kin K.

13

Enhancing opportunistic networks with legacy nodes  

Science Journals Connector (OSTI)

Mobile opportunistic networking utilizes device-to-device communication to provide messaging and content sharing mechanisms between mobile users without the need for supporting infrastructure networks. However, enabling opportunistic networking in practice ... Keywords: cookies, dtn, http, opportunistic networking, web storage

Marcin Nagy, Teemu Kärkkäinen, Jörg Ott

2014-09-01T23:59:59.000Z

14

Performance of wireless sensor networks under random node failures  

SciTech Connect

Networks are essential to the function of a modern society and the consequence of damages to a network can be large. Assessing network performance of a damaged network is an important step in network recovery and network design. Connectivity, distance between nodes, and alternative routes are some of the key indicators to network performance. In this paper, random geometric graph (RGG) is used with two types of node failure, uniform failure and localized failure. Since the network performance are multi-facet and assessment can be time constrained, we introduce four measures, which can be computed in polynomial time, to estimate performance of damaged RGG. Simulation experiments are conducted to investigate the deterioration of networks through a period of time. With the empirical results, the performance measures are analyzed and compared to provide understanding of different failure scenarios in a RGG.

Bradonjic, Milan [Los Alamos National Laboratory; Hagberg, Aric [Los Alamos National Laboratory; Feng, Pan [Los Alamos National Laboratory

2011-01-28T23:59:59.000Z

15

Adaptive Spatiotemporal Node Selection in Dynamic Networks  

E-Print Network (OSTI)

Dynamic networks - spontaneous, self-organizing groups of devices - are a promising new computing platform. Writing applications for such networks is a daunting task, however, due to their extreme variability and ...

Hari, Pradip

16

Scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the nodes during execution  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the plurality of compute nodes during execution that include: identifying one or more applications for execution on the plurality of compute nodes; creating a plurality of physically discontiguous node partitions in dependence upon temperature characteristics for the compute nodes and a physical topology for the compute nodes, each discontiguous node partition specifying a collection of physically adjacent compute nodes; and assigning, for each application, that application to one or more of the discontiguous node partitions for execution on the compute nodes specified by the assigned discontiguous node partitions.

Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

2012-10-16T23:59:59.000Z

17

Modeling and Analysis of Energy Harvesting Nodes in Body Sensor Networks  

E-Print Network (OSTI)

Modeling and Analysis of Energy Harvesting Nodes in Body Sensor Networks Alireza Seyedi Department@ecse.rpi.edu Abstract--A Markov based unified model for an energy har- vesting node in a body sensor network. The results provide insight into the performance of energy harvesting nodes in a body sensor network as well

Sikdar, Biplab

18

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks  

E-Print Network (OSTI)

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Jaehoon Jeong- bile nodes in IPv6 mobile network to perform route optimization. The route optimization is possible because mobile router provides the prefix of its care-of address for its mobile nodes by playing the role

Jeong, Jaehoon "Paul"

19

Impact of Mobile Node Density on Detection Performance Measures in a Hybrid Sensor Network  

E-Print Network (OSTI)

Impact of Mobile Node Density on Detection Performance Measures in a Hybrid Sensor Network}@ece.unm.edu Abstract--We investigate the impact of mobile node density on several detection performance measures for stationary target detection by a hybrid sensor network consisting of both static and mobile nodes

Jayaweera, Sudharman K.

20

A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility  

Science Journals Connector (OSTI)

In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

We propose a Node Stability Index (NSI)-based algorithm to determine stable connected dominating sets (CDS) for Mobile Ad hoc Networks ... algorithm prefers to include (to the CDS) covered nodes that have the lar...

Natarajan Meghanathan

2012-01-01T23:59:59.000Z

22

Timing Synchronization at the Relay Node in Physical Layer Network Coding  

E-Print Network (OSTI)

In recent times, there has been an increased focus on the problem of information exchange between two nodes using a relay node. The introduction of physical layer network coding has improved the throughput efficiency of such an exchange. In practice...

Basireddy, Ashish

2012-07-16T23:59:59.000Z

23

E-Print Network 3.0 - assisted node localization Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Toward Using Node Mobility to Enhance Greedy Forwarding in Geographic Routing for Mobile Ad Hoc Networks1 Summary: local geographic information of direct neighbors and the...

24

Energy-aware Node Placement in Wireless Sensor Networks Peng Cheng, Chen-Nee Chuah  

E-Print Network (OSTI)

-dependent, the network lifetime can be limited by nodes with heavier data load and thus greater power consumption power, node densities, and huge data volume. Power conservation is a primary concern in prolonging to a sink node. Typical applications include traffic monitoring and data collection in warehouses. Data load

Chuah, Chen-Nee

25

Analyzing (Social Media) Networks with NodeXL Marc A. Smith1  

E-Print Network (OSTI)

Analyzing (Social Media) Networks with NodeXL Marc A. Smith1 , Ben Shneiderman2 , Natasa Milic with a social media data sample drawn from an enterprise intranet social network. A sequence of Node relevant differences in the patterns of interconnection among employee participants in the social media

Golbeck, Jennifer

26

Lambda network having 2.sup.m-1 nodes in each of m stages with each node coupled to four other nodes for bidirectional routing of data packets between nodes  

DOE Patents (OSTI)

The Lambda network is a single stage, packet-switched interprocessor communication network for a distributed memory, parallel processor computer. Its design arises from the desired network characteristics of minimizing mean and maximum packet transfer time, local routing, expandability, deadlock avoidance, and fault tolerance. The network is based on fixed degree nodes and has mean and maximum packet transfer distances where n is the number of processors. The routing method is detailed, as are methods for expandability, deadlock avoidance, and fault tolerance.

Napolitano, Jr., Leonard M. (825 El Quanito Dr., Danville, CA 94526)

1995-01-01T23:59:59.000Z

27

Robust and distributed range-free localization using anchor nodes with varying communication range for three dimensional wireless sensor networks  

Science Journals Connector (OSTI)

Localization of the nodes in a sensor network is a premier activity which influences the performance of the network. The data collected by a sensor node may become useless if the location of that node is not known. Sensor networks are mostly deployed ...

Manas Kumar Mishra; M. M. Gore

2011-02-01T23:59:59.000Z

28

On Using Reputations in Ad hoc Networks to Counter Malicious Nodes Prashant Dewan, Partha Dasgupta and Amiya Bhattacharya  

E-Print Network (OSTI)

On Using Reputations in Ad hoc Networks to Counter Malicious Nodes Prashant Dewan, Partha Dasgupta, partha, amiya}@asu.edu Abstract Nodes in mobile ad hoc networks have a limited trans- mission range for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses

Dasgupta, Partha

29

AquaNodes: An Underwater Sensor Network Iuliu Vasilescu  

E-Print Network (OSTI)

modem and an optical mo- dem implemented using green light. The system of sensor nodes communicates communication and support for sensing and mobil- ity. The nodes in the system are connected acoustically for broadcast communication using an acoustic modem we de- veloped. For higher point to point communication

Farritor, Shane

30

AquaNodes: An Underwater Sensor Network Iuliu Vasilescu  

E-Print Network (OSTI)

and an optical mo- dem implemented using green light. The system of sensor nodes communicates with a TDMA communication and support for sensing and mobil- ity. The nodes in the system are connected acoustically for broadcast communication using an acoustic modem we de- veloped. For higher point to point communication

Zhou, Shengli

31

Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers  

E-Print Network (OSTI)

a wireless medium. The energy of each node is limited to the capacity of its battery. The consumption of energy for both communication and information processing must be mini- mized. Sensor networks use multi of sensors, also trusted by the other nodes -- often referred in literature as auditors or v

Barbeau, Michel

32

Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks  

E-Print Network (OSTI)

Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks.Hauspie, David.Simplot}@lifl.fr Abstract Ad hoc network normally has critical connectivity properties before, respectively. The experiments with random unit graph model of ad hoc networks show high correspondence of local

Paris-Sud XI, Université de

33

Intermediate Node Initiated (INI) Signalling: A Hybrid Resevation Technique for Optical Burst-Switched Networks  

Science Journals Connector (OSTI)

We introduce a new reservation scheme, Intermediate Node Initiation, which provides the functionality of both TAW and JET in the same network. INI scheme provides a trade-off between...

Karanam, Ravikiran; Vokkarane, Vinod M; Jue, Jason P

34

Analyzing Social Media Networks with NodeXL: Insights from a Connected World  

Science Journals Connector (OSTI)

Businesses, entrepreneurs, individuals, and government agencies alike are looking to social network analysis (SNA) tools for insight into trends, connections, and fluctuations in social media. Microsoft's NodeXL is a free, open-source SNA plug-in for ...

Derek Hansen; Ben Shneiderman; Marc A. Smith

2010-09-01T23:59:59.000Z

35

Knowledge Nodes: the Building Blocks of a Distributed Approach to Knowledge Management  

E-Print Network (OSTI)

Knowledge Nodes: the Building Blocks of a Distributed Approach to Knowledge Management Matteo criticise the objectivistic approach that underlies most current sys- tems for Knowledge Management. We show that such an approach is incompatible with the very nature of what is to be managed (i.e., knowledge), and we argue

Bouquet, Paolo

36

Energy efficient node addressing scheme in self-organised sensor networks  

Science Journals Connector (OSTI)

Sensor networks are envisioned to support autonomous and spontaneous networking for a wide range of applications such as environment monitoring. Due to energy constraints, it is difficult for wireless sensor nodes to handle heavy protocol stacks with a large protocol overhead. In this paper, we present a novel address auto configuration scheme, which we call SMallest-size sensor AddRess auToconfiguration scheme (SMART), to configure potential shortest-size local unique addresses for sensor networks with energy efficiency. SMART achieves energy efficiency in three ways. First, it automatically configures node address within a potential smallest address space for a number of sensor nodes, in order to achieve the small address size. Second, it avoids address conflicts during the address configuration. Third, it configures addresses with a small configuration overhead and achieves load balance among sensor nodes.

Rui Teng

2009-01-01T23:59:59.000Z

37

TinyNode: a comprehensive platform for wireless sensor network applications  

Science Journals Connector (OSTI)

We introduce the TinyNode platform for wireless sensor networks. Supporting both research and industrial deployments, the platform offers communication ranges that exceed current platforms by a factor of 3 to 5, while consuming similar energy. It comes ... Keywords: embedded systems, wireless sensor networks

Henri Dubois-Ferričre; Laurent Fabre; Roger Meier; Pierre Metrailler

2006-04-01T23:59:59.000Z

38

Cluster Before You Hallucinate: Approximating Node-Capacitated Network Design and Energy Efficient Routing  

E-Print Network (OSTI)

this energy usage is an important problem. Ac- cording to the US Department of Energy [1], data networks,4,6,10]. In the Energy Efficient Vertex Routing Problem (EEVRP), the input consists of an undirected multi-graph G = (VCluster Before You Hallucinate: Approximating Node-Capacitated Network Design and Energy Efficient

Treuille, Adrien

39

Modeling and Analysis of Energy Harvesting Nodes in Wireless Sensor Networks  

E-Print Network (OSTI)

with an energy harvesting device that collects energy from ambient sources such as motion, light, and heat or motion energy harvesting in a body sensor network. We assume that at the end of each time slot the deviceModeling and Analysis of Energy Harvesting Nodes in Wireless Sensor Networks Alireza Seyedi

Sikdar, Biplab

40

NERSC's Data Transfer Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Nodes Data Transfer Nodes Data Transfer Nodes Overview The data transfer nodes are NERSC servers dedicated to performing transfers between NERSC data storage resources such as HPSS and the NERSC Global Filesystem (NGF), and storage resources at other sites including the Leadership Computing Facility at ORNL (Oak Ridge National Laboratory). These nodes are being managed (and monitored for performance) as part of a collaborative effort between ESnet, NERSC, and ORNL to enable high performance data movement over the high-bandwidth 10Gb ESnet wide-area network (WAN). Restrictions In order to keep the data transfer nodes performing optimally for data transfers, we request that users restrict interactive use of these systems to tasks that are related to preparing data for transfer or are directly

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Comparing Trust Mechanisms for Monitoring Aggregator Nodes in Sensor Networks  

E-Print Network (OSTI)

With increasingly smaller sizes and reduced costs, the range of possible application domains for sensor networks has, such as fire de- tection, securing sensitive locations, detecting nuclear leak- age, etc. An average sensor (BS). The BS processes the data and gives the final decision to alert the network operator or consider

Sen, Sandip

42

RamboNodes for the Metropolitan Ad Hoc Network  

E-Print Network (OSTI)

We present an algorithm to store data robustly in a large, geographically distributed network by means of localized regions of data storage that move in response to changing conditions. For example, data might migrate away ...

Beal, Jacob

2003-12-17T23:59:59.000Z

43

Energy-efficient mobile target detection in Wireless Sensor Networks with random node deployment and partial coverage  

Science Journals Connector (OSTI)

This paper addresses the problem of engineering energy-efficient target detection applications, using unattended Wireless Sensor Networks (WSNs) with random node deployment and partial coverage, for long-lasting surveillance of areas of interest. As ... Keywords: Latency before detection, Optimization toolbox, Partial coverage, Probability of missed detection, Random node deployment, Target detection, Wireless Sensor Network (WSN)

Paolo Medagliani; Jérémie Leguay; Gianluigi Ferrari; Vincent Gay; Mario Lopez-Ramos

2012-06-01T23:59:59.000Z

44

Smart sensor/actuator node reprogramming in changing environments using a neural network model  

Science Journals Connector (OSTI)

The techniques currently developed for updating software in sensor nodes located in changing environments require usually the use of reprogramming procedures, which clearly increments the costs in terms of time and energy consumption. This work presents ... Keywords: Arduino, Constructive Neural Networks, Microcontroller

Francisco Ortega-Zamorano, José M. Jerez, José L. Subirats, Ignacio Molina, Leonardo Franco

2014-04-01T23:59:59.000Z

45

Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

2013-04-16T23:59:59.000Z

46

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM  

E-Print Network (OSTI)

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S with a description of the SHAMAN system and briefly introduces its applica- tions to the management of tactical for MANagement). This management system developed at the Network Management Laboratory of the Univer- sity

Sethi, Adarshpal

47

Simplifying and speeding the management of intra-node cache coherence  

DOE Patents (OSTI)

A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Phillip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Yorktown Heights, NY)

2012-04-17T23:59:59.000Z

48

Local Policy Networks and Agricultural Watershed Management  

E-Print Network (OSTI)

Local Policy Networks and Agricultural Watershed Management Mark Lubell University of California of networks in promoting cooperation (Bosch, Cook, and Fuglie 1995; Lubell et al. 2002; Marshall 2005

Lubell, Mark

49

Optimal Design of Multiechelon Supply Chain Networks with Generalized Production and Warehousing Nodes  

Science Journals Connector (OSTI)

To wit, at least one supplier should be contracted with at least one plant in order to receive raw materials and transform them to end products. ... Finally, purchasing cost has a fixed element (CnSYnS), the cost required to establish a relationship (supplier management costs, technology integration investments, and hedging costs for financial risk, etc.) with node n ? S (CnS), and a variable element (CinSSin), the product of the unit purchase price of material i from node n ? S (CinS) and the continuous variable expressing the purchased amounts of material i from the selected node n ? S (Sin). ... Uncertainties are introduced in demands, market prices, raw material costs, and prodn. ...

Magdalini A. Kalaitzidou; Pantelis Longinidis; Panagiotis Tsiakis; Michael C. Georgiadis

2014-07-29T23:59:59.000Z

50

An ad hoc mobile network is a collectionof mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continualbasis. In order to facilitatecommunicationwithin the networ  

E-Print Network (OSTI)

Abstract An ad hoc mobile network is a collectionof mobile nodes that are dynamically routes between nodes. The primary goal of such an ad hoc network routing protocol is correct.This articleexamines routing protocols for ad hoc networksand evaluates these protocols based on a given set

Toh, C-K.

51

A Robust and Flexible Design for GCEP Unattended Online Enrichment Monitoring: An OLEM Collection Node Network  

SciTech Connect

Oak Ridge National Laoratory (ORNL) has engineered an on-line enrichment monitor (OLEM) to continuously measure U-235 emissions from the UF6 gas flowing through a unit header pipe of a gas centrifuge enrichment plant (GCEP) as a component of the International Atomic Energy Agency s (IAEA) new generation of technology to support enrichment plant safeguards1. In contrast to other enrichment monitoring approaches, OLEM calibrates and corrects for the pressure and temperature dependent UF6 gas-density without external radiation sources by using the inherent unit header pipe pressure dynamics and combining U-235 gamma-ray spectrometery using a shielded NaI detector with gas pressure and temperature data near the spectrum measurement point to obtain the enrichment of the gas as a function of time. From a safeguards perspective, OLEM can provide early detection of a GCEP being misused for production of highly enriched uranium, but would not detect directly the isolation and use of a cascade within the production unit to produce HEU. OLEM may also reduce the number of samples collected for destructive assay and, if coupled with load cell monitoring, could support isotope mass balance verification and unattended cylinder verification. The earlier paper presented OLEM as one component along with shared load cells and unattended cylinder verification, in the IAEA emering toolbox for unattended instruments at GCEPs1 and described the OLEM concept and how previous modeling studies and field measurements helped confirm the viability of a passive on-line enrichment monitor for meeting IAEA objectives and to support the development of performance targets. Phase I of the United States Support Program (USSP) OLEM project completed a preliminary hardware, software and communications design; phase II will build and test field prototypes in controlled laboratory settings and then at an operational facility. That paper also discussed many of the OLEM collection node commercial off the shelf (COTS) components and summarized the OLEM collection node data security provisions. This paper will discuss a secure and redundant network of OLEM collection nodes, auxiliary detection units and supporting junction boxes distributed throughout a facility for monitoring enrichment on product, feed and tails unit header pipes; the purpose and capability of the built-in Electronic Optical Sealing System (EOSS) network gateway; and a network approach for obtaining reliable and authenticated pressure measurements.

Younkin, James R [ORNL] [ORNL; March-Leuba, Jose A [ORNL] [ORNL; Garner, James R [ORNL] [ORNL

2013-01-01T23:59:59.000Z

52

On the performance management of heterogeneous networks using SNMP  

E-Print Network (OSTI)

effectively address the myriad needs of a typical distributed network viz. simple IP node discovery, alarm handling, modeling or performance monitoring. Based on an extensive analysis of these tools on (live' network devices, a design strategy for a...

Kunapareddy, Padmaja

2012-06-07T23:59:59.000Z

53

Compute nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

nodes Compute nodes Compute Node Configuration 5,576 nodes two 12-core Intel "Ivy Bridge" processors at 2.4GHz per node 24 cores per node (133,824 total cores) 1 AVX (vector)...

54

Ontology-Based Network Management: Study Cases and Lessons Learned  

Science Journals Connector (OSTI)

Ontology based network management has recently evolved from a theoretical proposal to a more mature technology. As such, it is now being applied in many research projects in a number of different network management and security scenarios. This application ... Keywords: Autonomic management, Lessons learned, Network monitoring, Network security, OWL, Ontology-based network management, SWRL, Study case

Jorge E. López De Vergara; Antonio Guerrero; Víctor A. Villagrá; Julio Berrocal

2009-09-01T23:59:59.000Z

55

Routing with a density-based probabilistic algorithm for mobile ad-hoc networks  

Science Journals Connector (OSTI)

Ad-hoc networks can operate even when there is a scarcity of network infrastructure. This research examines ad-hoc networks that have varying node densities. These environments can be found in areas struck by disasters to urban city environments. Mobile ... Keywords: Broadcast Management, Density Based Probabilistic Algorithm, Mobile Ad-Hoc Networks, Nodes Connectivity Management, Nodes Density

Hean-Loong Ong; Essam Natsheh; Tat-Chee Wan

2011-04-01T23:59:59.000Z

56

Connectivity of vehicular ad hoc networks with continuous node distribution patterns  

E-Print Network (OSTI)

nodes, given market penetration rates. Traffic signal Policec density and market penetration rate along the path. Forc density by ?(x), market penetration rate by µ(x), and node

Jin, W L; Wang, Bruce

2010-01-01T23:59:59.000Z

57

Algorithms for an Integer Multicommodity Network Flow Problem with Node Reliability Considerations  

Science Journals Connector (OSTI)

In this paper, we consider the problem of sending a set of multiple commodities from their origin to destination nodes via intermediate hubs. Each hub node is associated with a reliability function, which depends on the total flow that crosses that hub. ... Keywords: Congestion, Cutting planes, Integer programming, Multicommodity flow, Node reliabilities

Bita Tadayon, J. Cole Smith

2014-05-01T23:59:59.000Z

58

Multiple node remote messaging  

DOE Patents (OSTI)

A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

2010-08-31T23:59:59.000Z

59

Self-Adaptive Power Management of Idle Nodes in Large Scale Systems  

E-Print Network (OSTI)

to balance between the systems energy consumption and the response time is a key problem in the power of idle nodes to achieve low energy consumption and high performance at the same time. The proposed the power usage of a middle scale city. In 2006, US servers and data centers consumed around 61 billion k

Zhu, Hong

60

Managing Complex Network Operation with Predictive Analytics  

SciTech Connect

Complex networks play an important role in modern societies. Their failures, such as power grid blackouts, would lead to significant disruption of people’s life, industry and commercial activities, and result in massive economic losses. Operation of these complex networks is an extremely challenging task due to their complex structures, wide geographical coverage, complex data/information technology systems, and highly dynamic and nonlinear behaviors. None of the complex network operation is fully automated; human-in-the-loop operation is critical. Given the complexity involved, there may be thousands of possible topological configurations at any given time. During an emergency, it is not uncommon for human operators to examine thousands of possible configurations in near real-time to choose the best option and operate the network effectively. In today’s practice, network operation is largely based on experience with very limited real-time decision support, resulting in inadequate management of complex predictions and inability to anticipate, recognize, and respond to situations caused by human errors, natural disasters, and cyber attacks. A systematic approach is needed to manage the complex operation paradigms and choose the best option in a near-real-time manner. This paper applies predictive analytics techniques to establish a decision support system for complex network operation management and help operators to predict potential network failures and adapt the network to adverse situations. The resultant decision support system enables continuous monitoring of network performance and turns large amounts of data into actionable information. Examples with actual power grid data are presented to demonstrate the capability of this proposed decision support system.

Huang, Zhenyu; Wong, Pak C.; Mackey, Patrick S.; Chen, Yousu; Ma, Jian; Schneider, Kevin P.; Greitzer, Frank L.

2008-03-26T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM  

E-Print Network (OSTI)

BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM Adarshpal S. Sethi Dong Zhu Vasil Architecture for MANagement). This management system developed at the Network Management Laboratory framework to facili- tate the management of distributed systems [1], [2], [3], [4]. This architecture allows

Sethi, Adarshpal

62

Collaborative storage management in sensor networks  

Science Journals Connector (OSTI)

In this paper, we consider a class of sensor networks where the data is not required in real-time by an observer; for example: a sensor network monitoring a scientific phenomenon for later play back and analysis. In such networks, the data must be stored in the network. Thus, in addition to battery power, storage is a primary resource; the useful lifetime of the network is constrained by its ability to store the generated data samples. We explore the use of collaborative storage techniques to efficiently manage data in storage constrained sensor networks. The proposed collaborative storage technique takes advantage of spatial correlation among the data collected by nearby sensors to significantly reduce the size of the data near the data sources. In addition, local coordination can be used to adjust the sampling rate to match the required application fidelity. We show that the proposed approach provides significant savings in the size of the stored data vs. local buffering. These savings allow the network to operate for a longer time without exhausting storage space. Furthermore, the savings reduce the amount of data that will eventually be relayed in response to queries or upon eventual collection of the data. In addition, collaborative storage performs load balancing of the available storage space if data generation rates are not uniform across sensors (as would be the case in an event driven sensor network), or if the available storage varies across the network.

Sameer Tilak; Nael B. Abu-Ghazaleh; Wendi Heinzelman

2005-01-01T23:59:59.000Z

63

Energy management in sensor networks  

Science Journals Connector (OSTI)

...sensor networks are based on solar cells, such as Heliomote...design a highly efficient solar-based harvesting system, these solar-based designs need to employ...achieves a maximum value. (b) Energy storage According to the type of...

2012-01-01T23:59:59.000Z

64

Policy Management for Networked Systems and Applications  

E-Print Network (OSTI)

Policy Management for Networked Systems and Applications Dakshi Agrawal, Seraphin Calo, James Giles {agrawal,scalo,gilesjam,kangwon,dverma}@us.ibm.com Abstract In this paper, we present a novel policy and administrative domains. The proposed policy middleware provides a standard infrastructure for the creation

Lee, Kang-Won

65

Verification of Network Management System Configurations David L. Cohrs  

E-Print Network (OSTI)

Verification of Network Management System Configurations David L. Cohrs (608) 262-6617 dave domains too autonomous for this centralized approach. Distributing the network management system causes- ments. The NMSL system then operates in two roles: it verifies network management specifications

Miller, Barton P.

66

An Architectural Approach for Integrated Network and Systems Management  

E-Print Network (OSTI)

An Architectural Approach for Integrated Network and Systems Management Raouf Boutaba 1 and Simon introduce an architecture for the integrated management of all resources in a networked system, i that the networked system environment and its management tasks are appropriately structured. Therefore, we have

Boutaba, Raouf

67

Collaborative Approaches to Probabilistic Reasoning in Network Management  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 6.3 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 6.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 A Source Code for Tools and Utilities 133 B Network... network and seeing which nodes return the error message, and in so doing identify themselves. Traceroutes [100] from a set of distributed servers [101] [102] [103] [104] can be stitched together, to provide more complete topologies than the trees resulting...

Ewy, Benjamin

2014-08-31T23:59:59.000Z

68

Analysis of an Ad Hoc Network with Autonomously Moving Nodes Department of Informatics  

E-Print Network (OSTI)

of Stellenbosch 7600 Stellenbosch, South Africa M. Mandjes Korteweg-de Vries Institute for Mathematics Plantage or throughput. Here radio interference plays a pivotal role, as it defines an interesting trade-off: nodes may prefer to be close together in order to reduce the energy needed to transmit data, but on the other hand

Krzesinski, Tony

69

Carbon microspheres as network nodes in a novel biocompatible gel J. E. St. Dennis,a  

E-Print Network (OSTI)

through the incorporation of uniform carbon micro- spheres. The carbon particles act as nodes in the gel on the gelation of vesicles using other types of hydro- phobically modified polymers.9 It is noteworthy that gelation of vesicles is not observed if the added polymer does not have hydro- phobic tails.10 The above

Raghavan, Srinivasa

70

Autonomous Virtual Mobile Nodes  

E-Print Network (OSTI)

This paper presents a new abstraction for virtual infrastructure in mobile ad hoc networks. An AutonomousVirtual Mobile Node (AVMN) is a robust and reliable entity that is designed to cope with theinherent difficulties ...

Dolev, Shlomi

2005-06-15T23:59:59.000Z

71

Model-based integrated management: applying autonomic systems engineering to network and systems management  

Science Journals Connector (OSTI)

We present a novel approach for integrated management of networks and information systems, based on the specification of executable behaviour models. A model processing plane is introduced, consisting of a number of processing units that together form ... Keywords: ASE, autonomic systems, autonomic systems engineering, behaviour modelling, information systems, management integration, model transformation, model-based integrated management, network management, systems management

Edzard Hofig; Peter H. Deussen

2011-12-01T23:59:59.000Z

72

Mobility Management Using Virtual Multi-parent Tree in Infrastructure Incorporated Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

Mobile nodes in the integrated network of infrastructure networks and mobile ad hoc networks need ... other traditional methods - proactive, reactive, and hybrid by resorting to simulation. The result shows...

Trung-Dinh Han; Hoon Oh

2009-01-01T23:59:59.000Z

73

On Relay Nodes Deployment for Distributed Detection in Wireless Sensor Networks  

E-Print Network (OSTI)

considered the use of relaying to improve the energy-efficiency of the sensor network. The work in [8] also the energy-efficiency of the sensor network. Our interest in this paper will be focused on how to deploy Engineering, Alexandria University, Alexandria 21544, Egypt. and Institute for Systems Research kseddik

Liu, K. J. Ray

74

Energy Management in Wireless Sensor Network Operations  

E-Print Network (OSTI)

sense to replace a node with a new node with a higher amount of energy. If node-i is replaced on day-t, let wti be the additional amount of energy in the incoming new node over the outgoing node (i.e. the energy stored in the new node is eti + w t i... + w t i D X j2Vi ETij r t ij + E R X j2Ui rtji ! ; i = 1; : : : ; N; t = 1; : : : ; T (5) eti + w t i E0; i = 1; : : : ; N; t = 1; : : : ; T (6) wti E0 yti ; i = 1; : : : ; N; t = 1; : : : ; T (7) yti xt; i = 1; : : : ; N...

Mohapatra, Arupa Kumar

2013-07-26T23:59:59.000Z

75

Developing new products with knowledge management methods and process development management in a network  

Science Journals Connector (OSTI)

When managing the problem of new product development (NPD), a firm needs to cooperate with or compete with its strategic partners in a network to survive in the industry. This paper first discusses the critical success factors (CSF) of NPD in a network, ... Keywords: Analytic network process (ANP), Knowledge management (KM), New product development (NPD), Product lifecycle management (PLM)

Hsing Hung Chen; He-Yau Kang; Xiaoqiang Xing; Amy H. I. Lee; Yunhuan Tong

2008-03-01T23:59:59.000Z

76

Imaging Sensor Nets: An RFID-inspired Framework for Million Node Sensor Networks  

E-Print Network (OSTI)

by these networks have a host of applications, including intelligent automation in homes and factories for many small-scale applications, such as home or building automation. However, there are many

Rodwell, Mark J. W.

77

Building and Selecting Mobile Agents for Network Management  

Science Journals Connector (OSTI)

This paper presents a framework for reusable mobile agents for network management in the sense that they are independent of either particular networks or applications. The framework enables a mobile agent to be composed from two layered components, which ... Keywords: Network management, formal specification, mobile agent, process algebra, separation of concerns

Ichiro Satoh

2006-03-01T23:59:59.000Z

78

Disaster Management Projects Using Wireless Sensor Networks: An Overview  

Science Journals Connector (OSTI)

There are numerous projects dealing with disaster management and emergency response that use wireless sensor networks technologies. Indeed, WSNs offer a good alternative compared to traditional ad hoc networks. Air pollution monitoring, forest fire detection, ... Keywords: Wireless Sensor Networks, Disaster Management, Emergency Response, Information Systems

Imane Benkhelifa, Nadia Nouali-Taboudjemat, Samira Moussaoui

2014-05-01T23:59:59.000Z

79

Active traffic management on road networks: a macroscopic approach  

Science Journals Connector (OSTI)

...Active traffic management on road networks: a macroscopic approach Alex A. Kurzhanskiy...and Computer Sciences, University...Active traffic management (ATM) is the...by National Science Foundation Award...Active traffic management on road networks: a macroscopic approach. | Active traffic...

2010-01-01T23:59:59.000Z

80

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network (OSTI)

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Efficient Computation of Sensitivity Coefficients of Node Voltages and Line Currents in Unbalanced Electrical Networks  

E-Print Network (OSTI)

The problem of optimal control of power distribution systems is becoming increasingly compelling due to the progressive penetration of distributed energy resources in this specific layer of the electrical infrastructure. Distribution systems are, indeed, experiencing significant changes in terms of operation philosophies that are often based on optimal control strategies relying on the computation of linearized dependencies between controlled (e.g. voltages) and control variables (e.g. power injections). As the implementation of these strategies in real-time controllers imposes stringent time constraints, the derivation of analytical dependency between controlled and control variables becomes a non-trivial task to be solved. With reference to optimal voltage and power flow controls, this paper aims at providing an analytical derivation of node voltage and line current flows as a function of the nodal power injections. Compared to other approaches presented in the literature, the one proposed here is based on ...

Christakou, Konstantina; Paolone, Mario; Tomozei, Dan-Cristian

2012-01-01T23:59:59.000Z

82

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

83

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

84

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

85

Network neighborhood analysis with the multi-node topological overlap measure  

Science Journals Connector (OSTI)

......report the P-values of the Kruskal-Wallis rank sum test, which is a non-parametric...report the P-values of the Kruskal-Wallis rank sum test, which is a standard...PPI network. We report the Kruskal-Wallis P-values for comparing the......

Ai Li; Steve Horvath

2007-01-15T23:59:59.000Z

86

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks  

E-Print Network (OSTI)

investigated efficient data delivery, energy conservation, and other related issues [1]. Network security has@cs.uno.edu Yunghsiang S. Han Graduate Institute of Communication Engineering National Taipei University Sanhsia, Taipei and modification. In order to provide security for communication and data col- lection in WSNs, security keys need

Deng, Jing

87

V-125: Cisco Connected Grid Network Management System Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco...

88

MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks  

E-Print Network (OSTI)

8. 2 Related Work Most management and code distribution approaches does not support hetero- geneousMARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks Gerald Wagenknecht Science and Applied Mathematics University of Bern, Switzerland Email: {wagen, anwander, braun, staub

Braun, Torsten

89

Towards an Environmental Management Approach for Collaborative Networks  

E-Print Network (OSTI)

. Keywords: Environmental management, enterprise architecture. 1 Introduction The continued existenceTowards an Environmental Management Approach for Collaborative Networks Ovidiu Noran Griffith University, Australia, O.Noran@griffith.edu.au Abstract. Environmental responsibility is evolving

Boyer, Edmond

90

Resource management in heterogeneous wireless sensor networks  

E-Print Network (OSTI)

A. , 2002: Joint scheduling and power control for wirelesstransmit power control while scheduling wireless nodes ina control packet which contains the scheduling information

Regini, Edoardo

2009-01-01T23:59:59.000Z

91

Introduction Operations Management of Blood Banking Systems Blood Banking Systems Network Design Supply Chain Network  

E-Print Network (OSTI)

Introduction Operations Management of Blood Banking Systems Blood Banking Systems Network Design Supply Chain Network Operations Management and Design of A Sustainable Blood Banking System Amir Masoumi of Massachusetts Amherst #12;Introduction Operations Management of Blood Banking Systems Blood Banking Systems

Nagurney, Anna

92

Detection and management of fraud in UMTS networks.  

E-Print Network (OSTI)

Detection and management of fraud in UMTS networks. E.Lerouge * , Y.Moreau*, H.Verrelst*, J of the work packages within this project is developing fraud detection and management tools for the GSM network. Prototypes of three different fraud detection tools have been developed, and demonstrated, using

93

Joint Energy Management and Resource Allocation in Rechargeable Sensor Networks  

E-Print Network (OSTI)

the batteries and extend the network's lifetime. Many forms of energy such as solar, wind, water flow, thermalJoint Energy Management and Resource Allocation in Rechargeable Sensor Networks Ren-Shiou Liu CSE@ece.osu.edu Abstract--Energy harvesting sensor platforms have opened up a new dimension to the design of network

Sinha, Prasun

94

A Network Congestion Control Approach to Airport Departure Management  

E-Print Network (OSTI)

for a generic airport and then validate it using surface surveillance data from Boston Logan InternationalA Network Congestion Control Approach to Airport Departure Management Harshad Khadilkar and Hamsa at airports, by posing the problem in a network congestion control framework. We develop a network model

Gummadi, Ramakrishna

95

Cache management method for transmitting real-time streaming media in opportunistic networks based on community networks  

Science Journals Connector (OSTI)

Opportunistic networks are often used for delivering messages in the social networks. This paper proposes a community networks based cache management method (CNCM) which is applied to transmit the mobile real-time streaming media in community networks. ... Keywords: buffer management, community networks, opportunistic networks

Daru Pan; Xiong Liu; Xin Zou; Jiajia Sun; Hui Zhang

2013-08-01T23:59:59.000Z

96

A brief guide to access the Wound Healing and Management (WHAM) Node via JBI COnNECT+  

E-Print Network (OSTI)

(WHAM) click on the Node title as indicated by the red arrow. #12; Enter your search term; in this example I have entered the term `wound' And/or use the drop-down menus to define the boundaries of your search. #12; The search term `wound' within the WHAM Node returned 35 Evidence Summaries; 7 Recommended

97

The personal node (PN)  

Science Journals Connector (OSTI)

A Personal Node (PN) is a small, wallet-sized device that integrates people into the Internet. A PN incorporates wireless communication, limited user I/O, and local environmental telemetry to catalyze the coordination of other smart space (SS) and network ...

Gregory G. Finn; Joe Touch

1999-03-01T23:59:59.000Z

98

Hybrid Key Management for Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

Many public key infrastructure (PKI) approaches have been proposed in ... networks (MANETs). We present a new hybrid key management infrastructure, which combines the concepts of PKIs for MANET with trusted-third...

David Sanchez Sanchez; Heribert Baldus

2006-01-01T23:59:59.000Z

99

Quality of Interaction for Sensor Network Energy-Efficient Management  

Science Journals Connector (OSTI)

......18. IEEE, New York. The Computer...Sensor Network Energy-Efficient Management...295304. IEEE, New York. [19] Natu...a hybrid, energy-efficient...2005) An Energy-Efficient Unequal...597604. IEEE, New York. [23] Couto......

Wei Gong; Kebin Liu; Xiaoxu Li; Xin Miao; Tong Zhu

2013-08-01T23:59:59.000Z

100

An Architecture for Managing Virtual Circuit and Virtual Path Services on ATM Networks  

E-Print Network (OSTI)

1 An Architecture for Managing Virtual Circuit and Virtual Path Services on ATM Networks Abstract management architecture that provides the services and is instrumented for network management purposes service monitor- ing and control functions. The network management architecture proposes complete managed

Columbia University

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Local Area Networks - Applications to Energy Management  

E-Print Network (OSTI)

LOCAL AREA NETWORKS - APPLICATIONS TO MERCY MANAGmNT Advanced BRUCE M. BAKKEN Software bfanager Micro Syatems Corporation Milwaukee, WI ABSTRACT One of the newest advances in computer technology is the Local Area Network. Its many...

Bakken, B. M.

1984-01-01T23:59:59.000Z

102

Inventory management with dynamic Bayesian network software systems  

E-Print Network (OSTI)

Inventory management with dynamic Bayesian network software systems Mark Taylor1 and Charles Fox2 1.fox@sheffield.ac.uk Abstract. Inventory management at a single or multiple levels of a supply chain is usually performed-the-shelf graphical software systems. We show how such sys- tems may be deployed to model a simple inventory problem

Barker, Jon

103

Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks  

E-Print Network (OSTI)

Wireless sensor/actuator networks (WSANs) are emerging rapidly as a new generation of sensor networks. Despite intensive research in wireless sensor networks (WSNs), limited work has been found in the open literature in the field of WSANs. In particular, quality-of-service (QoS) management in WSANs remains an important issue yet to be investigated. As an attempt in this direction, this paper develops a fuzzy logic control based QoS management (FLC-QM) scheme for WSANs with constrained resources and in dynamic and unpredictable environments. Taking advantage of the feedback control technology, this scheme deals with the impact of unpredictable changes in traffic load on the QoS of WSANs. It utilizes a fuzzy logic controller inside each source sensor node to adapt sampling period to the deadline miss ratio associated with data transmission from the sensor to the actuator. The deadline miss ratio is maintained at a pre-determined desired level so that the required QoS can be achieved. The FLC-QM has the advantag...

Xia, Feng; Sun, Youxian; Tian, Yu-Chu

2008-01-01T23:59:59.000Z

104

Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks  

E-Print Network (OSTI)

their power consumption. The objective is to maximize the minimum energy reserve over any node in the network algorithms yield significantly higher energy reserves than the approaches without speed and power control. 1 such as solar, wind or wa- ter flow, WSN nodes potentially have perpetual energy supply. However, given

Aydin, Hakan

105

Scalable fault management architecture for dynamic optical networks : an information-theoretic approach  

E-Print Network (OSTI)

All-optical switching, in place of electronic switching, of high data-rate lightpaths at intermediate nodes is one of the key enabling technologies for economically scalable future data networks. This replacement of ...

Wen, Yonggang

2008-01-01T23:59:59.000Z

106

Mobile power management for maximum battery life in wireless communication networks  

Science Journals Connector (OSTI)

We address the problem of how a mobile node in a wireless network should vary its transmitter power so that energy consumption is minimized, subject to fixed quality-of-service constraints. Optimal solutions are obtained for channels with stationary, ...

John M. Rulnick; Nicholas Bambos

1996-03-01T23:59:59.000Z

107

Using Ranked nodes to model qualitative judgements in Bayesian Networks Norman Fenton, Martin Neil and Jose Gallan Caballero  

E-Print Network (OSTI)

is to construct relevant NPTs using the minimal amount of expert elicitation, recognising that it is rarely cost in a joint distribution is characterised by a directed acyclic graph, with nodes representing random in earlier real-world BN model building (such as in the model for software safety in the nuclear industry [17

Neil, Martin

108

SmartNode: Achieving 802.11 MAC Interoperability in Power-efficient Ad Hoc Networks with Dynamic Range Adjustments  

E-Print Network (OSTI)

, energy conservation may be achieved by dynamically adjusting transmission ranges on the fly at each node Range Adjustments Edmond Poon, Baochun LiÂŁ Abstract The standard CSMA/CA based IEEE 802.11 protocol as conservation and higher system throughput through better spatial reuse of spectrum. In this work, we propose

Li, Baochun

109

Cognitive radio networks for dynamic spectrum management.  

E-Print Network (OSTI)

??A fundamental evolution is witnessed in recent research and development of wireless communications: much effort is put on shifting from the current static spectrum management… (more)

Jia, Juncheng

2009-01-01T23:59:59.000Z

110

Belgium east loop active network management (Smart Grid Project) | Open  

Open Energy Info (EERE)

Belgium east loop active network management (Smart Grid Project) Belgium east loop active network management (Smart Grid Project) Jump to: navigation, search Project Name Belgium east loop active network management Country Belgium Coordinates 50.148746°, 4.086914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.148746,"lon":4.086914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

111

Sensor network minimal energy routing with latency guarantees  

Science Journals Connector (OSTI)

We consider wireless sensor networks with nodes switching ON (awake) and OFF (sleeping) to preserve energy, and transmitting data over channels with varying quality. The objective is to determine the best path from each node to a single gateway. Performance ... Keywords: energy and resource management, large deviations, latency, routing, sensor networks, sleeping schedule

Wei Lai; Ioannis Ch. Paschalidis

2007-09-01T23:59:59.000Z

112

Simulation and theoretical results on cluster management and directory management in dynamic hierarchical networks  

E-Print Network (OSTI)

of one node will reach the top-most level DM and excite the level-changing efFect. The upper bound time on the settle-down time which will be derived next is: O(m(log- n) ) (where n = the total number of nodes in network M rn = [ ? J the min. number... condition Cn = 0(rn) Tn c(k) = P 5 [30(m)] (k') + [9. 50(m) + Ts] (k) + O(m) In the worst case, it may reach the top most level, k = Iog- n Tpnner(log?a n) = 0. 5 [30(m)] (log - n) + [9. 50(m) + Ts] (log ? ri ) + 0(nc) 0. 5Bl(log- n) + Bz(log- n) + CB...

Shen, Showi-Min

2012-06-07T23:59:59.000Z

113

Networked Management Learning for Managers of Small and Medium Enterprises  

E-Print Network (OSTI)

Hodgson2 1 Department of Applied Information Technology, IT-University of Gothenburg, Sweden; 2 Lancaster-cultural theories. INTRODUCTION Whilst policy-makers believe SMEs play a crucial role for the growth of the economy management techniques in the sector. This view is at odds with the expectations of SMEs as a "major source

Paris-Sud XI, Université de

114

Social Networking for Emergency Management and Public Safety  

SciTech Connect

On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

2010-08-31T23:59:59.000Z

115

Hopper Login Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Login Nodes Login Nodes Login Nodes Login Node Quick Facts When you ssh to hopper.nersc.gov, you are connecting to a "login node." Login nodes are used to edit files, compile codes, and submit job scripts to the batch system to run on the "compute nodes." Hopper has 12 login nodes (this is largely transparent to users). 4 quad-core AMD 2.4 GHz Opteron processers (16 cores total) on 8 of the login nodes 4 8-core AMD 2.0 GHz Opteron processors (32 cores total) on 4 of the login nodes. Each login node has 128 GB of memory. The login nodes sit behind a load balancer. New connections are assigned to a login node on a round robin fashion with the exception that if you've connected to Hopper recently, the load balancer will attempt to put you on the same login node as your previous connection.

116

Synchronizing compute node time bases in a parallel computer  

SciTech Connect

Synchronizing time bases in a parallel computer that includes compute nodes organized for data communications in a tree network, where one compute node is designated as a root, and, for each compute node: calculating data transmission latency from the root to the compute node; configuring a thread as a pulse waiter; initializing a wakeup unit; and performing a local barrier operation; upon each node completing the local barrier operation, entering, by all compute nodes, a global barrier operation; upon all nodes entering the global barrier operation, sending, to all the compute nodes, a pulse signal; and for each compute node upon receiving the pulse signal: waking, by the wakeup unit, the pulse waiter; setting a time base for the compute node equal to the data transmission latency between the root node and the compute node; and exiting the global barrier operation.

Chen, Dong; Faraj, Daniel A; Gooding, Thomas M; Heidelberger, Philip

2014-12-30T23:59:59.000Z

117

A Policy Management System for Ambient Networks K. Jean and A. Galis, {kjean, agalis}@ee.ucl.ac.uk,  

E-Print Network (OSTI)

A Policy Management System for Ambient Networks K. Jean and A. Galis, {kjean, agalis of Ambient Networks necessitate a new dynamic, distributed policy management system. Existing policy management systems do not provide the required support for mobility, dynamicity and heterogeneity

Haddadi, Hamed

118

Active Network Management (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Management (Smart Grid Project) Management (Smart Grid Project) Jump to: navigation, search Project Name Active Network Management Country United Kingdom Coordinates 55.378052°, -3.435973° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":55.378052,"lon":-3.435973,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

119

RICE UNIVERSITY Micro Power Management of Active 802.11 Network Interfaces  

E-Print Network (OSTI)

RICE UNIVERSITY Micro Power Management of Active 802.11 Network Interfaces by Jiayang Liu A THESIS.11 Network Interfaces by Jiayang Liu Micro power management (µPM), a standard-complaint MAC level solution AND COMPUTER ENGINEERING HOUSTON, TEXAS NOVEMBER 2008 #12;II ABSTRACT Micro Power Management of Active 802

Zhong, Lin

120

A Policy Management System for Hybrid Networks N Vardalachos, J Rubio, A Galis and J Serrat  

E-Print Network (OSTI)

A Policy Management System for Hybrid Networks N Vardalachos, J Rubio, A Galis and J Serrat management system for this type of networks. 1. Introduction In recent years it has become apparent management system has been designed by applying mainly Open Distributed Processing (ODP) principles taking

Haddadi, Hamed

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

122

Strategic knowledge management : manging dynamic knowledge and small-worlds social networks.  

E-Print Network (OSTI)

??This thesis examines knowledge management from a social networking perspective, arguing that knowledge, as a social construct, has at its basis, people; and their interaction… (more)

Sastrowardoyo, Saraswati

2009-01-01T23:59:59.000Z

123

Redundancy Control in Large Scale Sensor Networks via Compressive Sensing  

E-Print Network (OSTI)

, China. The authors deployed 100 sensor nodes and 1096 relay nodes to monitor the urban CO2 in a 5000(mRedundancy Control in Large Scale Sensor Networks via Compressive Sensing Liwen Xu1 , Yongcai Wang1, and require high data storage and management costs. To deal with these challenges, compressive sensing (CS

Wang, Yongcai

124

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

125

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

126

Hopper Compute Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Compute Nodes Compute Nodes Compute Nodes MC-proc.png Compute Node Configuration 6,384 nodes 2 twelve-core AMD 'MagnyCours' 2.1-GHz processors per node (see die image to the right and schematic below) 24 cores per node (153,216 total cores) 32 GB DDR3 1333-MHz memory per node (6,000 nodes) 64 GB DDR3 1333-MHz memory per node (384 nodes) Peak Gflop/s rate: 8.4 Gflops/core 201.6 Gflops/node 1.28 Peta-flops for the entire machine Each core has its own L1 and L2 caches, with 64 KB and 512KB respectively One 6-MB L3 cache shared between 6 cores on the Magny-Cours processor Four DDR3 1333-MHz memory channels per twelve-core 'MagnyCours' processor Compute Node Software By default the compute nodes run a restricted low-overhead operating system optimized for high performance computing called "Cray Linux Environment"

127

Data Transfer Nodes Yield Results!  

NLE Websites -- All DOE Office Websites (Extended Search)

DTN DTN Data Transfer Nodes Yield Results August 1, 2011 | Tags: Accelerator Science, Data Transfer, ESnet Linda Vu, +1 510 495 2402, lvu@lbl.gov The ability to reliably move and share data around the globe is essential to scientific collaboration, that's why three Department of Energy (DOE) Scientific Computing Centers-Argonne and Oak Ridge Leadership Computing Facilities, and the National Energy Research Scientific Computing Center (NERSC)-have teamed up to focus on optimizing wide area network (WAN) transfers. This ongoing effort began several years ago when each site deployed dedicated transfer nodes (DTNs), optimized for carrying data between the DOE facilities. Today, engineers from each site continue to meet regularly with DOE's Energy Sciences Network staff (ESnet) to develop strategies

128

2001, HCS Research Lab. All Rights Reserved. Achieving Scalable Cluster System Analysis and Management  

E-Print Network (OSTI)

-based cluster system analysis and management. Among these services is the ability to detect network and node for distributed computing integrated into a cluster management system. Previous approaches to cluster management in a non-proprietary fashion. This cluster management system employs gossip techniques to address

George, Alan D.

129

Energy Management System for an Hybrid Electric Vehicle, Using Ultracapacitors and Neural Networks  

E-Print Network (OSTI)

Energy Management System for an Hybrid Electric Vehicle, Using Ultracapacitors and Neural Networks management system for hybrid electric vehicles (HEV), using neural networks (NN), was developed and tested. The system minimizes the energy requirement of the vehicle and can work with different primary power sources

Catholic University of Chile (Universidad CatĂłlica de Chile)

130

A Robust Amorphous Hierarchy from Persistent Nodes  

E-Print Network (OSTI)

For a very large network deployed in space with only nearby nodes able to talk to each other, we want to do tasks like robust routing and data storage. One way to organize the network is via a hierarchy, but hierarchies ...

Beal, Jacob

2003-05-01T23:59:59.000Z

131

PDSF Interactive Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Interactive (login) Nodes Interactive (login) Nodes Interactive (login) Nodes There are 4 interactive nodes at PDSF, pdsf[1-4].nersc.gov, that should be accessed via ssh to pdsf.nersc.gov. These are the gateways to accessing the rest of PDSF. Users can submit batch jobs as well as view and manipulate their files and directories from the interactive nodes. The configuration of the interactive nodes is shown in the table below. Processor Clock Speed (GHz) Architecture Cores Total Memory (GB) Scratch Space (GB) Intel Xeon X5650 2.67 x86_64 12 47 184 Because these nodes are shared by many users anything disruptive you might do affects not only your work but their work, too. Please take a look at the Best Practices page for guidance about what you should and should not do on the interactive nodes.

132

PDSF Compute Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Compute Nodes Compute Nodes Compute Nodes There are currently 2632 nodes available on PDSF. The compute (batch) nodes at PDSF are heterogenous, reflecting the periodic procurement of new nodes (and the eventual retirement of old nodes). From the user's perspective they are essentially all equivalent except that some have more memory per job slot. If your jobs have memory requirements beyond the default maximum of 1.1GB you should specify that in your job submission and the batch system will run your job on an appropriate node. See Submitting jobs for more information. Processor Clock Speed (GHz) Architecture Cores Available Memory (GB) Scratch (GB/core) Job Slots Quad Intel 2.2 lx24-amd64 8 23.4 10 8 QuadCore AMD/Intel 2.1 lx24-amd64 8 15.6 10 8 6 Core Intel 2.3 lx24-amd64 12 47.0 10 12

133

Stream classification using hierarchical artificial neural networks: A fluvial hazard management tool  

E-Print Network (OSTI)

Stream classification using hierarchical artificial neural networks: A fluvial hazard management-in-Chief Keywords: Stream classification Artificial neural networks Kohonen self-organizing maps Counterpropagation. In this research, we apply non-parametric, clus- tering and classification artificial neural networks to assimilate

Vermont, University of

134

On the design of mobility management scheme for 802.16-based network environment  

Science Journals Connector (OSTI)

In this paper, we investigate the characteristics of IEEE 802.16 and conclude that it is better to equip BS (base station) and SS (subscriber station) with Layer 3 functionality. Therefore, an 802.16 network can act as the backbone network of different ... Keywords: 802.16, BWA, Mobility management, Vertical handoff, Wireless overlay network

Chun-Chuan Yang; Chun-Shian Tsai; Junn-Yen Hu; Tzu-Chien Chuang

2007-06-01T23:59:59.000Z

135

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

136

The Node Monitoring Component of a Scalable Systems Software Environment  

SciTech Connect

This research describes Fountain, a suite of programs used to monitor the resources of a cluster. A cluster is a collection of individual computers that are connected via a high speed communication network. They are traditionally used by users who desire more resources, such as processing power and memory, than any single computer can provide. A common drawback to effectively utilizing such a large-scale system is the management infrastructure, which often does not often scale well as the system grows. Large-scale parallel systems provide new research challenges in the area of systems software, the programs or tools that manage the system from boot-up to running a parallel job. The approach presented in this thesis utilizes a collection of separate components that communicate with each other to achieve a common goal. While systems software comprises a broad array of components, this thesis focuses on the design choices for a node monitoring component. We will describe Fountain, an implementation of the Scalable Systems Software (SSS) node monitor specification. It is targeted at aggregate node monitoring for clusters, focusing on both scalability and fault tolerance as its design goals. It leverages widely used technologies such as XML and HTTP to present an interface to other components in the SSS environment.

Samuel James Miller

2006-08-09T23:59:59.000Z

137

A Novel Grid Node-by-Node Security Model  

Science Journals Connector (OSTI)

In this paper, we present a novel grid Node by Node security model. We partition the numerous grid nodes into different autonomy areas and each ... key, integrity and encrypt algorithm between the grid nodes are ...

Zhengyou Xia; Yichuan Jiang

2004-01-01T23:59:59.000Z

138

A TMN system for VPC and routing management in ATM networks  

E-Print Network (OSTI)

A TMN system for VPC and routing management in ATM networks D. P. Griffin Institute of Computer, these parameters and subsequently the routes based on them can be configured on-line by a management system and Routing management system is required to take advantage of the features of VPCs while ensuring

Griffin, David

139

Wireless Network Capacity Management: A Real Options Approach  

E-Print Network (OSTI)

capacity, market price of risk, investment timing option 1 Introduction Wireless networks are now regarded

Forsyth, Peter A.

140

Wireless Sensor Network for Advanced Energy Management Solutions  

SciTech Connect

Eaton has developed an advanced energy management solution that has been deployed to several Industries of the Future (IoF) sites. This demonstrated energy savings and reduced unscheduled downtime through an improved means for performing predictive diagnostics and energy efficiency estimation. Eaton has developed a suite of online, continuous, and inferential algorithms that utilize motor current signature analysis (MCSA) and motor power signature analysis (MPSA) techniques to detect and predict the health condition and energy usage condition of motors and their connect loads. Eaton has also developed a hardware and software platform that provided a means to develop and test these advanced algorithms in the field. Results from lab validation and field trials have demonstrated that the developed advanced algorithms are able to detect motor and load inefficiency and performance degradation. Eaton investigated the performance of Wireless Sensor Networks (WSN) within various industrial facilities to understand concerns about topology and environmental conditions that have precluded broad adoption by the industry to date. A Wireless Link Assessment System (WLAS), was used to validate wireless performance under a variety of conditions. Results demonstrated that wireless networks can provide adequate performance in most facilities when properly specified and deployed. Customers from various IoF expressed interest in applying wireless more broadly for selected applications, but continue to prefer utilizing existing, wired field bus networks for most sensor based applications that will tie into their existing Computerized Motor Maintenance Systems (CMMS). As a result, wireless technology was de-emphasized within the project, and a greater focus placed on energy efficiency/predictive diagnostics. Commercially available wireless networks were only utilized in field test sites to facilitate collection of motor wellness information, and no wireless sensor network products were developed under this project. As an outgrowth of this program, Eaton developed a patented energy-optimizing drive control technology that is complementary to a traditional variable frequency drives (VFD) to enable significant energy savings for motors with variable torque applications, such as fans, pumps, and compressors. This technology provides an estimated energy saving of 2%-10% depending on the loading condition, in addition to the savings obtained from a traditional VFD. The combination of a VFD with the enhanced energy-optimizing controls will provide significant energy savings (10% to 70% depending on the load and duty cycle) for motors that are presently connected with across the line starters. It will also provide a more favorable return on investment (ROI), thus encouraging industries to adopt VFDs for more motors within their facilities. The patented technology is based on nonintrusive algorithms that estimate the instantaneous operating efficiency and motor speed and provide active energy-optimizing control of a motor, using only existing voltage and current sensors. This technology is currently being commercialized by Eaton’s Industrial Controls Division in their next generation motor control products. Due to the common nonintrusive and inferential nature of various algorithms, this same product can also include motor and equipment condition monitoring features, providing the facility owner additional information to improve process uptime and the associated energy savings. Calculations estimated potential energy savings of 261,397GWh/Yr ($15.7B/yr), through retrofitting energy-optimizing VFDs into existing facilities, and incorporating the solution into building equipment sold by original equipment manufacturers (OEMs) and installed by mechanical and electrical contractors. Utilizing MCSA and MPSA for predictive maintenance (PM) of motors and connected equipment reduces process downtime cost and the cost of wasted energy associated with shutting down and restarting the processes. Estimated savings vary depending on the industry segment and equi

Peter J. Theisen; Bin Lu, Charles J. Luebke

2009-09-23T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

A Framework for Evaluation of Multi-Agent System Approaches to Logistics Network Management  

Science Journals Connector (OSTI)

We study the applicability of multi-agent systems (MAS) to production and logistics network management. The goal is to create and evaluate sets of intelligent agents that can cooperatively support production a...

Paul Davidsson; Fredrik Wernstedt

2004-01-01T23:59:59.000Z

142

A Simulation Model for Self-organised Management of Sensor/Actuator Networks  

E-Print Network (OSTI)

A Simulation Model for Self-organised Management of Sensor/Actuator Networks Thomas Halva Labella by the behaviour observed in animal colonies. In this paper, we introduce our ongoing work (the simulation model

Breu, Ruth

143

Knowledge Network: An Information Repository with Services for Managing Concurrent Engineering Design  

E-Print Network (OSTI)

Knowledge Network: An Information Repository with Services for Managing Concurrent Engineering, leizero}@ie.utoronto.ca Abstract Our effort is to construct a Knowledge Aided Design (KAD) system, which design engineers. The KAD system centers on a knowledge network that stores design knowledge and provides

Fox, Mark S.

144

A Bayesian Network to Manage Risks of Maritime Piracy against Offshore Oil Fields  

E-Print Network (OSTI)

A Bayesian Network to Manage Risks of Maritime Piracy against Offshore Oil Fields Amal Bouejla1 an innovative solution to the problem of offshore piracy from the perspective of the entire processing chain, offshore oil fields, pirate attacks, Bayesian networks, quantitative and qualitative knowledge

145

A market-managed topology formation algorithm for peer-to-peer file sharing networks  

Science Journals Connector (OSTI)

Currently, peer-to-peer (P2P) networks suffer from users that do not contribute any kind of resources to the P2P community. Those users, which are called freeriders, benefit largely from contributions of other users but reduce the system performance ... Keywords: economics, incentive scheme, market-management, peer-to-peer networks, pricing, reputation, simulation, trust, utility function

Tarik Idris; Jörn Altmann

2006-06-01T23:59:59.000Z

146

Energy efficient management framework for multihop TDMA-based wireless networks  

E-Print Network (OSTI)

and energy consumption. To do so, we first propose an Optimal approach, called Optimal Green Routing and LinkEnergy efficient management framework for multihop TDMA-based wireless networks Ahmed Amokrane a January 2014 Available online 11 January 2014 Keywords: TDMA-based multihop wireless networks Energy

Boutaba, Raouf

147

Cognitive Task Analysis of Network Analysts and Managers for Network Situational Awareness  

SciTech Connect

The goal of the project was to create a set of next generation cyber situational awareness capabilities with applications to other domains in the long term. The goal is to improve the decision making process such that decision makers can choose better actions. To this end, we put extensive effort into ensuring we had feedback from network analysts and managers and understood what their needs truly were. Consequently, this is the focus of this portion of the research. This paper discusses the methodology we followed to acquire this feedback from the analysts, namely a cognitive task analysis. Additionally, this paper provides the details we acquired from the analysts. This essentially provides details on their processes, goals, concerns, the data and meta-data they analyze, etc. A final result we describe is the generation of a task-flow diagram.

Erbacher, Robert; Frincke, Deborah A.; Wong, Pak C.; Moody, Sarah; Fink, Glenn A.

2010-01-18T23:59:59.000Z

148

Network Management with Consistently Managed Objects by Wu & Kaiser 17 [3] A. Borning, R. Duisberg, B. FreemanBenson, A. Kramer and M. Woolf. Constraint  

E-Print Network (OSTI)

Meandzija and Jil Westcott (editors), IFIP TC 6/WG 6.6 Symposium on Integrated Network Management, 235] J. Tucker. A Common Approach to Managed Objects. In Branislav Meandzija and Jil Westcott (editors

149

An Efficient Energy Management System for Android Phone Using Bayesian Networks  

E-Print Network (OSTI)

. They changed the quality of multimedia content according to the context for energy efficiency [8]. Simunic etAn Efficient Energy Management System for Android Phone Using Bayesian Networks Young-Seol Lee, proximity, light and orientation sensors for context-awareness. Energy-efficient battery management systems

Cho, Sung-Bae

150

Dynamic Power Management with Power Network-on-Chip Inna Vaisband and Eby G. Friedman  

E-Print Network (OSTI)

Dynamic Power Management with Power Network-on-Chip Inna Vaisband and Eby G. Friedman Department dynamically controlled power to support power efficient and portable systems. Effi- ciently providing multiple point-of-load on-chip voltages requires fundamental changes to the power delivery and management process

Friedman, Eby G.

151

A robust window-based multi-node minimization technique using Boolean relations  

E-Print Network (OSTI)

Multi-node optimization using Boolean relations is a powerful approach for network minimization. The approach has been studied in theory, and so far its superiority over single node optimization techniques has only been conjectured for practical...

Cobb, Jeffrey Lee

2008-10-10T23:59:59.000Z

152

A robust window-based multi-node minimization technique using Boolean relations  

E-Print Network (OSTI)

Multi-node optimization using Boolean relations is a powerful approach for network minimization. The approach has been studied in theory, and so far its superiority over single node optimization techniques has only been conjectured for practical...

Cobb, Jeffrey Lee

2009-05-15T23:59:59.000Z

153

ULTRALIGHT: A MANAGED NETWORK INFRASTRUCTURE FOR HEP Shawn McKee, University of Michigan, Ann Arbor, MI, 48109, USA  

E-Print Network (OSTI)

-focused agenda. The UltraLight network is a hybrid packet- and circuit-switched network infrastructure employing infrastructures, currently focused on CPU and storage, to include the network as an integral Grid componentULTRALIGHT: A MANAGED NETWORK INFRASTRUCTURE FOR HEP Shawn McKee, University of Michigan, Ann Arbor

Low, Steven H.

154

New 1 Terabyte Memory Node  

NLE Websites -- All DOE Office Websites (Extended Search)

New 1 Terabyte Memory Node New 1 Terabyte Memory Node June 17, 2011 by Francesca Verdier (0 Comments) A new "extra large" memory node that has four 8-core Nehalem EX processors (32...

155

{Control of Residential Load Management Networks Using Real Time Pricing  

E-Print Network (OSTI)

Modular and Extensible Systemic Simulation of Demand Response Networks 2.1 Introduction Thermostatically controlled devices, such as heating ventilation and air conditioning (HVAC), refrigerators,

Burke, William Jerome

2010-01-01T23:59:59.000Z

156

Methods and apparatus using commutative error detection values for fault isolation in multiple node computers  

DOE Patents (OSTI)

Methods and apparatus perform fault isolation in multiple node computing systems using commutative error detection values for--example, checksums--to identify and to isolate faulty nodes. When information associated with a reproducible portion of a computer program is injected into a network by a node, a commutative error detection value is calculated. At intervals, node fault detection apparatus associated with the multiple node computer system retrieve commutative error detection values associated with the node and stores them in memory. When the computer program is executed again by the multiple node computer system, new commutative error detection values are created and stored in memory. The node fault detection apparatus identifies faulty nodes by comparing commutative error detection values associated with reproducible portions of the application program generated by a particular node from different runs of the application program. Differences in values indicate a possible faulty node.

Almasi, Gheorghe (Ardsley, NY) [Ardsley, NY; Blumrich, Matthias Augustin (Ridgefield, CT) [Ridgefield, CT; Chen, Dong (Croton-On-Hudson, NY) [Croton-On-Hudson, NY; Coteus, Paul (Yorktown, NY) [Yorktown, NY; Gara, Alan (Mount Kisco, NY) [Mount Kisco, NY; Giampapa, Mark E. (Irvington, NY) [Irvington, NY; Heidelberger, Philip (Cortlandt Manor, NY) [Cortlandt Manor, NY; Hoenicke, Dirk I. (Ossining, NY) [Ossining, NY; Singh, Sarabjeet (Mississauga, CA) [Mississauga, CA; Steinmacher-Burow, Burkhard D. (Wernau, DE) [Wernau, DE; Takken, Todd (Brewster, NY) [Brewster, NY; Vranas, Pavlos (Bedford Hills, NY) [Bedford Hills, NY

2008-06-03T23:59:59.000Z

157

Design science research toward designing/prototyping a repeatable model for testing location management (LM) algorithms for wireless networking.  

E-Print Network (OSTI)

?? The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet… (more)

Peacock, Christopher

2012-01-01T23:59:59.000Z

158

Smart Radio Spectrum Management for Cognitive Radio  

E-Print Network (OSTI)

Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. In this work, a fuzzy logic based system for spectrum management is proposed where the radio can share unused spectrum depending on some parameters like distance, signal strength, node velocity and availability of unused spectrum. The system is simulated and is found to give satisfactory results.

Bhattacharya, Partha Pratim; Gera, Rishita; Agarwal, Anjali

2011-01-01T23:59:59.000Z

159

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy Savers (EERE)

Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

160

A congestion sensitive approach to modelling road networks for air quality management  

Science Journals Connector (OSTI)

This research establishes an approach to modelling a congested road network for air quality management, which enables the assessment of traffic management solutions that may create only subtle changes in the traffic flow regimes. Road network emissions have been calculated using standard factors taking into account details of vehicle fleet composition, average speeds and road type. Additionally, the use of microsimulation traffic modelling in conjunction with an instantaneous emissions model (IEM) has been adopted to allow comparison between methodologies and enable congestion sensitive analysis of the impact of air quality management measures on the network. Findings from microscale modelling have revealed that the use of an IEM to calculate emissions as an input for air quality dispersion modelling significantly improved the performance of the dispersion modelling when measured against monitored data. Moreover, this methodology has been successfully applied to assess the performance of a traffic scheme in Durham, UK.

James O'Brien; Anil Namdeo; Margaret Bell; Paul Goodman

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Mobility management support and performance analysis for wireless MPLS networks  

Science Journals Connector (OSTI)

Multi-Protocol Label Switching (MPLS) is deployed in the Internet backbone to support service differentiation and traffic engineering. In recent years, there has been interest in extending the MPLS capability to wireless access networks for mobility ...

Rami Langar; Samir Tohme; Nizar Bouabdallah

2006-07-01T23:59:59.000Z

162

A Case Study: A Model-Based Approach to Retrofit a Network Fault Management System with Self-Healing Functionality  

Science Journals Connector (OSTI)

Adding self-healing capabilities to network management systems holds great promise for delivering important goals, such as QoS, while simultaneously lowering capital expenditure, operation cost, and maintenance cost. In this paper, we present a model-based ... Keywords: Self-healing, aspect modeling, network management

Yan Liu; Jing Zhang; Michael Jiang; David Raymer; John Strassner

2008-03-01T23:59:59.000Z

163

Integrated Network Analysis Identifies Fight-Club Nodes as a Class of Hubs Encompassing Key Putative Switch Genes That Induce Major Transcriptome Reprogramming during Grapevine Development  

Science Journals Connector (OSTI)

...Control, and Management Engineering, University of Rome, 00185 Rome, Italy d Institute for Systems Analysis and Computer Science Antonio Ruberti, National Research Council, 00185 Rome, Italy e SysBio Centre for Systems Biology, 00185 Rome, Italy www...

Maria Concetta Palumbo; Sara Zenoni; Marianna Fasoli; MĂ©lanie Massonnet; Lorenzo Farina; Filippo Castiglione; Mario Pezzotti; Paola Paci

2014-12-09T23:59:59.000Z

164

Wireless sensor node localization  

Science Journals Connector (OSTI)

...need to be asymmetrical, with small, passive sensor nodes listening for signals from one or more larger transmitters. The fact...is dropping. For example, the $600 MEMS-based analogue device ADIS16360 unit has a tri-axis accelerometer and a tri-axis...

2012-01-01T23:59:59.000Z

165

Traffic Management and Network Control Using Collaborative Online Simulation y  

E-Print Network (OSTI)

parameters. The protocol parameters are then tuned by the on­line simulation system. In this paper, we. The goal then is to have the on­line simulation system use sophisticated parameter search methods to search, the simulation system can support continuous tuning of the network based upon the on­line modeling, parameter

Kalyanaraman, Shivkumar

166

Policy-based Management of Body-Sensor Networks  

E-Print Network (OSTI)

Keoh,S. Twidle,K. Pryce,N. Schaeffer-Filho,A. Lupu,E. Dulay,N. Sloman,M. Heeps,S. Strowes,S. Sventek,J.S. Katsiri,E. Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks, Aachen, Germany, March 2007

Keoh, S.; Twidle, K.; Pryce, N.; Schaeffer-Filho, A.; Lupu, E.; Dulay, N.; Sloman, M.; Heeps, S.

167

Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks  

E-Print Network (OSTI)

on enabling sensor and actuator connectivity without the use of wires. Energy consumption among the wireless of the WSN operational mode in order to optimize the energy utilization based on the time varying characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency

Raja, Anita

168

Fixed-flowrate total water network synthesis under uncertainty with risk management  

Science Journals Connector (OSTI)

Abstract This work addresses the problem of integrated water network synthesis under uncertainty with risk management. We consider a superstructure consisting of water sources, regenerators, and sinks that leads to a mixed-integer quadratically-constrained quadratic program (MIQCQP) for a fixed-flowrate total water network synthesis problem. Uncertainty in the problem is accounted for via a recourse-based two-stage stochastic programming formulation with discrete scenarios that gives rise to a multiscenario MIQCQP comprising network design in the first stage and its operation in the second stage acting as recourse. In addition, we extend the model to address risk management using the Conditional Value-at-Risk (CVaR) metric. Because a large number of scenarios is often required to capture the underlying uncertainty of the problem, causing the model to suffer from the curse of dimensionality, we propose a stepwise solution strategy to reduce the computational load. We illustrate this methodology on a case study inspired from the water network of a petroleum refinery in Malaysia. The presence of nonconvex bilinear terms necessitates the use of global optimization techniques for which we employ a new global MIQCQP solver, GAMS/GloMIQO and verify the solutions with BARON. Our computational results show that total water network synthesis under uncertainty with risk management problems can be solved to global optimality in reasonable time.

Cheng Seong Khor; Benoit Chachuat; Nilay Shah

2014-01-01T23:59:59.000Z

169

Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application  

E-Print Network (OSTI)

for MANETs in two important areas: trust bias minimization and applica- tion performance maximization1 Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile

Chen, Ing-Ray

170

Reactive power management of distribution networks with wind generation for improving voltage stability  

E-Print Network (OSTI)

Reactive power management of distribution networks with wind generation for improving voltage February 2013 Available online Keywords: Composite load Distributed generation D-STATCOM Q with distributed wind generation. Firstly, the impact of high wind penetration on the static voltage stability

Pota, Himanshu Roy

171

Demo Abstract: ThermoSense: Thermal Array Sensor Networks in Building Management  

E-Print Network (OSTI)

the heating, cooling, ventilation and lighting of a building to optimize energy usage. Categories and Subject-Based Ap- plication Systems]: Real-time and embedded systems 1. INTRODUCTION Energy usage has increasedDemo Abstract: ThermoSense: Thermal Array Sensor Networks in Building Management Varick L. Erickson

Cerpa, Alberto E.

172

Final report for the mobile node authentication LDRD project.  

SciTech Connect

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

173

Home Energy Management as a Service over Networking Platforms  

E-Print Network (OSTI)

.S. primary energy is consumed in the buildings. Therefore, to manage the energy consumption and its usages AND RELATED WORK In the year 2013, about 40.7% of the U.S. primary energy consumption is due to buildings for the residential sector (22% of the U.S. primary energy). Moreover, towards this goal, U.S. Department of Energy

Al Faruque, Mohammad Abdullah

174

Developing decision support tools for rangeland management by combining state and transition models and Bayesian belief networks  

E-Print Network (OSTI)

Developing decision support tools for rangeland management by combining state and transition models 2008 Keywords: Rangeland management State and transition model Queensland Bayesian belief network Adaptive management Decision support a b s t r a c t State and transition models provide a simple

175

Mobility and cooperation to thwart node capture attacks in MANETs  

Science Journals Connector (OSTI)

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture ...

Mauro Conti; Roberto Di Pietro; Luigi V. Mancini; Alessandro Mei

2009-02-01T23:59:59.000Z

176

Nodes Placement for reducing Energy Consumption in Multimedia Transmissions  

E-Print Network (OSTI)

quality of multimedia traffic. Index Terms--Wireless Sensor Networks, Multimedia, Energy Saving, Quality on the energy saving by extending the lifetime of the network up to more than 15% while preserving video qualityNodes Placement for reducing Energy Consumption in Multimedia Transmissions Pasquale Pace Valeria

Paris-Sud XI, Université de

177

How to Utilize the National Geothermal Data System (NGDS) and Create Your Own Federated Data Network with “Node-In-A-Box”  

Energy.gov (U.S. Department of Energy (DOE))

As part of the Obama Administration’s Open Data Policy to make federally managed information usable, discoverable, and easily accessible to the public the NGDS is a project funded by the Department of Energy's (DOE) Geothermal Technologies Office (GTO) will serve as a platform for sharing consistent, reliable geothermal-relevant technical data with users of all types, supplying tools relevant for their work.

178

Demand side management using artificial neural networks in a smart grid environment  

Science Journals Connector (OSTI)

Abstract Smart grid deployment is a global trend, creating endless possibilities for the use of data generated by dynamic networks. The challenge is the transformation of this large volume of data into useful information for the electrical system. An example of this is the application of demand side management (DSM) techniques for the optimisation of power system management in real time. This article discusses the use of DSM in this new environment of electrical system and it presents a simulation that uses data acquired from digital meters, it creates patterns of load curves, uses these patterns load data to train and validate a ANN and uses this ANN to classify new data using these defined patters. The results obtained in this study show that the intelligent network environment facilitates the implementation of DSM and the use of ANN presented a satisfactory performance for the classification of load curves.

M.N.Q. Macedo; J.J.M. Galo; L.A.L. de Almeida; A.C. de C. Lima

2015-01-01T23:59:59.000Z

179

Executing scatter operation to parallel computer nodes by repeatedly broadcasting content of send buffer partition corresponding to each node upon bitwise OR operation  

DOE Patents (OSTI)

Executing a scatter operation on a parallel computer includes: configuring a send buffer on a logical root, the send buffer having positions, each position corresponding to a ranked node in an operational group of compute nodes and for storing contents scattered to that ranked node; and repeatedly for each position in the send buffer: broadcasting, by the logical root to each of the other compute nodes on a global combining network, the contents of the current position of the send buffer using a bitwise OR operation, determining, by each compute node, whether the current position in the send buffer corresponds with the rank of that compute node, if the current position corresponds with the rank, receiving the contents and storing the contents in a reception buffer of that compute node, and if the current position does not correspond with the rank, discarding the contents.

Archer, Charles J. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN)

2009-11-06T23:59:59.000Z

180

Network  

NLE Websites -- All DOE Office Websites (Extended Search)

Network Network Facts & Stats Engineering Services The Network Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata...

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

NUG Single Node Optimization Presentation.  

NLE Websites -- All DOE Office Websites (Extended Search)

Node Optimization on Hopper Michael Stewart, NERSC Introduction Why are there so many compilers available on Hopper? Strengths and weaknesses of each compiler. Advice...

182

Emergence of collective action and environmental networking in relation to radioactive waste management  

SciTech Connect

This paper explores the relationship between the national environmental movement and nuclear technology in relation to a local emergent group. The historical development of nuclear technology in this conutry has followed a path leading to continued fear and mistrust of waste management by a portion of the population. At the forefront of opposition to nuclear technology are people and groups endorsing environmental values. Because of the antinuclear attitudes of environmentalists and the value orientation of appropriate technologists in the national environmental movement, it seems appropriate for local groups to call on these national groups for assistance regarding nuclear-related issues. A case study is used to illustrate how a local action group, once integrated into a national environmental network, can become an effective, legitimate participant in social change. The formation, emergence, mobilization, and networking of a local group opposed to a specific federal radioactive waste management plan is described based on organizational literature. However, inherent contradictions in defining the local versus national benefits plus inherent problems within the environmental movement could be acting to limit the effectiveness of such networks. 49 refs.

Williams, R.G.; Payne, B.A.

1985-01-01T23:59:59.000Z

183

Semantic associative network for text analysis (SANTA)  

E-Print Network (OSTI)

Based on theories of associations, the Semantic Associative Network for Text Analysis (SANTA) has been developed. Nodes in the network represent words and links between nodes represent the association strengths between them. The links are adjusted...

Airhart, Robert William

2012-06-07T23:59:59.000Z

184

Managing congestion and emissions in road networks with tolls and rebates  

Science Journals Connector (OSTI)

Traffic congestion and emissions are two main types of social cost, and their minimization sometimes conflicts with each other. In this paper we seek nonnegative link toll schemes and/or link toll cum rebate schemes for Pareto-efficient control and management of both vehicular congestion and emissions on road networks using a bi-objective optimization approach. We provide necessary and sufficient conditions for the existence of such schemes to decentralize a given target link flow pattern. Then, we investigate the possibility of introducing such schemes to obtain specific Pareto system optimum target link flow patterns with two types of link emission function: increasing functions and non-monotonic functions, respectively.

Linxi Chen; Hai Yang

2012-01-01T23:59:59.000Z

185

Centdian computation for sensor networks  

Science Journals Connector (OSTI)

This paper focuses on the centdian problem in a cactus network where a cactus network is a connected undirected graph, and any two simple cycles in the graph have at most one node in common The cactus network has important applications for wireless ... Keywords: cactus graph, centdian node, distributed algorithm, sensor network

Boaz Ben-Moshe; Amit Dvir; Michael Segal; Arie Tamir

2010-06-01T23:59:59.000Z

186

E-Print Network 3.0 - af cooperative networks Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Channels in Wireless Adhoc Networks Supervisor: Dr. Salman Durrani Summary: in wireless ad-hoc networks. One of the basic topologies for the node cooperation is the three-node...

187

LBN: Load-Balancing Network for Data Gathering Wireless Sensor Networks  

Science Journals Connector (OSTI)

Hotspots of energy consumption and network congestions can be caused by load imbalance among sensor nodes in wireless sensor networks. This may lead to loss of data packets and premature death of sensor nodes ......

Wenlu Yang; Chongqing Zhang; Minglu Li

2006-01-01T23:59:59.000Z

188

PER-NODE POWER MINIMAL MULTICAST TREES WHICH MAXIMIZE THE TIME-TO-FIRST-FAILURE IN ENERGY CONSTRAINED STATIC WIRELESS  

E-Print Network (OSTI)

PER-NODE POWER MINIMAL MULTICAST TREES WHICH MAXIMIZE THE TIME-TO-FIRST-FAILURE IN ENERGY as the time till the first node in the network runs out of battery energy, and minimizing the total power in energy constrained static wireless networks. It is shown in [6] that simply optimizing the TTFF criterion

Arabshahi, Payman

189

Integrating real-time hybrid task scheduling into a sensor node platform  

Science Journals Connector (OSTI)

In general, two different types of low-end sensor node platforms are currently considered: event driven and multi-tasking operating systems. It is commonly assumed that event driven operating systems are more suited to WSN (Wireless Sensor Networks) ... Keywords: hybrid task sets, scheduling, sensor node platform

Taehoon Kim; Bora Kang; E. K. Park; Sungwoo Tak

2010-03-01T23:59:59.000Z

190

Quasi-parallel network applications in real-time distribution management system  

Science Journals Connector (OSTI)

In modern distribution management systems (DMSs), the real-time calculation of the network's state plays an important role for the operation of the network. High sophisticated algorithms for the estimation and calculation of the system's state like distribution system state estimation (DSSE), distribution system power and short circuit calculations (DSPF and SCC), voltage var control (VVC) and others must operate in a real-time environment, supplying subsequently running functions with reliable input data. Closed-loop requirements also increase the requirements concerning performance, availability and robustness. In this paper, an implementation of the sequence control of different DMS-network applications is presented. This proposed real-time scheduler takes advantage of CPU-cores inside of a modern computer system: by passing subtasks to different CPU-cores, the overall performance is significantly increased. The scheduling process is analysed in detail taking the nature of a distribution system into consideration. The presentation is finalised with a report about the gain of performance for the state estimation process.

Izudin Dzafic; Hans-Theo Neisius

2012-01-01T23:59:59.000Z

191

E-Print Network 3.0 - area management plan Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary: and Wholesaling Management 27647 Airlines and Transportation Management 27649 Ecotourism Planning and Management... Ecotourism Planning and Management (Speak to Stephen...

192

2D and 3D Acoustic Source Localization Using the AML Algorithm and ENSBox Nodes  

E-Print Network (OSTI)

Networked Sensing 2D and 3D Acoustic Source Localizationhairs, median red square) 3D bearing estimates: (azimuth,1.37,1.52) (2.38,1.82) Node 153 3D AML performance UCLA –

2007-01-01T23:59:59.000Z

193

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks  

E-Print Network (OSTI)

are hybrid networks which include infrastructure nodes in multi-hop wireless networks, such as sinks nodes. hybrid networks which include infrastructure nodes in multi- hop wireless networks, such as sinksOn the Connectivity Analysis over Large-Scale Hybrid Wireless Networks Chi Yi and Wenye Wang

Wang, Wenye

194

An On-Demand Energy-Efficient Routing Algorithm for Wireless Ad Hoc Networks  

Science Journals Connector (OSTI)

Ad hoc networks are non-infrastructure networks which consist of mobile nodes. Since the mobile nodes have limited battery power, it is very important to use energy efficiently in ad hoc networks. In order ... ro...

Hong-Ryeol Gil; Joon Yoo; Jong-Won Lee

2003-01-01T23:59:59.000Z

195

Hydroelectric power plant management relying on neural networks and expert system integration  

Science Journals Connector (OSTI)

The use of Neural Networks (NN) is a novel approach that can help in taking decisions when integrated in a more general system, in particular with expert systems. In this paper, an architecture for the management of hydroelectric power plants is introduced. This relies on monitoring a large number of signals, representing the technical parameters of the real plant. The general architecture is composed of an Expert System and two NN modules: Acoustic Prediction (NNAP) and Predictive Maintenance (NNPM). The NNAP is based on Kohonen Learning Vector Quantization (LVQ) Networks in order to distinguish the sounds emitted by electricity-generating machine groups. The NNPM uses an ART-MAP to identify different situations from the plant state variables, in order to prevent future malfunctions. In addition, a special process to generate a complete training set has been designed for the ART-MAP module. This process has been developed to deal with the absence of data about abnormal plant situations, and is based on neural nets trained with the backpropagation algorithm.

J.M. Molina; P. Isasi; A. Berlanga; A. Sanchis

2000-01-01T23:59:59.000Z

196

Multiple crossbar network: A switched high-speed local network  

SciTech Connect

The Multiple Crossbar Network (MCN) is a prototype High-Speed Local Network at the Los Alamos National Laboratory. It will interconnect supercomputers, network servers and workstations from various commercial vendors. The MCN can also serve as a backbone for message traffic between local area networks. The MCN is a switched local network of switching nodes called Cross-Point Stars (CPs). Hosts and CPs are connected by 800-Mbit/s (100-Mbyte/s) point-to-point ANSI High-Speed Channels. CPs include RISC-based network protocol processors called Crossbar Interfaces and a switching core called the Crossbar Switch. Protocols include physical, data link, intranet, and network access functionality. Various internet and transport protocols are intended to run above the MCN protocol suite. A network management and simple naming service is also included within the Los Alamos Network Architecture. Immediate applications include visualization. The MCN is intended to also serve as a framework for multicomputer applications. 36 refs., 10 figs.

Hoebelheinrich, R.; Thomsen, R.

1989-01-01T23:59:59.000Z

197

E-Print Network 3.0 - adaptive management plan Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: adaptive management plan Page: << < 1 2 3 4 5 > >> 1 Regional Water Management: Adapting to Uncertain Water Summary: & Implement Management Options Monitor &...

198

Multi-Power-Level Energy Saving Management for Passive Optical Networks  

Science Journals Connector (OSTI)

Environmental concerns have motivated network designers to further reduce energy consumption of access networks. This paper focuses on reducing the energy consumption of the Ethernet...

Hosseinabadi, Mina Taheri; Ansari, Nirwan

2014-01-01T23:59:59.000Z

199

E-Print Network 3.0 - ageing management programs Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Management 3* AGEC 445 Agribusiness Management 32.0 AGED 140US... Context 3* AGEC 341 Farm & Ranch Management 3* AGEC 445 Agribusiness Management 3 AGED 140 Leadership... 1 | P a...

200

E-Print Network 3.0 - aging management programs Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Management 3* AGEC 445 Agribusiness Management 32.0 AGED 140US... Context 3* AGEC 341 Farm & Ranch Management 3* AGEC 445 Agribusiness Management 3 AGED 140 Leadership... 1 | P a...

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

E-Print Network 3.0 - alternative management practices Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . Management 3590 - Political Values and Practices in Aboriginal Governments... . . . . . . . . . . . . . . . . ....

202

E-Print Network 3.0 - analytical services management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Administration... Travel Management Services Technology Resources for Employee & Campus Services Utilities & Energy... - Facilities Management Campus Safety & ... Source: Patzek,...

203

Object Management Systems  

E-Print Network (OSTI)

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

204

Controlling data transfers from an origin compute node to a target compute node  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for controlling data transfers from an origin compute node to a target compute node that include: receiving, by an application messaging module on the target compute node, an indication of a data transfer from an origin compute node to the target compute node; and administering, by the application messaging module on the target compute node, the data transfer using one or more messaging primitives of a system messaging module in dependence upon the indication.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2011-06-21T23:59:59.000Z

205

Considerations on Policy-based Network Management P. Flegkas, P. Trimintzios, I.Andrikopoulos, G. Pavlou  

E-Print Network (OSTI)

of abnormal changes but does not attempt to reconfigure the network using automated logic. Reconfiguration

Haddadi, Hamed

206

Petri net based evaluation of energy consumption in wireless sensor nodes  

Science Journals Connector (OSTI)

Wireless Sensor Networks have proven their capability to deal with problems where wide and hardly accessible areas need to be monitored. Among the other systems there are also sensor networks in which nodes can voluntarily modify their positions to better ... Keywords: Environmental Monitoring, Fluid Stochastic Petri Nets, Power Consumption Modelling, Power-Aware Systems

Maurizio D'Arienzo; Mauro Iacono; Stefano Marrone; Roberto Nardone

2013-10-01T23:59:59.000Z

207

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SiNode Systems SiNode Systems National Clean Energy Business Plan Competition 2013 31 likes SiNode Systems Northwestern University SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process. SiNode seeks to change the landscape for lithium-ion batteries so they can meet the demands of a wide range of industries, from consumer electronics to electric vehicles. SiNode technology uses a composite of silicon nano-particles and porous graphene, developed by Dr. Harold H. Kung at Northwestern University. SiNode's anodes offer dramatic energy capacity increases (3200 mAh/g vs.

208

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SiNode Systems SiNode Systems National Clean Energy Business Plan Competition 2013 31 likes SiNode Systems Northwestern University SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process. SiNode seeks to change the landscape for lithium-ion batteries so they can meet the demands of a wide range of industries, from consumer electronics to electric vehicles. SiNode technology uses a composite of silicon nano-particles and porous graphene, developed by Dr. Harold H. Kung at Northwestern University. SiNode's anodes offer dramatic energy capacity increases (3200 mAh/g vs.

209

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SiNode Systems SiNode Systems National Clean Energy Business Plan Competition 2013 31 likes SiNode Systems Northwestern University SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process. SiNode seeks to change the landscape for lithium-ion batteries so they can meet the demands of a wide range of industries, from consumer electronics to electric vehicles. SiNode technology uses a composite of silicon nano-particles and porous graphene, developed by Dr. Harold H. Kung at Northwestern University. SiNode's anodes offer dramatic energy capacity increases (3200 mAh/g vs.

210

A modified algorithm for computing the upper-bound reliabilty of computer networks  

Science Journals Connector (OSTI)

This paper presents a modified algorithm to node elimination process for computing the upper-bound reliability of two-terminal networks. The algorithm has two technique; nodes removal and decomposition technique. The first technique is a modified algorithm ... Keywords: Computer networks, Network reliability, Networks decomposition, Nodes removal, The upper bound reliability

Y. B. Mahdy, A. Younes, M. A. Soliman, M. H. Abdellha

2005-01-01T23:59:59.000Z

211

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005 1325 Cooperation in Wireless Ad Hoc Networks: A  

E-Print Network (OSTI)

a market-based approach to stimulate cooperation in ad hoc networks where nodes charge a price for relaying to illustrate our results. Index Terms--Ad hoc network, pricing, rate control, wireless networks. I. INTRODUCTION AWIRELESS ad hoc network is a collection of nodes which form a network independently of any fixed

212

Managing Errors to Reduce Accidents in High Consequence Networked Information Systems  

SciTech Connect

Computers have always helped to amplify and propagate errors made by people. The emergence of Networked Information Systems (NISs), which allow people and systems to quickly interact worldwide, has made understanding and minimizing human error more critical. This paper applies concepts from system safety to analyze how hazards (from hackers to power disruptions) penetrate NIS defenses (e.g., firewalls and operating systems) to cause accidents. Such events usually result from both active, easily identified failures and more subtle latent conditions that have resided in the system for long periods. Both active failures and latent conditions result from human errors. We classify these into several types (slips, lapses, mistakes, etc.) and provide NIS examples of how they occur. Next we examine error minimization throughout the NIS lifecycle, from design through operation to reengineering. At each stage, steps can be taken to minimize the occurrence and effects of human errors. These include defensive design philosophies, architectural patterns to guide developers, and collaborative design that incorporates operational experiences and surprises into design efforts. We conclude by looking at three aspects of NISs that will cause continuing challenges in error and accident management: immaturity of the industry, limited risk perception, and resource tradeoffs.

Ganter, J.H.

1999-02-01T23:59:59.000Z

213

FRAUD DETECTION AND MANAGEMENT IN MOBILE TELECOMMUNICATIONS NETWORKS P Burge, J ShaweTaylor, C Cooke, Y Moreau, B Preneel, C Stoermann.  

E-Print Network (OSTI)

FRAUD DETECTION AND MANAGEMENT IN MOBILE TELECOMMUNICATIONS NETWORKS P Burge, J Shawe­Taylor, C security measures taken in GSM and in the future UMTS (Universal Mobile Telecommunications System) make and concepts for the detection of fraud in mobile telecommunication networks. This paper intends to report

214

Kenneth J. Turner, Liam S. Docherty, Feng Wang and Gavin A. Campbell. Managing Home Care Networks, in Robert Bestak, Laurent George,  

E-Print Network (OSTI)

automates sup- port of how a home network should deliver care. The views of stakeholders in home care of health issues. `Smart Homes' focus more on home automation and monitoring. `Home Care System' is usedKenneth J. Turner, Liam S. Docherty, Feng Wang and Gavin A. Campbell. Managing Home Care Networks

Turner, Ken

215

E-Print Network 3.0 - adequate irrigation management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: adequate irrigation management Page: << < 1 2 3 4 5 > >> 1 Use Available Water Efficiently With Furrow By Sandi Alswager-Karstens, Summary: good management decisions...

216

E-Print Network 3.0 - area final management Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Sciences and Ecology 28 Scalable, Fault-tolerant Management in a Service Oriented Architecture Summary: interoperable management protocols we can effectively integrate...

217

E-Print Network 3.0 - attempt case management Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Sciences and Ecology 38 Scalable, Fault-tolerant Management in a Service Oriented Architecture Summary: Management on the other hand attempts to identify a core set of...

218

E-Print Network 3.0 - asthma management evaluation Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

children: gaps between current management and best prac- tice. J Paediatr Child Health... system using handheld computers for office management of ... Source: Groningen,...

219

E-Print Network 3.0 - ash management regulations Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Air and Waste Management Division U.S. Environmental... unacceptable levels of dioxins and furans. Thus they argue for cradle to grave ash management under Subtitle C......

220

Test-bed for Sensor Network Management Protocols J. Abdo, N.D. Georganas, H. Mouftah  

E-Print Network (OSTI)

equipped with a MICA2 node with ID0. 1. INTRODUCTION Current advancements in sensor technologies, coupled of technological advancements into our daily life. The line separating the digital world and the real word of Information Technology and Engineering University of Ottawa, Ottawa, ON, Canada {jabdo, mouftah

Ottawa, University of

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

ActiveSTB: an efficient wireless resource manager in home networks  

E-Print Network (OSTI)

is a major concern for the transport of stored video. In our study, a set-top box is the access point between the internet and a home network. Our main goal is to design a set-top box capable of performing network flow control in a home network...

Hall, Varrian Durand

2009-05-15T23:59:59.000Z

222

Energy Consumption in Access Networks  

Science Journals Connector (OSTI)

We present a comparison of energy consumption of access networks. We consider passive optical networks, fiber to the node, point-to-point optical systems and WiMAX. Optical access...

Baliga, Jayant; Ayre, Robert; Sorin, Wayne V; Hinton, Kerry; Tucker, Rodney S

223

Green Networks: Energy Efficient Design for Optical Networks Balagangadhar G. Bathula, Jaafar M. H. Elmirghani  

E-Print Network (OSTI)

Green Networks: Energy Efficient Design for Optical Networks Balagangadhar G. Bathula, Jaafar M. H in backbone networks such as optical networks increase. Energy consumption of optical networks is an important the energy consumption of optical networks. We propose sleep cycle protocols for use in the network nodes

Bathula, Balagangadhar G

224

Building Dashboard Network | Open Energy Information  

Open Energy Info (EERE)

Management, Building Systems, Energy Management, Enterprise Management, Reporting, Sustainability, Tools, Water Building Dashboard Network Screenshot Logo: Building Dashboard...

225

Two algorithms for leader election and network size estimation in mobile ad hoc networks  

E-Print Network (OSTI)

We develop two algorithms for important problems in mobile ad hoc networks (MANETs). A MANET is a collection of mobile processors (?nodes?) which communicate via message passing over wireless links. Each node can communicate directly with other...

Neumann, Nicholas Gerard

2005-02-17T23:59:59.000Z

226

Ambient-RF-Energy-Harvesting Sensor Node with Capacitor-Leakage-Aware Duty Cycle Control  

E-Print Network (OSTI)

systems, RF powered systems present a new challenge for the energy management. A WSN node repeatedly in the capacitor. Therefore, we implemented an adaptive duty cycle control scheme that is optimized for RF energy but is not affected by weather and so it is more stable than solar and wind power. Almost all energy management

Tentzeris, Manos

227

Network  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Feedback: info@es.net About ESnet A Nationwide Platform for Science Discovery The Energy Sciences Network (ESnet) is a high-performance, unclassified national network built to...

228

E-Print Network 3.0 - assessing quality management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

management... pillar, ... Source: Vardeman, Stephen B. - Departments of Statistics & Industrial Engineering, Iowa State University Collection: Mathematics 33 Quality...

229

E-Print Network 3.0 - age care managers Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

quality improvement in nursing homes; organizational design. Kathryn Dansky... health care; quality management, telehealth. ... Source: Colby, Ralph H. - Department of...

230

E-Print Network 3.0 - archive management workshop Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Specifications, plus Data Validation Guidelines Quality Management Policy, Roles... Pollution Sponsors Strategic Planning Workshops Ozone and Particulate ... Source: Oak...

231

Improved Connectivity using Hybrid Uni/Omni-Directional Antennas in Sensor Networks  

E-Print Network (OSTI)

the capability of networks to be able to report sensed information. The ability of member nodes to communicate with each other and collectively report data largely depends on connectivity. Density of node deployment, the transmission radius of the antenna... and the communication paradigm employed has a significant effect on connectivity. A network deployment is said to be connected when every node within the network is capable of communicating, either via multi-hops or direct links to every other node in the network...

Kwon, Ji Heon

2008-05-27T23:59:59.000Z

232

Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks  

Science Journals Connector (OSTI)

......of Computer Science and Information...for location management in a personal...applicability of our approach with hexagonal...for Location Management in Mobile...of Computer Science, Virginia...of Computer Science and Information...for location management in a personal...applicability of our approach with hexagonal......

I.-R. Chen; T.-M. Chen; C. Lee

1998-01-01T23:59:59.000Z

233

Imprecision-Tolerant Location Management for Object-Tracking Wireless Sensor Network  

Science Journals Connector (OSTI)

......Department of Computer Science, National Chiao...estimation and location management. The main theme...imprecision-tolerant location management scheme that includes...queries, (2) the approach to taking the statistics...processing|location management|object tracking...1Department of Information Science and Applications......

Chih-Yu Lin; Yu-Chee Tseng; Yung-Chih Liu

2010-03-01T23:59:59.000Z

234

Efficient implementation of multidimensional fast fourier transform on a distributed-memory parallel multi-node computer  

DOE Patents (OSTI)

The present in invention is directed to a method, system and program storage device for efficiently implementing a multidimensional Fast Fourier Transform (FFT) of a multidimensional array comprising a plurality of elements initially distributed in a multi-node computer system comprising a plurality of nodes in communication over a network, comprising: distributing the plurality of elements of the array in a first dimension across the plurality of nodes of the computer system over the network to facilitate a first one-dimensional FFT; performing the first one-dimensional FFT on the elements of the array distributed at each node in the first dimension; re-distributing the one-dimensional FFT-transformed elements at each node in a second dimension via "all-to-all" distribution in random order across other nodes of the computer system over the network; and performing a second one-dimensional FFT on elements of the array re-distributed at each node in the second dimension, wherein the random order facilitates efficient utilization of the network thereby efficiently implementing the multidimensional FFT. The "all-to-all" re-distribution of array elements is further efficiently implemented in applications other than the multidimensional FFT on the distributed-memory parallel supercomputer.

Bhanot, Gyan V. (Princeton, NJ); Chen, Dong (Croton-On-Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2012-01-10T23:59:59.000Z

235

Management of Future Data Networks: An Approach Based on Bacterial Colony Behavior.  

E-Print Network (OSTI)

of computer hardware into all walks of life [10]. This progress will accelerate as the decreasing cost of the constantly evolving collection of hardware devices inhabiting these networks will also require much more and networks of embedded hardware, must require significantly less manual intervention than at present

Marshall, Ian W.

236

Managing energy in a network of reconfigurable optical add/drop multiplexers  

Science Journals Connector (OSTI)

We show how to improve the energy consumption in an all optical ring network based on reconfigurable optical add and drop multiplexers (ROADM in the following). The analysis is based on numerical analysis of discrete time Markov chains and some heuristics to design an efficient network configuration. We also present a software tool built to perform this performance analysis.

Jean-Michel Fourneau; Nora Izri; Dominique Verchère

2014-01-01T23:59:59.000Z

237

Fuzzy decision support software for crisis management in gas transmission networks  

Science Journals Connector (OSTI)

In this work, a new software for fuzzy decision support system, with a new decision making structure, to control the crisis conditions in the gas transmission network is developed. This system after receiving both functional variables of the gas transmission ... Keywords: Decision support system, Fuzzy decision making, Gas transmission network, Multicriteria decision making, Software development

Hoda Nokhbeh Foghahaayee, Mohammad Bagher Menhaj, Hasan Montazer Torbati

2014-05-01T23:59:59.000Z

238

Hub Synchronization in Scale-Free Networks  

E-Print Network (OSTI)

Heterogeneity in the degree distribution is known to suppress global synchronization in complex networks of symmetrically coupled oscillators. Scale-free networks display a great deal of heterogeneity, containing a few nodes, termed hubs, that are highly connected, while most nodes receive only a few connections. Here, we show that a group of synchronized nodes may appear in scale-free networks: hubs undergo a transition to synchronization while the other nodes remain unsynchronized. This general phenomenon can occur even in the absence of global synchronization. Our results suggest that scale-free networks may have evolved to complement various levels of synchronization.

Tiago Pereira

2010-10-07T23:59:59.000Z

239

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

240

E-Print Network 3.0 - acceptance organizational impact Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

Network Summary: network simply has too few nodes for organizational structuring decisions to have a significant impact... of organizational structuring. We describe a...

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Resetting Bounding Nodes in Acquiring Spanish  

E-Print Network (OSTI)

This paper addresses the issue of whether L2 learners can reset parameters, by testing English speakers learning Spanish on their ability to reset the bounding node parameter. The bounding nodes are : IP and NP in English, CP and NP in Spanish...

Cebreiros, Ramiro

1996-01-01T23:59:59.000Z

242

Power-aware node-disjoint multipath source routing with low overhead in MANET  

Science Journals Connector (OSTI)

With the advance of wireless communication technologies, small-size and high-performance computing and communication devices like laptops and personal digital assistants are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. This interest had led to two types of the wireless networks such as infrastructure wireless network and infrastructure less wireless network, also called mobile ad hoc network (MANET). The research challenges in MANET are related to the routing, security, reliability, scalability, quality of services, internetworking, power consumption and multimedia applications. All the mobile nodes of MANET operate on the battery power; hence power consumption becomes an important issue in MANET. It proposes a power-aware node-disjoint multipath source routing (PNDMSR) for real-time traffic, which balances the node energy utilisation to increase the network lifetime. It takes the network congestion into account to reduce the routing delay across the network, and increases the reliability of the data packets reaching the destination.

M. Bheemalingaiah; M.M. Naidu; D. Sreenivasa Rao; G. Varaprasad

2009-01-01T23:59:59.000Z

243

Community Detection from Location-Tagged Networks  

E-Print Network (OSTI)

Many real world systems or web services can be represented as a network such as social networks and transportation networks. In the past decade, many algorithms have been developed to detect the communities in a network using connections between nodes. However in many real world networks, the locations of nodes have great influence on the community structure. For example, in a social network, more connections are established between geographically proximate users. The impact of locations on community has not been fully investigated by the research literature. In this paper, we propose a community detection method which takes locations of nodes into consideration. The goal is to detect communities with both geographic proximity and network closeness. We analyze the distribution of the distances between connected and unconnected nodes to measure the influence of location on the network structure on two real location-tagged social networks. We propose a method to determine if a location-based community detection...

Liu, Zhi

2015-01-01T23:59:59.000Z

244

E-Print Network 3.0 - aquaculture health management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

2 WHAT IS AQUACULTURE? Aquaculture is the farming of aquatic organisms, including fish, molluscs, Summary: in water management, hatchery operations, propagation techniques,...

245

E-Print Network 3.0 - accident management guidelines Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: accident management guidelines Page: << < 1 2 3 4 5 > >> 1 Emergency Procedures Guidelines Student Group Travel Off-Campus Activity Summary: Emergency Procedures...

246

E-Print Network 3.0 - alternative agricultural management Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

hours)2 AGEC 1103 Principles of Agricultural Microeconomics1 Summary: Futures and Options Markets AGEC 3403 Farm Business Management AGEC 3303 Food and Agricultural Marketing......

247

E-Print Network 3.0 - advocacy case management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering 30 What can I do with this major? AREAS EMPLOYERS Summary: . DESCRIPTIONSSTRATEGIES CaseManagement Advocacy ServiceCoordination Public or private child welfare...

248

E-Print Network 3.0 - american intensively managed Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Division March 19, 2009 12;2 Managed by UT... Business Opportunities African American Energy Consumption Energy at a ... Source: Controlled Fusion Atomic Data Center (CFADC)...

249

E-Print Network 3.0 - automobile management application Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: automobile management application Page: << < 1 2 3 4 5 > >> 1 FUTURES OF AUTOMOBILE INDUSTRY...

250

E-Print Network 3.0 - area watershed management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Sample search results for: area watershed management Page: << < 1 2 3 4 5 > >> 1 Environmental and Resource Studies Program Department of Geography Summary: Watershed...

251

E-Print Network 3.0 - adaptive capacity management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Biocomplexity Project Collection: Environmental Sciences and Ecology 2 The Future of Water Resources Adaptive Management: Challenges and Overcoming Them Summary: the desired...

252

E-Print Network 3.0 - automatic capture management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Information Sciences 23 Scalable, Fault-tolerant Management in a Service Oriented Architecture Summary: Xtensions) which enables any Java-based resource to be...

253

E-Print Network 3.0 - active adaptive management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Information Sciences 85 Scalable, Fault-tolerant Management in a Service Oriented Architecture Harshawardhan Gadgil, Geoffrey Fox, Shrideep Pallickara, Marlon Pierce...

254

E-Print Network 3.0 - architecture knowledge management Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

the Journal of Information Systems Education... in the following areas: service-oriented architecture and business process modeling, risk analysis and management... ,...

255

E-Print Network 3.0 - adaptive resource management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Information Sciences 12 Scalable, Fault-tolerant Management in a Service Oriented Architecture Harshawardhan Gadgil, Geoffrey Fox, Shrideep Pallickara, Marlon Pierce...

256

E-Print Network 3.0 - asthma management opportunities Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

approaches in pediatric and adult... and their parents manage asthma symptoms. "Steve Samuelson, executive director of Mobile C.A.R.E., has some Kellogg... Stimulating Science...

257

E-Print Network 3.0 - asthma management system Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

of asthma. medications that can alter the natural history of the disease 2. Management... of chronic steroid refractory asthma. Using a Flexercell Tension Plus...

258

E-Print Network 3.0 - atlantic shark management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

distribution, frequency, and economic value of shark ecotourism Summary: of research and ecotourism could benefit the regional management of shark populations (e.g. Bensley et...

259

E-Print Network 3.0 - assistance contractor management Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

Patent Rights Management and Operating Contracts, For-Profit Contractor, Advance Class Waiver Alt 1 DEAR... -owned waste and the Contractor shall notify the SDR for ... Source:...

260

E-Print Network 3.0 - adaptive harvest management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies and Information Sciences 9 Switchgrass Biomass Production in the Midwest USA: Harvest and Nitrogen Management Summary: Switchgrass Biomass Production in the...

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

E-Print Network 3.0 - aviation safety management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Powered by Explorit Topic List Advanced Search Sample search results for: aviation safety management Page: << < 1 2 3 4 5 > >> 1 This certificate program was developed in...

262

E-Print Network 3.0 - air resource management Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

ENGINEERING Summary: design electives in the fields of water and wastewater treatment, waste management, air quality... and Impoundments CEMM 518 Pollution Prevention...

263

E-Print Network 3.0 - asian farmer managed Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

in partnership: the case of farmers' organizations in Costa Summary: of the region, (ii) assistance to about ten farmers' organizations to improve their internal management... the...

264

E-Print Network 3.0 - automatic fault management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

2000 Tutorial on Summary: Management 5. Fault Tolerant Applications 6. Fault Tolerant Hello Server Example 12;Tutorial on Fault... Systems, Inc, 2000 Who Has Control? ...

265

E-Print Network 3.0 - accident management implementation Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

5. Report accident to Risk Management Passenger Name: Address... Columbia University Vehicle Accident Report Keep this ... Source: Qian, Ning - Center for Neurobiology and...

266

E-Print Network 3.0 - automated file management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Source: Texas at Austin, University of - Center for Transportation Research Collection: Energy Storage, Conversion and Utilization 22 Tivoli Storage Manager for UNIX and Linux...

267

E-Print Network 3.0 - aquatic plant management Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Lakes and Reservoirs Collection: Environmental Sciences and Ecology 6 The efficient management of water resources is a critical issue throughout Australia. Plants play an...

268

E-Print Network 3.0 - admission management system Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

All Campuses... -Graduate Admission Air Force Institute of Technology- Officer Education Records Management Art Academy of Cincinnati... 14, 2009 12;viRginiA American Military...

269

Making Science Useful to Decision Makers: Climate Forecasts, Water Management, and Knowledge Networks  

Science Journals Connector (OSTI)

Moving from climate science to adaptive action is an immense challenge, especially in highly institutionalized sectors such as water resources. Knowledge networks are valuable strategies to put climate information to use. They overcome barriers ...

David L. Feldman; Helen M. Ingram

2009-10-01T23:59:59.000Z

270

An Integration Framework for Sensor Networks and Data Stream Management Systems  

E-Print Network (OSTI)

values in various offices in a building as input to an HVAC (Heating, Ventilation, and Air Conditioning network. For example, it may be desirable to push certain filters and aggregates into the sensor netw

Lindner, Wolfgang

271

Network Operation and Maintenance System of Meticulous Management Based on Data Analysis  

Science Journals Connector (OSTI)

Due to rapid development of the domestic communication industry, energy consumption on network operation and maintenance has become one of the ... s crucial for us to develop an intelligent system for data analys...

Qi-Te Wang; Ke-Bin Jia; Ye Yuan; Yu-Xin Song

2014-01-01T23:59:59.000Z

272

Optimal threshold-based network-level transportation infrastructure life-cycle management with heterogeneous maintenance actions  

Science Journals Connector (OSTI)

Transportation infrastructure life-cycle management deals with maintenance decision making of transportation facilities such as pavement, bridges, and railways under budget constraints. In practice, transportation agencies adopt threshold-based rules for maintenance planning because they are intuitive and easy to implement. However, the thresholds are often determined based on engineering judgment without any systematic approach. Therefore, maintenance budgets cannot be used effectively and facility conditions are not optimized. This research uses hybrid dynamic models to represent threshold-based maintenance for transportation infrastructure in a realistic manner. Hybrid dynamic models combine continuous states such as pavement roughness and age with discrete states such as maintenance history. These models are also capable of considering multiple maintenance actions with heterogeneous effects. Based on facility conditions and maintenance thresholds, corresponding maintenance actions are selected automatically and the facility switches between deterioration modes to reflect the effects of the chosen action. Furthermore, to consider users’ reactions to maintenance actions and accurately predict deterioration for a network of facilities, threshold-based maintenance is formulated as an upper-level problem, and user response is incorporated as a lower-level problem. This leads to a bi-level programming problem where maintenance thresholds are decision variables, which is solved with a modified tabu search algorithm. The proposed methodology is validated with the road network of an urban area and the generated maintenance thresholds are reasonable and robust, which shows that the methodology has great potential to support transportation infrastructure life-cycle management in practice.

James C. Chu; Yin-Jay Chen

2012-01-01T23:59:59.000Z

273

Journal: Forest Ecology and Management1 Title Bridge Scour Physical Road and Stream Network Connectivity, Northeastern  

E-Print Network (OSTI)

­ Bridge Scour Physical Road and Stream Network Connectivity, Northeastern Puerto Rico Authors ­ Sherrill, K.R.1 , Pike, A.S.2 , Laituri, M.J.1* , Scatena, F.N.2 , Helmer, E.H.3 , and Blanco, J.F.4 1, CO 80523-1472, USA 21 22 23 24 25 26 27 Key Words ­ Bridge Scour, Physical Road and Stream Network

274

Open Rigging Through XML: Character Setup Utilizing Metadata and Node Based Editing  

E-Print Network (OSTI)

Manager. . . . . 22 7 The Rig Manager interface for an empty scene. . . . . . . . . . . . . . 23 8 The Rig Manager interface and “Rig Edit Mode” label on the viewport after clicking the “Create Rig” button. . . . . . . . . . . . . . . . . . . 24 9 The Rig... and replace them with code that performs the desired actions. For example, the node-based interface can be used to replace the task of authoring rig 6 definition files in a text editor so that the user never needs to learn the rig definition format. 7 3...

Kelly, Logan Scott

2014-02-19T23:59:59.000Z

275

E-Print Network 3.0 - accident management measures Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Sample search results for: accident management measures Page: << < 1 2 3 4 5 > >> 1 An Internet-based, Searchable Database of Air Accidents N. Storey, B.Sc., Ph.D., FBCS, MIEE,...

276

E-Print Network 3.0 - air service management Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

2010 Summary: Management Policy: 2.1 ASHRAE: American Society of Heating, Refrigeration & Air-Conditioning Engineers 2... of the supplied air with the air already in the room. 3.0...

277

E-Print Network 3.0 - aquatic management options Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

30 ERDCELTR-05-4 Aquatic Plant Control Research Program Summary: and ponds may have lost their aquatic flora due to chronic disturbance or long-term vegetation management......

278

Bridging the Gap between Network and Project Selection Levels in Pavement Management  

E-Print Network (OSTI)

Pavement management is one of the primary responsibilities for departments of transportation and other municipalities across the country. Efficient and proper use of taxpayer dollars to preserve and improve the existing transportation system has...

Gurganus, Charles Felder

2011-08-08T23:59:59.000Z

279

Evolving networks with bimodal degree distribution  

Science Journals Connector (OSTI)

Networks with bimodal degree distribution are most robust to targeted and random attacks. We present a model for constructing a network with bimodal degree distribution. The procedure adopted is to add nodes ...

Abhijeet R. Sonawane; A. Bhattacharyay; M. S. Santhanam…

2012-04-01T23:59:59.000Z

280

Bayesian Networks for the management of greenhouse gas emissions in the British agricultural sector  

Science Journals Connector (OSTI)

Recent years have witnessed a rapid rise in the development of deterministic and non-deterministic models to estimate human impacts on the environment. An important failing of these models is the difficulty that most people have understanding the results ... Keywords: Bayesian Networks, Environmental factors, GHG emissions

E. Pérez-Mińana; P. J. Krause; J. Thornton

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Traffic Management and Network Control Using Collaborative On-line Simulation  

E-Print Network (OSTI)

parameters. The protocol parameters are then tuned by the online simulation system. In this paper, we of their parameters. The goal then is to have the online simulation system use sophisticated parameter search methods, the simulation system can support continuous tuning of the network based upon the online modeling, parameter

Kalyanaraman, Shivkumar

282

Collective network for computer structures  

DOE Patents (OSTI)

A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

2014-01-07T23:59:59.000Z

283

Collective network for computer structures  

DOE Patents (OSTI)

A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

Blumrich, Matthias A. (Ridgefield, CT); Coteus, Paul W. (Yorktown Heights, NY); Chen, Dong (Croton On Hudson, NY); Gara, Alan (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Takken, Todd E. (Brewster, NY); Steinmacher-Burow, Burkhard D. (Wernau, DE); Vranas, Pavlos M. (Bedford Hills, NY)

2011-08-16T23:59:59.000Z

284

Title: Networking the Cloud: Enabling Enterprise Computing and Storage Cloud computing has been changing how enterprises run and manage their IT systems. Cloud  

E-Print Network (OSTI)

Title: Networking the Cloud: Enabling Enterprise Computing and Storage Abstract: Cloud computing has been changing how enterprises run and manage their IT systems. Cloud computing platforms provide introduction on Cloud Computing. We propose a Virtual Cloud Pool abstraction to logically unify cloud

285

Microgrids in active network management—Part I: Hierarchical control, energy storage, virtual power plants, and market participation  

Science Journals Connector (OSTI)

Abstract The microgrid concept has been closely investigated and implemented by numerous experts worldwide. The first part of this paper describes the principles of microgrid design, considering the operational concepts and requirements arising from participation in active network management. Over the last several years, efforts to standardize microgrids have been made, and it is in terms of these advances that the current paper proposes the application of IEC/ISO 62264 standards to microgrids and Virtual Power Plants, along with a comprehensive review of microgrids, including advanced control techniques, energy storage systems, and market participation in both island and grid-connection operation. Finally, control techniques and the principles of energy-storage systems are summarized in a comprehensive flowchart.

Omid Palizban; Kimmo Kauhaniemi; Josep M. Guerrero

2014-01-01T23:59:59.000Z

286

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network (OSTI)

Management Team Department of Computer Science, TU MË? unchen Arcisstr. 21, D­80333 Munich, Germany akeller approach to this problem by defining a MIB for manage­ ment systems. It can be regarded as a step towardsManaging the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network

287

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network (OSTI)

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

288

RIS: A Reciprocal Incentive Scheme in Selfish Opportunistic Networks  

Science Journals Connector (OSTI)

Data dissemination in opportunistic networks has been extensively studied in recent years. In the resource-constrained opportunistic networks (e.g., the buffer size, the communication bandwidth and the energy of nodes are scarce), the nodes usually behave ... Keywords: Channel, Incentive scheme, Opportunistic networks, Selfish

Guangsong Zhao; Ming Chen; Xianglin Wei

2013-06-01T23:59:59.000Z

289

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks  

E-Print Network (OSTI)

1 HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node AND BACKGROUND A mobile ad hoc network is a group of mobile nodes without requiring centralized administration

Sun, Yan Lindsay

290

Co-Simulation Tools for Networked Control Systems  

E-Print Network (OSTI)

/Plant Extension ! NSCSPlant, NSCSController Extensions ! Modelica/ns-2 Integration [BPZ'02 NCS Co medium (wire/wireless link) Network node (data source) Network node (data sink) From Modelica to ns-2 From ns-2 to Modelica [Al-Hammouri, Agrawal, Liberatore, Branicky] Network View Example Reference Speed

Branicky, Michael S.

291

Self-Stabilizing Local Routing in Ad Hoc Networks  

Science Journals Connector (OSTI)

......MANET) have no fixed network infrastructure (nodes are free to change...need for any existing network infrastructure or administration. Each node...networks modelled as a honeycomb grid is proposed in ref. [15...collected data. Protocol is a hybrid of the protocols and . The......

Doina Bein; Ajoy K. Datta; Vincent Villain

2007-03-01T23:59:59.000Z

292

CSP-based counter abstraction for systems with node identifiers  

Science Journals Connector (OSTI)

Abstract The Parameterised Model Checking Problem asks whether an implementation I m p l ( t ) satisfies a specification S p e c ( t ) for all instantiations of parameter  t . In general, t  can determine numerous entities: the number of processes used in a network, the type of data, the capacities of buffers, etc. The main theme of this paper is automation of uniform verification of a subclass of PMCP with the parameter of the first kind, i.e. where it determines the number of processes used in a network. We use CSP as our formalism. Counter abstraction is a technique that replaces a concrete state space by an abstract one, where each abstract state is a tuple of integer counters ( c 1 , … , c k ) such that for each  i , c i counts how many node processes are currently in the i -th state. Each counter c i is given a finite threshold z i and we interpret c i = z i as there being z i or more processes in the i -th state. Standard counter abstraction techniques require all processes to be identical, which means that nodes cannot use node identifiers. In this paper we present how counter abstraction techniques can be extended to processes that make use of node identifiers in a symmetrical way. Our method creates a process A b s t r that is independent of  t and is refined by ? ( I m p l ( T ) ) for all sufficiently large  T , where ? maps all (sufficiently large) instantiations T of the parameter to some fixed type. By transitivity of refinement, testing if A b s t r refines S p e c ( ? ( t ) ) implies that S p e c ( ? ( t ) ) is refined by ? ( I m p l ( T ) ) . Then, using the type reduction theory from Mazur and Lowe (2012) [29], we can deduce that S p e c ( T ) is refined by I m p l ( T ) for all sufficiently large T , thus obtaining a positive answer to the original verification problem.

Tomasz Mazur; Gavin Lowe

2014-01-01T23:59:59.000Z

293

Resource–Task Network Formulations for Industrial Demand Side Management of a Steel Plant  

Science Journals Connector (OSTI)

In the industrial demand side management (iDSM) or demand response (DR) grid-consumer interface, the electricity provider gives economic incentives to the industry to alter their electricity usage behavior and there are generally two approaches:• ... It can be used as an important tool for industrial demand side management or demand response, a concept in which the plant adapts its operational behavior by changing the timing of electricity usage from on-peak to off-peak hours for the collective benefit of society. ...

Pedro M. Castro; Lige Sun; Iiro Harjunkoski

2013-08-13T23:59:59.000Z

294

Robust Beamforming for OFDM Modulated Two-Way MIMO Relay Network  

E-Print Network (OSTI)

This thesis studies a two-way relay network (TWRN), which consists of two single antenna source nodes and a multi-antenna relay node. The source nodes exchange information via the assistance of the relay node in the middle. The relay scheme...

Zhou, Jianwei

2012-07-16T23:59:59.000Z

295

A Simulation Study on the Performance of Integrated Switching Strategy for Traffic Management in ATM Networks  

E-Print Network (OSTI)

, University of Cyprus, Nicosia, Cyprus cspitsil@turing.cs.ucy.ac.cy Petros Ioannou Department of Electrical Connec- tion Admission Control with a bandwidth allocation strat- egy [4, 5]. By seeking the cooperation regulation, bandwidth allocation, routing, queue scheduling, and buffer management. Whilst it was recognized

Pitsillides, Andreas

296

Digital Rights Management for Video Sensor Network Taojun Wu, Liang Dai, Yuan Xue, Yi Cui  

E-Print Network (OSTI)

information source on the Internet, DRM (Digital Rights Management) must be enforced, due to the sensitivity becomes a public information source on the Internet, many urgent technical issues arise, mainly due mechanisms are also avail- able to identify and attest the abuse of access right and illegal distribution

297

Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks  

Science Journals Connector (OSTI)

The credibility of mobile ad hoc network simulations depends on accurate characterisations of user behaviour, e.g., mobility and application usage. If simulated nodes communicate at different rates to real nodes, or move in an unrealistic fashion, this ... Keywords: Opportunistic networks, Privacy, Simulation, Social networks, Social-network routing

Iain Parris; Fehmi Ben Abdesslem; Tristan Henderson

2014-01-01T23:59:59.000Z

298

A Key-Management Scheme for Distributed Sensor Laurent Eschenauer  

E-Print Network (OSTI)

may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensor of the network, and control nodes, which monitor the status of and broadcast simple commands to sensor nodes. Al

Scheuermann, Peter

299

AN ASYMPTOTICALLY OPTIMAL APPROACH TO THE DISTRIBUTED ADAPTIVE TRANSMIT BEAMFORMING IN WIRELESS SENSOR NETWORKS  

E-Print Network (OSTI)

the plants on a field. As the transmission power of each single node is too weak to reach the distant]. A solution to synchronize carrier signals of distributed wireless nodes is virtual/cooperative MIMO for wireless sen- sor networks [1, 2, 3]. In virtual MIMO for wireless sensor networks, single antenna nodes

Beigl, Michael

300

Clock Agreement Among Parallel Supercomputer Nodes  

SciTech Connect

This dataset presents measurements that quantify the clock synchronization time-agreement characteristics among several high performance computers including the current world's most powerful machine for open science, the U.S. Department of Energy's Titan machine sited at Oak Ridge National Laboratory. These ultra-fast machines derive much of their computational capability from extreme node counts (over 18000 nodes in the case of the Titan machine). Time-agreement is commonly utilized by parallel programming applications and tools, distributed programming application and tools, and system software. Our time-agreement measurements detail the degree of time variance between nodes and how that variance changes over time. The dataset includes empirical measurements and the accompanying spreadsheets.

Jones, Terry R.; Koenig, Gregory A.

2014-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Clock Agreement Among Parallel Supercomputer Nodes  

DOE Data Explorer (OSTI)

This dataset presents measurements that quantify the clock synchronization time-agreement characteristics among several high performance computers including the current world's most powerful machine for open science, the U.S. Department of Energy's Titan machine sited at Oak Ridge National Laboratory. These ultra-fast machines derive much of their computational capability from extreme node counts (over 18000 nodes in the case of the Titan machine). Time-agreement is commonly utilized by parallel programming applications and tools, distributed programming application and tools, and system software. Our time-agreement measurements detail the degree of time variance between nodes and how that variance changes over time. The dataset includes empirical measurements and the accompanying spreadsheets.

Jones, Terry R.; Koenig, Gregory A.

302

Demand-Supply Optimization with Risk Management for a Multi-Connection Water Reservoir Network  

E-Print Network (OSTI)

In this paper, we propose a framework to solve a demand-supply optimization problem of long-term water resource allocation on a multi-connection reservoir network which, in two aspects, is different to the problem considered in previous works. First, while all previous works consider a problem where each reservoir can transfer water to only one fixed reservoir, we consider a multi-connection network being constructed in Thailand in which each reservoir can transfer water to many reservoirs in one period of time. Second, a demand-supply plan considered here is static, in contrast to a dynamic policy considered in previous works. Moreover, in order to efficiently develop a long-term static plan, a severe loss (a risk) is taken into account, i.e. a risk occurs if the real amount of water stored in each reservoir in each time period is less than what planned by the optimizer. The multi-connection function and the risk make the problem rather complex such that traditional stochastic dynamic programming and determi...

Chatpatanasiri, Ratthachat

2009-01-01T23:59:59.000Z

303

Switch for serial or parallel communication networks  

DOE Patents (OSTI)

A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

Crosette, Dario B. (DeSoto, TX)

1994-01-01T23:59:59.000Z

304

Switch for serial or parallel communication networks  

DOE Patents (OSTI)

A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

Crosette, D.B.

1994-07-19T23:59:59.000Z

305

Line-plane broadcasting in a data communications network of a parallel computer  

SciTech Connect

Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

Archer, Charles J. (Rochester, MN); Berg, Jeremy E. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-11-23T23:59:59.000Z

306

Dynamic Networks: Recent Results and Applications  

E-Print Network (OSTI)

Networks provide us with the means to cross distance in order to conduct our work, and to see our. #12;Duke Energy Gas Pipeline Network #12;Components of Common Physical Networks Network System Nodes Links Flows Transportation Intersections, Homes, Workplaces, Airports, Railyards Roads, Airline Routes

Nagurney, Anna

307

Analysis of lattice Boltzmann nodes initialization in  

E-Print Network (OSTI)

Analysis of lattice Boltzmann nodes initialization in Moving Boundary problems A. Caiazzo: The lattice Boltzmann method is a numerical scheme based on a fixed grid. Dealing with moving boundary. The theoretical predictions are tested on simple benchmarks. Keywords: lattice Boltzmann equation, lattice

308

An energy-efficient adaptive clustering algorithm with load balancing for wireless sensor network  

Science Journals Connector (OSTI)

Maximisation of network lifetime is the issue of prime importance in Wireless Sensor Network (WSN). An energy-efficient clustering algorithm with load balancing can achieve this challenging goal. We propose Density-based Dynamic Clustering (DDC) algorithm for clustering and cluster head election mechanism with the use of independence set. Furthermore, a distributed algorithm (DISD - Distributed Independence Set Discovery) is designed for cluster head election in O(1) complexity per sensor node. In this, we dynamically find an optimal sensor cover to dominate maximum sensors within a cluster, therefore forming an InDependence Set (IDS). Only the members of IDS are allowed to participate in the cluster head selection (rotation), thereby establishing load balancing and energy management. Our model is designed for dual modes: low- and high-traffic session. According to the flow of packets, the sleep management technique is modified. Network simulator is used for the simulation of our proposed algorithms.

Buddha Singh; D.K. Lobiyal

2012-01-01T23:59:59.000Z

309

Creation and maintenance of a communication tree in wireless sensor networks  

E-Print Network (OSTI)

A local reconfiguration algorithm (INP) for reliable routing in wireless sensor networks that consist of many static (fixed) energy-constrained nodes is introduced in the dissertation. For routing around crash fault nodes, a communication tree...

Jung, Eun Jae

2008-10-10T23:59:59.000Z

310

Creation and maintenance of a communication tree in wireless sensor networks  

E-Print Network (OSTI)

A local reconfiguration algorithm (INP) for reliable routing in wireless sensor networks that consist of many static (fixed) energy-constrained nodes is introduced in the dissertation. For routing around crash fault nodes, a communication tree...

Jung, Eun Jae

2009-05-15T23:59:59.000Z

311

On strong fault tolerance (or strong Menger-connectivity) of multicomputer networks  

E-Print Network (OSTI)

As the size of networks increases continuously, dealing with networks with faulty nodes becomes unavoidable. In this dissertation, we introduce a new measure for network fault tolerance, the strong fault tolerance (or strong Menger...

Oh, Eunseuk

2004-11-15T23:59:59.000Z

312

The normalization of meshes and nodes in electrical networks  

E-Print Network (OSTI)

hF7 ,7(39695 u,7?i79grp Sp 8( )8m79 .r 3w + i r ?- 691 8( g 3 ? ? ? ? ,61869( a7, (7g391n ?7 (77 5F65p 89 )797,6+p 5F7 ,7(39695 u,7?i79g87( 13 935 18 coincide with the natural frequencies and that a resonant frequency is greater than...S + R12 + ? i l l ( s ) ? ?+??( ? ?22 ? ?u??? 868?(? ? 0a39 (i.(585i589) m6+i7( u,3e ??+?? S7 F6m7 ???? (36) 22 r-AAA/------V W ro W CO C - O rH - J U U L r ovO I?I CO o iH K1A vOo- OJ Figure 23 ? (? ? ? ?n??? ? ? ???n?? ? 8...

Johnson, Allen Forrest

2013-10-04T23:59:59.000Z

313

Randomized location service in Mobile Ad Hoc Networks  

E-Print Network (OSTI)

of the node. Home regions near a node are aware of the nodes exact location (that is, the unit region it occupies) while home regions that are far from the node know only of a larger region that contains the node. Camp, Boleng and Wilcox [12] have dcvclopcd..., *' in Proc. IEEE Wireless Communication and Networking Conference (WCNC), Orlando, FL, 2002, pp. 874-578. [12] T. Camp, J. Boleng and L. Wilcox, "Location Information Services in Mobile Ad Hoc Networks, " in IEEE Int. Conf. Communications, 2002, pp. 3318...

Bhattacharya, Sangeeta

2012-06-07T23:59:59.000Z

314

Analysing alternatives in financial services for wealth management banks: the analytic network process and the balanced scorecard approach  

Science Journals Connector (OSTI)

......services for wealth management banks: the analytic...balanced scorecard approach Cheng-Ru Wu...services for wealth management banks: the analytic...balanced scorecard approach CHENG-RU WU...Introduction to Management Science. St Paul, MN......

Cheng-Ru Wu; Chin-Tsai Lin; Pei-Hsuan Tsai

2009-07-01T23:59:59.000Z

315

Singlet generation in mixed-state quantum networks  

SciTech Connect

We study the generation of singlets in quantum networks with nodes initially sharing a finite number of partially entangled bipartite mixed states. We prove that singlets between arbitrary nodes in such networks can be created if and only if the initial states connecting the nodes have a particular form. We then generalize the method of entanglement percolation, previously developed for pure states, to mixed states of this form. As part of this, we find and compare different distillation protocols necessary to convert groups of mixed states shared between neighboring nodes of the network into singlets. In addition, we discuss protocols that only rely on local rules for the efficient connection of two remote nodes in the network via entanglement swapping. Further improvements of the success probability of singlet generation are developed by using particular forms of ''quantum preprocessing'' on the network. This includes generalized forms of entanglement swapping and we show how such strategies can be embedded in regular and hierarchical quantum networks.

Broadfoot, S.; Dorner, U. [Clarendon Laboratory, University of Oxford, Oxford OX1 3PU (United Kingdom); Jaksch, D. [Clarendon Laboratory, University of Oxford, Oxford OX1 3PU (United Kingdom); Centre for Quantum Technologies, National University of Singapore, 117543 (Singapore)

2010-04-15T23:59:59.000Z

316

Generative models of rich clubs in Hebbian neuronal networks and large-scale human brain networks  

Science Journals Connector (OSTI)

...Theme Issue Complex network theory and the brain compiled and edited by David Papo, Javier...neuronal networks and large-scale human brain networks Petra E. Vertes 1 Aaron Alexander-Bloch...Theme Issue Complex network theory and the brain . Rich clubs arise when nodes that are...

2014-01-01T23:59:59.000Z

317

Maintaining connectivity in a mobile ad hoc network  

E-Print Network (OSTI)

This thesis focuses on the problem of maintaining graphics. connectivity in a mobile ad hoc network. Mobile ad hoc networks are without a fixed topology and are dynamically changing. This makes the problem of maintaining connectivity among all nodes...

Reuben, Ron S.

2012-06-07T23:59:59.000Z

318

An energy efficient RF transceiver for wireless microsensor networks  

E-Print Network (OSTI)

A wireless microsensor network consists of a group of sensor nodes that are deployed remotely and used to relay sensing data to the end-user. Due to their remote deployment, large scale wireless sensor networks require a ...

Daly, Denis Clarke

2005-01-01T23:59:59.000Z

319

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network (OSTI)

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

320

Performing a scatterv operation on a hierarchical tree network optimized for collective operations  

DOE Patents (OSTI)

Performing a scatterv operation on a hierarchical tree network optimized for collective operations including receiving, by the scatterv module installed on the node, from a nearest neighbor parent above the node a chunk of data having at least a portion of data for the node; maintaining, by the scatterv module installed on the node, the portion of the data for the node; determining, by the scatterv module installed on the node, whether any portions of the data are for a particular nearest neighbor child below the node or one or more other nodes below the particular nearest neighbor child; and sending, by the scatterv module installed on the node, those portions of data to the nearest neighbor child if any portions of the data are for a particular nearest neighbor child below the node or one or more other nodes below the particular nearest neighbor child.

Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

2013-10-22T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

An investigation of two network flow optimization algorithms  

E-Print Network (OSTI)

of attention has been paid to a class of problems known as optimization problems. An important subclass of these problems are network problems. Networks consist, of a set of nodes interconnected by a set of arcs, as discussed more completely below. Many... of the network algorithms and a liter- ature survey. Graph Theory A graph is a set of points or nodes and a set of line segments or arcs mapped into pairs of nodes. These arcs are mapped so that no node is interior to any line segment and each end point...

Steelquist, John Anders

2012-06-07T23:59:59.000Z

322

FLOP Counts for Single-Node Tests  

NLE Websites -- All DOE Office Websites (Extended Search)

FLOP Counts for "Small" Single-Node Miniapplication Tests FLOP Counts for "Small" Single-Node Miniapplication Tests FLOP Counts for "Small" Single-Node Miniapplication Tests These data, obtained using the NERSC Hopper system, are provided for reference. Code MPI Tasks Threads Reference TFLOP Count Benchmark Time (seconds) # of iterations miniFE 144 1 5.05435E+12 130.2 (total program time) miniGhost 96 1 6.55500E+12 76.5 AMG 96 1 1.30418E+12 66.95 18 UMT 96 1 1.30211E+13 416.99 49 SNAP 96 1 5.84246E+11 15.37 3059 miniDFT 40 1 2.32379E+13 153.97 GTC 64 1 6.63670E+13 1839.4 MILC 24 1 1.45971E+13 744.3 CORRECTION (02 August 2013): The values given for the reference counts are FLOPs, not TFLOPs. Last edited: 2013-08-02 09:40:18

323

A Mechanically Stable, Low Profile, Omni-Directional Solar-Cell Integrated Antenna for Outdoor Wireless Sensor Nodes  

E-Print Network (OSTI)

A Mechanically Stable, Low Profile, Omni-Directional Solar-Cell Integrated Antenna for Outdoor nodes have been integrated with solar cells to increase the robustness of the network [2]. To boost under the solar cell circuitry. Several solar antenna integration methods have been published

Tentzeris, Manos

324

Timescale decoupled routing and rate control in intermittently connected networks  

Science Journals Connector (OSTI)

We study an intermittently connected network (ICN) composed of multiple clusters of wireless nodes. Within each cluster, nodes can communicate directly using the wireless links. However, these clusters are far away from each other such that direct communication ... Keywords: back-pressure (BP) routing and rate control, intermittently connected networks (ICNs)

Jung Ryu; Lei Ying; Sanjay Shakkottai

2012-08-01T23:59:59.000Z

325

Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks  

E-Print Network (OSTI)

and a set of destination nodes, the problem is to build a minimum-energy multicast tree for the requestApproximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks Weifa Liang, Senior Member, IEEE Abstract--A wireless ad hoc network consists of mobile nodes that are equipped with energy

Liang, Weifa

326

Secure Aggregation for Wireless Networks Lingxuan Hu David Evans  

E-Print Network (OSTI)

. To conserve power, intermediate network nodes should aggregate results from individual sensors. However nodes within the network and use them to transmit false messages. Further, an adversary may compromise of the messages themselves to be unnecessary and focus only on the integrity of the results transmitted

Evans, David

327

Advanced mobile networking, sensing, and controls.  

SciTech Connect

This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

2005-03-01T23:59:59.000Z

328

Mobility in Wireless Sensor Networks  

E-Print Network (OSTI)

A MAV D C ADV E D Micro Air Vehicle Network Manager C B D CA B A F A D B A E Micro Air Vehicle Network Manager C B MAV

Mehta, Ankur Mukesh

2012-01-01T23:59:59.000Z

329

Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks  

E-Print Network (OSTI)

1 Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks Yan Lindsay-- The performance of ad hoc networks depends on co- operation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized

Sun, Yan Lindsay

330

Evaluation of a Routing Architecture for Wireless Messaging Ad-Hoc Networks  

E-Print Network (OSTI)

Evaluation of a Routing Architecture for Wireless Messaging Ad-Hoc Networks Megha Goel1 and M´ark F self-organizing ad-hoc networks can be used to provide the short messaging service, at a much lower of ad- hoc network routing in which mobile nodes are allowed to relay in place of static nodes. We

Bencsáth, Boldizsár

331

Pinning impulsive control algorithms for complex network  

SciTech Connect

In this paper, we further investigate the synchronization of complex dynamical network via pinning control in which a selection of nodes are controlled at discrete times. Different from most existing work, the pinning control algorithms utilize only the impulsive signals at discrete time instants, which may greatly improve the communication channel efficiency and reduce control cost. Two classes of algorithms are designed, one for strongly connected complex network and another for non-strongly connected complex network. It is suggested that in the strongly connected network with suitable coupling strength, a single controller at any one of the network's nodes can always pin the network to its homogeneous solution. In the non-strongly connected case, the location and minimum number of nodes needed to pin the network are determined by the Frobenius normal form of the coupling matrix. In addition, the coupling matrix is not necessarily symmetric or irreducible. Illustrative examples are then given to validate the proposed pinning impulsive control algorithms.

Sun, Wen [School of Information and Mathematics, Yangtze University, Jingzhou 434023 (China)] [School of Information and Mathematics, Yangtze University, Jingzhou 434023 (China); Lü, Jinhu [Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)] [Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China); Chen, Shihua [College of Mathematics and Statistics, Wuhan University, Wuhan 430072 (China)] [College of Mathematics and Statistics, Wuhan University, Wuhan 430072 (China); Yu, Xinghuo [School of Electrical and Computer Engineering, RMIT University, Melbourne VIC 3001 (Australia)] [School of Electrical and Computer Engineering, RMIT University, Melbourne VIC 3001 (Australia)

2014-03-15T23:59:59.000Z

332

High speed end-to-end connection management in a bridged IEEE 1394 network of professional audio devices.  

E-Print Network (OSTI)

??A number of companies have developed a variety of network approaches to the transfer of audio and MIDI data. By doing this, they have addressed… (more)

Okai-Tettey, Harold A.

2005-01-01T23:59:59.000Z

333

Costeffective Outbreak Detection in Networks  

E-Print Network (OSTI)

on how contaminants spread in the network Problem posed by US Environmental Protection Agency S On which nodes should we place sensors to efficiently detect the all possible contaminations? S #12 Given a graph G(V,E) and a budget B for sensors and data on how contaminations spread over the network

Yang, Qiang

334

Bayesian networks: maths problems March 31, 2009  

E-Print Network (OSTI)

that the patient smokes, but have not carried out any genetic tests. Symptoms of the disease are coughing (node C) and high temperature (node T). The patient is coughing but does not have a high temperature. Draw coughing. Draw a modified Bayesian network to model this, and discuss qualitatively how your belief about

Barker, Jon

335

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

336

On the energy cost of robustness and resiliency in IP networks  

Science Journals Connector (OSTI)

Abstract Despite the growing concern for the energy consumption of the Internet, green strategies for network and traffic management cannot undermine Quality of Service (QoS) and network survivability. In particular, two very important issues that may be affected by green networking techniques are resilience to node and link failures, and robustness to traffic variations. In this paper, we study how achieving different levels of resiliency and robustness impacts the network energy-aware efficiency. We propose novel optimization models to minimize the energy consumption of IP networks that explicitly guarantee network survivability to failures and robustness to traffic variations. Energy consumption is reduced by putting in sleep mode idle line cards and nodes according to traffic variations in different periods of the day. To guarantee network survivability we consider two different schemes, dedicated and shared protection, which assign a backup path to each traffic demand and some spare capacity on the links along the path. Robustness to traffic variations is provided by tuning the capacity margin on active links in order to accommodate load variations of different magnitude. Furthermore, we impose some inter-period constraints to guarantee network stability and preserve device lifetime. Both exact and heuristic methods are proposed. Experimentations carried out on realistic networks operated with flow-based routing protocols (like MPLS) allow us to quantitatively analyze the trade-off between energy cost and level of protection and robustness. Results show that significant savings, up to 30%, may be achieved even when both survivability and robustness are fully guaranteed, both with exact and heuristic approaches.

B. Addis; A. Capone; G. Carello; L.G. Gianoli; B. Sansň

2014-01-01T23:59:59.000Z

337

E-Print Network 3.0 - apollonio rodio ad Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer... , sensors may have four other components: analog, AD, digital, and micro- controller. The simplest design... " into sensor network nodes. Therefore, a...

338

E-Print Network 3.0 - ali Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

64GB computing platform. Nodes are connected using Myrinet and Gigabit Ethernet networks. The ALi... . Users need not start these components while performing experiments....

339

E-Print Network 3.0 - anier aleksander arkovski Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

92 Node Allocation and Topographical Encoding NATEnet for Inverse Kinematics of a 6DOF Robot Arm Summary: . Aleksander and J. Taylor, editors, Arti cal Neural Networks, pages...

340

Energy efficient and fairness improved medium access scheduling algorithms for mobile ad hoc networks;.  

E-Print Network (OSTI)

??In mobile ad hoc networks dynamically changing topologies are newlinethe direct result of the mobility of the nodes which characterize the ad hoc newlinenetworks Each… (more)

Priakanth P

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

E-Print Network 3.0 - apartheid-like social structure Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

Maps and measures with NodeXL Networks are a data structure common across all social media... .northwestern.edu Marc A. Smith Chief Social Scientist Connected Action...

342

Lower bound and an optimal algorithm for leader election in faulty asynchronous general networks  

E-Print Network (OSTI)

the problem of electing a leader in faulty asynchronous general net- works. The network coritams a reliable path connecting all the nodes in the network. The type of failure the links experience is interinittent. Since thc network is asyn- chronous... are faulty in nature. A faulty network may contain either faulty nodes, faulty links or both. In reliable networlcs, even if some of the elements fail, the whole network still will work reliably, giving the impression that everytliing is fine. Under a...

Lateef, Mohammed Afroz

2012-06-07T23:59:59.000Z

343

Queue management based duty cycle control for end-to-end delay guarantees in wireless sensor networks  

Science Journals Connector (OSTI)

In this paper, we propose an analytical method for duty cycle adaptation in wireless sensor networks so that delay requirement is guaranteed while power consumption is minimized. The proposed method, named Dual-QCon, provides a formal method for stabilizing ... Keywords: Delay guarantee, Duty cycle control, Wireless sensor networks

Heejung Byun; Soogook Son; Jungmin So

2013-08-01T23:59:59.000Z

344

Analyzing covert social network foundation behind terrorism disaster  

E-Print Network (OSTI)

This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator's prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing. The social network responsible for the 9/11 attack in 2001 is used to execute simulation experiment to evaluate the performance of the method.

Maeno, Yoshiharu

2007-01-01T23:59:59.000Z

345

Agent based modeling of energy networks  

Science Journals Connector (OSTI)

Abstract Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed.

José María Gonzalez de Durana; Oscar Barambones; Enrique Kremers; Liz Varga

2014-01-01T23:59:59.000Z

346

Cascade-based attacks on complex networks  

Science Journals Connector (OSTI)

We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

Adilson E. Motter and Ying-Cheng Lai

2002-12-20T23:59:59.000Z

347

On effectiveness of cooperation enforcement mechanisms in wireless ad hoc networks  

Science Journals Connector (OSTI)

Wireless ad hoc networks are resource constrained, infrastructureless peer to peer networks where nodes are responsible for performing routing activity for other nodes to establish end to end communication. Due to limited resources (energy and bandwidth), in certain networks, nodes may behave selfishly and not forward packets for other nodes. Many cooperation enforcement mechanisms are proposed in literature to enforce packet forwarding on resource constrained nodes, and are shown to perform better than the defenseless dynamic source routing (DSR) protocol under their own set of assumptions. However, they do not consider the effect on network lifetime and energy consumption. Here we analyse routing overhead, end to end packet delivery ratio (PDR), and per packet energy cost of DSR and a representative set of cooperation enforcement mechanisms using various network scenario to show that in absence of infrastructure support cooperation enforcement mechanisms in their present form are not effective in dealing with node selfishness.

Manish Chaturvedi; Sanjay Srivastava

2012-01-01T23:59:59.000Z

348

Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking  

E-Print Network (OSTI)

]; and hybrid networks, where infrastructure nodes coexist with multihopping [5]. In all these networks-theoretic results have shown that high- rate transmission over networks without any infrastructure (ad hoc networks of an infrastructure made of base stations (BSs or access points) connected by a high-capacity backbone. This class

Kramer, Gerhard

349

Matching Services with Users in Opportunistic Network Environments  

Science Journals Connector (OSTI)

Opportunistic Networks are a specific type of wireless ad hoc network where there is an absence of a continuous end-to-end path. The proliferation of mobile devices with Wi-Fi capability creates opportunities to forward packets by utilizing nodes as ... Keywords: ad hoc network, opportunistic network, matchmaking, service oriented computing

Anthony Smith, Stuart Berry, Richard Hill

2014-07-01T23:59:59.000Z

350

Downhole drilling network using burst modulation techniques  

DOE Patents (OSTI)

A downhole drilling system is disclosed in one aspect of the present invention as including a drill string and a transmission line integrated into the drill string. Multiple network nodes are installed at selected intervals along the drill string and are adapted to communicate with one another through the transmission line. In order to efficiently allocate the available bandwidth, the network nodes are configured to use any of numerous burst modulation techniques to transmit data.

Hall; David R. (Provo, UT), Fox; Joe (Spanish Fork, UT)

2007-04-03T23:59:59.000Z

351

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 8, NO. 4, DECEMBER 2011 1 Large-Scale Network-Service Disruption  

E-Print Network (OSTI)

communication service-disruptions and external factors such as weather and power. Unreachable subnets are found of communication disruptions. New research issues emerge for information acquisition across communication and power, complex dependencies exist among commu- nication networks, external disturbances, and power systems

Ji, Chuanyi

352

An Architecture for Distributed Real-Time Passive Network Measurement Tilman Wolf, Ramaswamy Ramaswamy, Siddhartha Bunga, and Ning Yang  

E-Print Network (OSTI)

An Architecture for Distributed Real-Time Passive Network Measurement Tilman Wolf, Ramaswamy network information be- tween several measurement nodes placed at different loca- tions in the network-processing them on the measurement node itself. Real-time queries are implemented by breaking them down

Shenoy, Prashant

353

Visualizing Multivariate Network Using GeoSOM and Spherical Disk Layout School of Information Technologies  

E-Print Network (OSTI)

. Connections in the network describe relationships/activities between the data points. Many real world data countries are repre- sented as nodes, each country has properties like gross domestic product (GDP), GDP Previously, we treat each graph node as a point in high-dimensional space and use GeoSOM to project the nodes

Hong,Seokhee

354

Flask: A Language for Data-driven Sensor Network Geoffrey Mainland, Matt Welsh, and Greg Morrisett  

E-Print Network (OSTI)

processing to reduce energy and radio bandwidth usage. As a result, application developers typically invest chains of operators into a dataflow graph that may reside on individual nodes or span multiple nodes in the network. To compose dataflow graphs across sensor nodes, Flask supports a lean, general

355

Sleeping on the Job: Energy-Efficient Broadcast for Radio Networks  

E-Print Network (OSTI)

We address the problem of minimizing power consumption when performing reliable broadcast on a radio network under the following popular model. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within distance r receive the message. In the broadcast problem, some node wants to successfully send a message to all other nodes in the network even when up to a 1/2 fraction of the nodes within every neighborhood can be deleted by an adversary. The set of deleted nodes is carefully chosen by the adversary to foil our algorithm and moreover, the set of deleted nodes may change periodically. This models worst-case behavior due to mobile nodes, static nodes losing power or simply some points in the grid being unoccupied. A trivial solution requires each node in the network to be awake roughly 1/2 the time, and a trivial lower bound shows that each node must be awake for at least a 1/n fraction of the time. Our first result is an algorithm that...

King, Valerie; Saia, Jared; Young, Maxwell

2007-01-01T23:59:59.000Z

356

NETWORK CODING-AWARE RATE CONTROL AND SCHEDULING IN WIRELESS NETWORKS  

E-Print Network (OSTI)

NETWORK CODING-AWARE RATE CONTROL AND SCHEDULING IN WIRELESS NETWORKS Hulya Seferoglu , Athina demonstrate that there is benefit from making rate control and scheduling aware of the underlying network conflicts between nodes, which should be taken into account both in rate control and in scheduling. We

Markopoulou, Athina

357

Cascading Failures in Power Grid under Three Node Attack Strategies  

Science Journals Connector (OSTI)

This paper studies cascading failures of power grid under three node attack strategies based on...k is k ? , and ?...is a tunable parameter. We investigated the...

Sui-Min Jia; Yun-Ye Wang; Cong Feng; Zhi-Juan Jia…

2014-01-01T23:59:59.000Z

358

Environmental sensor networks and continuous data quality assurance to manage salinity within a highly regulated river basin  

SciTech Connect

This paper describes a new approach to environmental decision support for salinity management in the San Joaquin Basin of California that focuses on web-based data sharing using YSI Econet technology and continuous data quality management using a novel software tool, Aquarius.

Quinn, N.W.T.; Ortega, R.; Holm, L.

2010-01-05T23:59:59.000Z

359

Flexible network wireless transceiver and flexible network telemetry transceiver  

DOE Patents (OSTI)

A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

Brown, Kenneth D. (Grain Valley, MO)

2008-08-05T23:59:59.000Z

360

Maximizing Network Lifetime Via 3G Gateway Assignment in Dual-Radio Sensor Networks  

E-Print Network (OSTI)

- ments, such as temperature, humidity, wind, solar radiation, etc. [3]. Sensor nodes are typically are no longer applicable. Rather, a third party network, e.g., FDDI, ISDN, or VPN, is to be leased

California at Berkeley, University of

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Computational Science Technical Note CSTN-119 Betweenness Centrality Metrics for Assessing Electrical Power Network  

E-Print Network (OSTI)

0 Computational Science Technical Note CSTN-119 Betweenness Centrality Metrics for Assessing. Hawick}, title = {Betweenness Centrality Metrics for Assessing Electrical Power Network Robustness Metrics for Assessing Electrical Power Network Robustness against Fragmentation and Node Failure K

Hawick, Ken

362

Constant Price of Anarchy in Network Creation Games via Public Service Advertising  

E-Print Network (OSTI)

Network creation games have been studied in many different settings recently. These games are motivated by social networks in which selfish agents want to construct a connection graph among themselves. Each node wants to ...

Demaine, Erik D.

363

Design and implementation of an integrated safety management system for compressed natural gas stations using ubiquitous sensor network  

Science Journals Connector (OSTI)

To increase awareness of safety in facilities where hazards may exist, operators, managers, and executive officers on the site should be able to monitor such facilities. However, most compressed natural gas (CNG)...

Jae Mo Yang; Byung Seok Ko; Chulhwan Park…

2014-03-01T23:59:59.000Z

364

Efficient Node Overlap Removal Using a Proximity Stress Model  

E-Print Network (OSTI)

Efficient Node Overlap Removal Using a Proximity Stress Model Emden R. Gansner and Yifan Hu AT the structural information inherent in a layout using little additional area. This paper presents a new node overlap removal algorithm that does well by these measures. 1 Introduction Most existing symmetric graph

Hu, Yifan

365

Bridge-Node Selection and Loss Recovery in Island Multicast  

E-Print Network (OSTI)

Bridge-Node Selection and Loss Recovery in Island Multicast W.-P. Ken Yiu K.-F. Simon Wong S.-H in their bridge-node selection. H multicast-capable domains (the so-called islands) while overlay connections are used to bridge islands

Chan, Shueng-Han Gary

366

The Small Motion at the Nodes of a Vibrating String  

Science Journals Connector (OSTI)

... IT is generally recognised that the nodes of a string which is maintained permanently in oscillation in two or more loops cannot be points of ... node is in a phase which is different from that of the rest of the string. The exact difference of phase is shown by a dynamical investigation to be a ...

C. V. RAMAN

1909-11-04T23:59:59.000Z

367

Surface-Reflection-Based Communication and Localization in Underwater Sensor Networks  

Science Journals Connector (OSTI)

Most communication and localization algorithms in underwater environments have been constrained by dependencies on the Line Of Sight (LOS), which is hard to guarantee due to the inherent node mobility. This constraint hinders node discovery and ad hoc ... Keywords: Localization, ad hoc networks, underwater sensor networks

Lloyd Emokpae, Mohamed Younis

2014-04-01T23:59:59.000Z

368

Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications -Dynamic Power-Conscious Routing Concepts  

E-Print Network (OSTI)

Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications - Dynamic Power networks MANETs for emer- gency telecommunication. A MANET is an autonomous collection of mobile nodes into mobile nodes. A MANET for emergency telecommunication may operate in a stand-alone manner or be connected

369

Centralized algorithms for maintaining connectivity in a mobile ad hoc network  

E-Print Network (OSTI)

This thesis focuses on the problem of maintaining connectivity in a mobile ad hoc network (MANET). In a connected MANET, communication is possible between any pair of nodes. The nodes in a mobile ad hoc network are constantly moving causing frequent...

Karwa, Tapan P.

2012-06-07T23:59:59.000Z

370

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network (OSTI)

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

371

Online communities in Poland: are e-commerce companies involved in creating and managing online social networks?  

Science Journals Connector (OSTI)

The challenges in the lifestyles, social and economical conversions, and technological developments lead the marketers to use modern marketing techniques. The way people used to communicate has completely been changed over the last decade. Nowadays, online social networks are one of the most powerful communication and information sharing systems worldwide. The authors put a thesis that the top e-commerce companies in Poland create and develop online communities with the intention of using them in marketing strategies. The paper presents the results of pilot study conducted on in Poland. The main purpose of this study is to contribute to the concept of online social networks as an alternative marketing technique. The following hypothesis will be tested: Hypothesis 1: top e-commerce companies in Poland involve online communities in their business; Hypothesis 2: the degree of e-commerce companies involvement in relations with online communities is not related with the business sector.

Aleksandra Grzesiuk; Ewa FrÄ?ckiewicz

2014-01-01T23:59:59.000Z

372

The CitiSense Air Quality Monitoring Mobile Sensor Node Piero Zappi, Elizabeth Bales, Jing Hong Park, William Griswold and Tajana Simuni Rosing  

E-Print Network (OSTI)

conditions than the national ambient air quality standard [1]. Current air pollutant measurement networks. For example, The San Diego Air Pollution Control District (SDAPCD) maintains only five air pollutant samplingThe CitiSense Air Quality Monitoring Mobile Sensor Node Piero Zappi, Elizabeth Bales, Jing Hong

Simunic, Tajana

373

Consort: NodeConsort: Node--constrainedconstrained Opportunistic Routing in WirelessOpportunistic Routing in Wireless  

E-Print Network (OSTI)

on Mobile Computing, 2003. K. W. Choi, W. S. Jeon, and D. G. Jeong, "Efficient Load-Aware Routing Scheme. Sankar and Z. Liu, "Maximum Lifetime Routing in Wireless Ad- hoc Networks," IEEE INFOCOM'04. P. P. Pham

Xue, Guoliang

374

Web-Interactive Integration of Regional Weather Networks for Risk Management of Late Blight in Potato Canopies  

E-Print Network (OSTI)

in Potato Canopies Kathleen M. Baker Department of Earth and Resource Science, University of Michigan of Late Blight in Potato Canopies Additional index words. Phytophthora infestans, automated weather stations, real time estimates Abstract: Management of late blight (Phytophthora infestans) of potato

Douches, David S.

375

E-Print Network 3.0 - adaptive peer-to-peer overlay Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

protocol in peer-to-peer networks... in wireless mesh networks, data management in both micro and macro sensor networks, ... Source: Shenoy, Prashant - Department of Computer...

376

Information mobility in complex networks  

Science Journals Connector (OSTI)

The concept of information mobility in complex networks is introduced on the basis of a stochastic process taking place in the network. The transition matrix for this process represents the probability that the information arising at a given node is transferred to a target one. We use the fractional powers of this transition matrix to investigate the stochastic process at fractional time intervals. The mobility coefficient is then introduced on the basis of the trace of these fractional powers of the stochastic matrix. The fractional time at which a network diffuses 50% of the information contained in its nodes (1/k50) is also introduced. We then show that the scale-free random networks display a better spread of information than the non-scale-free ones. We study 38 real-world networks and analyze their performance in spreading information from their nodes. We find that some real-world networks perform even better than the scale-free networks with the same average degree and we point out some of the structural parameters that make this possible.

Ernesto Estrada

2009-08-05T23:59:59.000Z

377

SIA: Secure information aggregation in sensor networks  

Science Journals Connector (OSTI)

In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication ... Keywords: Sensor networks, approximate interactive proofs, information aggregation, security

Haowen Chan; Adrian Perrig; Bartosz Przydatek; Dawn Song

2007-01-01T23:59:59.000Z

378

FUNDAMENTAL PERFORMANCE LIMITS OF WIRELESS SENSOR NETWORKS  

E-Print Network (OSTI)

on each of the sensors (e.g., solar energy sources), our analysis concludes that the maximum sustainable throughput in energy-constrained sensor networks scales worse than the capacity based on interference among. In this case, when the number of nodes is sufficiently high, the energy-constrained network capacity dominates

Li, Baochun

379

Cascade Control and Defense in Complex Networks  

Science Journals Connector (OSTI)

Complex networks with a heterogeneous distribution of loads may undergo a global cascade of overload failures when highly loaded nodes or edges are removed due to attacks or failures. Since a small attack or failure has the potential to trigger a global cascade, a fundamental question regards the possible strategies of defense to prevent the cascade from propagating through the entire network. Here we introduce and investigate a costless strategy of defense based on a selective further removal of nodes and edges, right after the initial attack or failure. This intentional removal of network elements is shown to drastically reduce the size of the cascade.

Adilson E. Motter

2004-08-26T23:59:59.000Z

380

Minimum-Hot-Spot Query Trees for Wireless Sensor Networks  

E-Print Network (OSTI)

an energy- efficient query routing tree. (a) Energy harvesting for battery- less nodes for the (b) Voltree to the querying node. Energy-efficient query routing trees are needed in a plethora of systems such as PeopleMinimum-Hot-Spot Query Trees for Wireless Sensor Networks Georgios Chatzimilioudis Dept

Zeinalipour, Demetris

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Computational Complexity of Relay Placement in Sensor Networks  

E-Print Network (OSTI)

-hoc network which will route data from sensor nodes towards a sink node · Energy consumption must be very low include environmental and weather monitoring; home automation; agriculture; tracking goods in commerce Problem (2) Example: problem instance = 0.0 maximise average = 0.5 = 1.0 maximise minimum (1

Suomela, Jukka

382

Scaling of load in communications networks Onuttom Narayan1  

E-Print Network (OSTI)

that the load at each node in a preferential attachment network scales as a power of the degree of the node power-law degree distributions as compared to the scaling of the load versus degree. This emphasizes that the probability distribution for the load scales as p(l) 1/l with = 2.2. Subsequently, data for net- works

California at Santa Cruz, University of

383

Achieving Congestion Diversity in Wireless Ad-hoc Networks  

E-Print Network (OSTI)

consisting of 12 802.11g nodes. This small test-bed enables an imperical comparison of CDP's performance is particularly acute in multi-hop networks, where nodes must relay each others packets. We present a congestion- varying distance metric that approximates the queue draining times along each path. Our proposed

Snoeren, Alex

384

ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

ESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer a long lifetime of the sensor network and the application it is important to save energy. A sensor node control (MAC) protocol for wireless sensor networks, called Energy Saving Token Ring Protocol (ESTR). ESTR

Ungerer, Theo

385

RFID Enabled Vehicular Network for Ubiquitous Travel Query  

Science Journals Connector (OSTI)

Fixed infrastructure based wireless network is very expensive to provide total coverage and offer ubiquitous communication capacity. RFID enabled Vehicular Network emerges as an alternative which can leverage mobile nodes to bridge the gap between information ... Keywords: Delay, Mobile Relay, Partially Connected, RFID, Vehicular Ad Hoc Network VANET

ZongWei Luo, Tianle Zhang, Chunlu Wang, Shuihua Han, Mengyuan Dong

2011-07-01T23:59:59.000Z

386

Snow Monitoring with Sensor Networks Thomas C. Henderson  

E-Print Network (OSTI)

having the ability to communicate, compute and sense the environment temperature, light intensity, pressure, and other properties. We have developed several distributed algorithms for such networks network [7], [8], [9], [10], [11]. We are developing a 50 to 100 node sensor network testbed

Henderson, Thomas C.

387

An Implicit Optimization Approach for Survivable Network Design  

E-Print Network (OSTI)

heavily on networked systems such as the electric power grid, water and gas distribution systems, com networks. For example, nodes can represent genera- tors, load points, and junctions in a power system capacities) even after the disruption of a subset of the network's arcs. Specifically, we consider the case

Pinar, Ali

388

Phenomenological models of socioeconomic network dynamics  

Science Journals Connector (OSTI)

We study a general set of models of social network evolution and dynamics. The models consist of both a dynamics on the network and evolution of the network. Links are formed preferentially between “similar” nodes, where the similarity is defined by the particular process taking place on the network. The interplay between the two processes produces phase transitions and hysteresis, as seen using numerical simulations for three specific processes. We obtain analytic results using mean-field approximations, and for a particular case we derive an exact solution for the network. In common with real-world social networks, we find coexistence of high and low connectivity phases and history dependence.

George C. M. A. Ehrhardt; Matteo Marsili; Fernando Vega-Redondo

2006-09-13T23:59:59.000Z

389

The Network  

NLE Websites -- All DOE Office Websites (Extended Search)

Network Engineering Services The Network Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network...

390

Data Management Group Annual Report  

E-Print Network (OSTI)

Data Management Group Annual Report 2002 prepared by: Data Management Group Joint Program......................................................................................... 9 2001 EMME/2 Road Network Inclusion of Links to CCDRS .................. 9 Road and Transit Management Group 2002 Annual Report i SUMMARY The Data Management Group (DMG), in cooperation

Toronto, University of

391

Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding  

E-Print Network (OSTI)

We propose a secure scheme for wireless network coding, called the algebraic watchdog. By enabling nodes to detect malicious behaviors probabilistically and use overheard messages to police their downstream neighbors ...

Kim, MinJi

392

Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks  

E-Print Network (OSTI)

The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

Hassanzadeh, Amin

2014-05-03T23:59:59.000Z

393

A Routing and Network Dimensioning Strategy to reduce ...  

E-Print Network (OSTI)

fibers and WDM systems must be considered in the wavelength assignment ... on the real contribution, we neither consider node costs nor protection in this ..... The test scenarios comprise a German, European, and US network defined in [1].

2007-02-12T23:59:59.000Z

394

Topology Design of Network-Coding-Based Multicast Networks  

E-Print Network (OSTI)

multicast transmissions can significantly reduce the overall topology cost as compared to conventional multicast applications will emerge in the near future. As many multicast services require the transmission communication [1]. In existing networks, each node either forwards packets directly (in unicast transmissions

Guo, Minyi

395

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bioadhesive Alliance Bioadhesive Alliance North Carolina A&T State University 1322 likes Bioadhesive Alliance Inc. is a developer and manufacturer of "PiGrid", bio-based adhesive that is green, low cost, and durable and can be utilized as a substitute to petroleum-based asphalt binder. Learn More Bearing Analytics Purdue University 355 likes Bearing Analytics is a leading-edge equipment monitoring company aimed at pioneering a new era in industrial bearing condition monitoring. Our objective is to consolidate the needs of customers, environment, and manufacturers to improve asset management and energy efficiency capabilities one bearing at a time. Learn More Inviroment Brigham Young University 300 likes PlasTek(tm) is patent-pending technology created by Inviroment(tm) that

396

SiNode Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bearing Analytics Bearing Analytics Purdue University 355 likes Bearing Analytics is a leading-edge equipment monitoring company aimed at pioneering a new era in industrial bearing condition monitoring. Our objective is to consolidate the needs of customers, environment, and manufacturers to improve asset management and energy efficiency capabilities one bearing at a time. Learn More Bioadhesive Alliance North Carolina A&T State University 1322 likes Bioadhesive Alliance Inc. is a developer and manufacturer of "PiGrid", bio-based adhesive that is green, low cost, and durable and can be utilized as a substitute to petroleum-based asphalt binder. Learn More Inviroment Brigham Young University 300 likes PlasTek(tm) is patent-pending technology created by Inviroment(tm) that

397

An Autonomy Oriented Computing (AOC) Approach to Distributed Network Community Mining  

Science Journals Connector (OSTI)

A network community is a special sub-network that contains a group of nodes sharing similar linked patterns. A distributed network community mining problem (D-NCMP) is concerned with finding all such communities from a distributed network. A variety ...

Bo Yang; Jiming Liu

2007-07-01T23:59:59.000Z

398

Strategic Energy Management  

Energy.gov (U.S. Department of Energy (DOE))

The U.S. Department of Energy (DOE) See Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

399

PARAMETERIZED NEIGHBORHOODBASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Munawar, Sagar Naik, Paul A.S. Ward  

E-Print Network (OSTI)

PARAMETERIZED NEIGHBORHOOD­BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Flooding is a simple routing technique that can be used to transmit data from one node to every other node in a network. The focus of this paper is to investigate im­ provements to flooding techniques used in ad hoc

Ward, Paul A.S.

400

Decision Support and Risk Management  

E-Print Network (OSTI)

of a restoration model ­ for the repair of a ruptured natural gas pipeline. The nodes represent events (dots sets of steps required to accomplish a goal, such as repairing a ruptured natural gas pipeline, whenDecision Support and Risk Management Restore©: Modeling Interdependent Repair/Restoration Processes

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Mobile Robot Coordination and navigation with directional antennas in positionless Wireless Sensor Networks  

Science Journals Connector (OSTI)

Three schemes are proposed to coordinate and navigate mobile robots with directional antennas in a positionless wireless sensor network for the purpose of emergency rescue. The k-farthest-node forwarding scheme is for Waiting-for-Rescue (WFR) nodes to broadcast packets to ask mobile robots to come to help. The Mobile Robot Coordination (MRC) is to coordinate multiple mobile robots so that each WFR node is associated one nearby mobile node which is navigated by the Tree Assisted Navigation (TAN) scheme to fast reach the WFR node. The schemes' effectiveness is verified by the ns-2 simulator.

Jehn-Ruey Jiang; Yung-Liang Lai; Fu-Cheng Deng

2011-01-01T23:59:59.000Z

402

Implementing a green bicycle alliance using a wireless sensor network  

Science Journals Connector (OSTI)

This study used the wireless sensor network (WSN) technique to design a bike device module, a bike path establishment module and a cloud service module. These three modules were used to address issues related to cycling activities, including green power supply, activity and health records, trajectory monitoring and group positioning and immediate safety issues. GPS was not required, and as long as the cyclists remained on the paths provided by the bike path establishment module and used the cloud service module, the previously mentioned issues could be addressed. The cloud service module included a path establishment simulation system that could enable a path manager to simulate paths before they were physically provided, to determine the ideal establishment method for providing wireless sensor nodes. This study use the Danshui Golden Waterfront in northern Taiwan to implement on-site establishment and installation.

Haw-Yun Shin; Chung-Ming Own

2014-01-01T23:59:59.000Z

403

Spectrum hole identification and exploitation in cognitive radio networks.  

E-Print Network (OSTI)

??Cognitive radio networks are envisaged as the solution for effective spectrum management for the future communications. In a cognitive radio network, the unlicensed users are… (more)

Vamsi Krishna Tumuluru.

2011-01-01T23:59:59.000Z

404

Exploring Hardware Support For Scaling Irregular Applications on Multi-node Multi-core Architectures  

SciTech Connect

With the recent emergence of large-scale knowledge dis- covery, data mining and social network analysis, irregular applications have gained renewed interest. Classic cache-based high-performance architectures do not provide optimal performances with such kind of workloads, mainly due to the very low spatial and temporal locality of the irregular control and memory access patterns. In this paper, we present a multi-node, multi-core, fine-grained multi-threaded shared-memory system architecture specifically designed for the execution of large-scale irregular applications, and built on top of three pillars, that we believe are fundamental to support these workloads. First, we offer transparent hardware support for Partitioned Global Address Space (PGAS) to provide a large globally-shared address space with no software library overhead. Second, we employ multi-threaded multi-core processing nodes to achieve the necessary latency tolerance required by accessing global memory, which potentially resides in a remote node. Finally, we devise hardware support for inter-thread synchronization on the whole global address space. We first model the performances by using an analytical model that takes into account the main architecture and application characteristics. We describe the hardware design of the proposed cus- tom architectural building blocks that provide support for the above- mentioned three pillars. Finally, we present a limited-scale evaluation of the system on a multi-board FPGA prototype with typical irregular kernels and benchmarks. The experimental evaluation demonstrates the architecture performance scalability for different configurations of the whole system.

Secchi, Simone; Ceriani, Marco; Tumeo, Antonino; Villa, Oreste; Palermo, Gianluca; Raffo, Luigi

2013-06-05T23:59:59.000Z

405

A Framework for Misuse Detection in Ad Hoc Networks--Part I  

E-Print Network (OSTI)

, resource management, site security monitoring. I. INTRODUCTION Ad hoc networks provide the only means

Sarkar, Saswati

406

Networks, smart grids: new model for synchronization  

NLE Websites -- All DOE Office Websites (Extended Search)

Stories » Stories » Networks, smart grids: new model for synchronization Networks, smart grids: new model for synchronization Researchers developed a surprisingly simple mathematical model that accurately predicts synchronization as a function of the parameters and the topology of the underlying network. May 21, 2013 High voltage transmission lines carry electrical power. High voltage transmission lines carry electrical power. The researchers envision that their method could be applied to assess synchronization and robustness quickly in electrical grids under volatile operating conditions. Networks of individual oscillating nodes often spontaneously synchronize and begin to oscillate at a coherent frequency. From heart cells to flashing fireflies to electric power grids, coupled oscillator networks are

407

Management Plan Management Plan  

E-Print Network (OSTI)

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

408

Performing an allreduce operation on a plurality of compute nodes of a parallel computer  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer, each node including at least two processing cores, that include: performing, for each node, a local reduction operation using allreduce contribution data for the cores of that node, yielding, for each node, a local reduction result for one or more representative cores for that node; establishing one or more logical rings among the nodes, each logical ring including only one of the representative cores from each node; performing, for each logical ring, a global allreduce operation using the local reduction result for the representative cores included in that logical ring, yielding a global allreduce result for each representative core included in that logical ring; and performing, for each node, a local broadcast operation using the global allreduce results for each representative core on that node.

Faraj, Ahmad

2013-02-12T23:59:59.000Z

409

Performing an allreduce operation on a plurality of compute nodes of a parallel computer  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer, each node including at least two processing cores, that include: establishing, for each node, a plurality of logical rings, each ring including a different set of at least one core on that node, each ring including the cores on at least two of the nodes; iteratively for each node: assigning each core of that node to one of the rings established for that node to which the core has not previously been assigned, and performing, for each ring for that node, a global allreduce operation using contribution data for the cores assigned to that ring or any global allreduce results from previous global allreduce operations, yielding current global allreduce results for each core; and performing, for each node, a local allreduce operation using the global allreduce results.

Faraj, Ahmad

2013-07-09T23:59:59.000Z

410

Microfluidic ultrasonic particle separators with engineered node locations and geometries  

DOE Patents (OSTI)

An ultrasonic microfluidic system includes a separation channel for conveying a sample fluid containing small particles and large particles, flowing substantially parallel, adjacent to a recovery fluid, with which it is in contact. An acoustic transducer produces an ultrasound standing wave, that generates a pressure field having at least one node of minimum pressure amplitude. An acoustic extension structure is located proximate to said separation channel for positioning said acoustic node off center in said acoustic area and concentrating the large particles in said recovery fluid stream.

Rose, Klint A; Fisher, Karl A; Wajda, Douglas A; Mariella, Jr., Raymond P; Bailey, Christoppher; Dehlinger, Dietrich; Shusteff, Maxim; Jung, Byoungsok; Ness, Kevin D

2014-05-20T23:59:59.000Z

411

The Cost of Attack in Competing Networks  

E-Print Network (OSTI)

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

412

Complex network synchronization of chaotic systems with delay coupling  

SciTech Connect

The study of complex networks enables us to understand the collective behavior of the interconnected elements and provides vast real time applications from biology to laser dynamics. In this paper, synchronization of complex network of chaotic systems has been studied. Every identical node in the complex network is assumed to be in Lur’e system form. In particular, delayed coupling has been assumed along with identical sector bounded nonlinear systems which are interconnected over network topology.

Theesar, S. Jeeva Sathya, E-mail: sjstheesar@gmail.com; Ratnavelu, K., E-mail: sjstheesar@gmail.com [Network Science Research Group, Institute of Mathematical Sciences, University of Malaya, 50603, Kuala Lumpur (Malaysia)

2014-03-05T23:59:59.000Z

413

Flow Distances on Open Flow Networks  

E-Print Network (OSTI)

Open flow network is a weighted directed graph with a source and a sink, depicting flux distributions on networks in the steady state of an open flow system. Energetic food webs, economic input-output networks, and international trade networks, are open flow network models of energy flows between species, money or value flows between industrial sectors, and goods flows between countries, respectively. Flow distances (first-passage or total) between any given two nodes $i$ and $j$ are defined as the average number of transition steps of a random walker along the network from $i$ to $j$ under some conditions. They apparently deviate from the conventional random walk distance on a closed directed graph because they consider the openness of the flow network. Flow distances are explicitly expressed by underlying Markov matrix of a flow system in this paper. With this novel theoretical conception, we can visualize open flow networks, calculating centrality of each node, and clustering nodes into groups. We apply fl...

Guo, Liangzhu; Shi, Peiteng; Wang, Jun; Huang, Xiaohan; Zhang, Jiang

2015-01-01T23:59:59.000Z

414

Robustness of airline alliance route networks  

Science Journals Connector (OSTI)

Abstract The aim of this study is to analyze the robustness of the three major airline alliances’ (i.e., Star Alliance, oneworld and SkyTeam) route networks. Firstly, the normalization of a multi-scale measure of vulnerability is proposed in order to perform the analysis in networks with different sizes, i.e., number of nodes. An alternative node selection criterion is also proposed in order to study robustness and vulnerability of such complex networks, based on network efficiency. And lastly, a new procedure – the inverted adaptive strategy – is presented to sort the nodes in order to anticipate network breakdown. Finally, the robustness of the three alliance networks are analyzed with (1) a normalized multi-scale measure of vulnerability, (2) an adaptive strategy based on four different criteria and (3) an inverted adaptive strategy based on the efficiency criterion. The results show that Star Alliance has the most resilient route network, followed by SkyTeam and then oneworld. It was also shown that the inverted adaptive strategy based on the efficiency criterion – inverted efficiency – shows a great success in quickly breaking networks similar to that found with betweenness criterion but with even better results.

Oriol Lordan; Jose M. Sallan; Pep Simo; David Gonzalez-Prieto

2015-01-01T23:59:59.000Z

415

Network Connections  

NLE Websites -- All DOE Office Websites (Extended Search)

Connecting to NERSC Using X Windows Connecting to NERSC with NX Transferring Data Network Performance Queues and Scheduling Job Logs & Analytics Training & Tutorials Software Accounts & Allocations Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 Home » For Users » Network Connections Network Connections NERSC's resources can be accessed using SSH and related tools, grid tools, and via the web. This section explains how to connect to NERSC

416

Efficient RC Power Grid Verification Using Node Elimination  

E-Print Network (OSTI)

Efficient RC Power Grid Verification Using Node Elimination Ankit Goyal Department of ECE to reduce the size of power grids but their fo- cus is more on simulation. In verification, we are concerned. This paper pro- poses a novel approach to systematically reduce the power grid and accurately compute

Najm, Farid N.

417

Power Grid Verification Using Node and Branch Nahi Abdul Ghani  

E-Print Network (OSTI)

Power Grid Verification Using Node and Branch Dominance Nahi Abdul Ghani ECE Department University Toronto, Ontario, Canada f.najm@utoronto.ca ABSTRACT The verification of power grids in modern integrated, Verification Keywords Power grid, voltage drop, dominance 1. INTRODUCTION The rising demand for low

Najm, Farid N.

418

Identifying Proxy Nodes in a Tor Anonymization Circuit Sambuddho Chakravarty  

E-Print Network (OSTI)

agnostic Onion Routing scheme [11] to anonymize the traffic. The strength of the scheme is the use is vulnerable to traffic analysis at- tacks. These attacks can expose the identity of a Tor client or of the proxy nodes used in an anonymous Tor circuit when an adversary can manipulate the traffic entering

Yang, Junfeng

419

Tamanoir : Gbit software programmable node Echidna : Distributed Active Traffic generator  

E-Print Network (OSTI)

to support Grid infrastructure Laurent Lefèvre, Saâd El Hadri, Jean-Patrick Gelas Laurent resources deployed around VTHD backbone. Full view of active deployed resources · Hybrid P2P architecture service. · Tamanoir nodes are deployed around VTHD backbone to support Grid applications in RNTL Etoile

Gelas, Jean-Patrick

420

Design Considerations for Ultra-Low Energy Wireless Microsensor Nodes  

E-Print Network (OSTI)

. The most familiar sources of ambient energy include solar power, thermal gradients, radio-frequency (RF to retain local energy storage. Coupling energy- harvesting techniques with some form of energy storage canDesign Considerations for Ultra-Low Energy Wireless Microsensor Nodes Benton H. Calhoun, Student

Chandrakasan, Anantha

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

INTRODUCTION Hensen's node, the amniote equivalent of the amphibian  

E-Print Network (OSTI)

INTRODUCTION Hensen's node, the amniote equivalent of the amphibian `Spemann's organizer', is generally considered to be the most important region of the very early, gastrulating embryo. Not only does- sible for inducing and patterning the whole of the central nervous system. Like its amphibian

Stern, Claudio

422

On the degree distribution of the nodes in increasing trees  

Science Journals Connector (OSTI)

Simple families of increasing trees can be constructed from simply generated tree families, if one considers for every tree of size n all its increasing labellings, i.e., labellings of the nodes by distinct integers of the set {1,...,n} in such a way ... Keywords: Degree distribution, Increasing trees, Limiting distribution

Markus Kuba; Alois Panholzer

2007-05-01T23:59:59.000Z

423

AN ENERGY BENCHMARK FOR SOFTWARE UPDATES ON WIRELESS SENSOR NODES  

E-Print Network (OSTI)

AN ENERGY BENCHMARK FOR SOFTWARE UPDATES ON WIRELESS SENSOR NODES S. Brown*, C.J. Sreenan *Dept, Modelling, Energy, Benchmark. Abstract Energy consumption is arguably the key factor in the design not consume a significant fraction of a WSN's energy reserve; also, the required consumption must be known

Sreenan, Cormac J.

424

An Operating System for a Time-Predictable Computing Node  

E-Print Network (OSTI)

An Operating System for a Time-Predictable Computing Node Guenter Khyo, Peter Puschner, and Martin control structures generated before runtime can as well be used within the operating system of an embedded real-time system. In this way we make not only task timing but also the timing of the operating system

425

PARAMETERIZED NEIGHBORHOOD-BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Munawar, Sagar Naik, Paul A.S. Ward  

E-Print Network (OSTI)

PARAMETERIZED NEIGHBORHOOD-BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Flooding is a simple routing technique that can be used to transmit data from one node to every other node in a network. The focus of this paper is to investigate im- provements to flooding techniques used in ad hoc

Ward, Paul A.S.

426

Transatlantic Cooperation In Managing The World Trading System: New EU-U.S. Arrangements To Strengthen Liberal Multilateralism  

E-Print Network (OSTI)

Transatlantic Cooperation In Managing The World TradingLondon, and The Transatlantic Policy Network, Brussels.

Steinberg, Richard H.

1995-01-01T23:59:59.000Z

427

Network Operating Systems Partha Dasgupta  

E-Print Network (OSTI)

Network Operating Systems Partha Dasgupta Department of Computer Science and Engineering Arizona of Electrical Engineering] 1. Introduction Network Operating Systems extend the facilities and services provided by computer operating systems to support a set of computers, connected by a network. The environment managed

Dasgupta, Partha

428

Implementing asyncronous collective operations in a multi-node processing system  

DOE Patents (OSTI)

A method, system, and computer program product are disclosed for implementing an asynchronous collective operation in a multi-node data processing system. In one embodiment, the method comprises sending data to a plurality of nodes in the data processing system, broadcasting a remote get to the plurality of nodes, and using this remote get to implement asynchronous collective operations on the data by the plurality of nodes. In one embodiment, each of the nodes performs only one task in the asynchronous operations, and each nodes sets up a base address table with an entry for a base address of a memory buffer associated with said each node. In another embodiment, each of the nodes performs a plurality of tasks in said collective operations, and each task of each node sets up a base address table with an entry for a base address of a memory buffer associated with the task.

Chen, Dong; Eisley, Noel A.; Heidelberger, Philip; Kumar, Sameer; Salapura, Valentina; Steinmacher-Burow, Burkhard

2014-07-08T23:59:59.000Z

429

Reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application that include: beginning, by each compute node, performance of a blocking operation specified by the parallel application, each compute node beginning the blocking operation asynchronously with respect to the other compute nodes; reducing, for each compute node, power to one or more hardware components of that compute node in response to that compute node beginning the performance of the blocking operation; and restoring, for each compute node, the power to the hardware components having power reduced in response to all of the compute nodes beginning the performance of the blocking operation.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda A. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-01-10T23:59:59.000Z

430

Reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application that include: beginning, by each compute node, performance of a blocking operation specified by the parallel application, each compute node beginning the blocking operation asynchronously with respect to the other compute nodes; reducing, for each compute node, power to one or more hardware components of that compute node in response to that compute node beginning the performance of the blocking operation; and restoring, for each compute node, the power to the hardware components having power reduced in response to all of the compute nodes beginning the performance of the blocking operation.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda E. (Cambridge, MA); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-04-17T23:59:59.000Z

431

Data Gathering in Networks of Bacteria Colonies: Collective Sensing and Relaying Using Molecular Communication  

E-Print Network (OSTI)

The prospect of new biological and industrial applications that require communication in micro-scale, encourages research on the design of bio-compatible communication networks using networking primitives already available in nature. One of the most promising candidates for constructing such networks is to adapt and engineer specific types of bacteria that are capable of sensing, actuation, and above all, communication with each other. In this paper, we describe a new architecture for networks of bacteria to form a data collecting network, as in traditional sensor networks. The key to this architecture is the fact that the node in the network itself is a bacterial colony; as an individual bacterium (biological agent) is a tiny unreliable element with limited capabilities. We describe such a network under two different scenarios. We study the data gathering (sensing and multihop communication) scenario as in sensor networks followed by the consensus problem in a multi-node network. We will explain as to how th...

Einolghozati, Arash; Beirami, Ahmad; Fekri, Faramarz

2012-01-01T23:59:59.000Z

432

Query Processing in Mobile Sensor Networks Wang-Chien Lee  

E-Print Network (OSTI)

, a sensor network for air pollution test, where all sensors are scattered in the air and transported to collect the data from the sensors about air pollution and traffic conditions. In comparison, vehicles, animals, air, and water). With self-propelling sensor nodes, a mobile sensor network is self

Giles, C. Lee

433

A Realistic Power Consumption Model for Wireless Sensor Network Devices  

E-Print Network (OSTI)

1 A Realistic Power Consumption Model for Wireless Sensor Network Devices Qin Wang, Mark Hempstead}@eecs.harvard.edu Abstract-- A realistic power consumption model of wireless communication subsystems typically used in many sensor network node devices is presented. Simple power consumption models for major components

Hempstead, Mark

434

Distributed Symmetric Function Computation in Noisy Wireless Sensor Networks  

E-Print Network (OSTI)

is to cooperatively provide information to this fusion center so it can compute some function of the sensor. The network has a special node called the fusion center whose goal is to compute a symmetric function of these measurements. The problem studied is to minimize the total transmission energy used by the network when

Srikant, Rayadurgam

435

Efficient Asynchronous Low Power Listening for Wireless Sensor Networks  

E-Print Network (OSTI)

Efficient Asynchronous Low Power Listening for Wireless Sensor Networks Rajesh Krishna Panta, James mechanism to reduce energy consumption of sensor devices and to increase the lifetime of the network. A side during idle listening--the time period for which the radio transceiver of a sensor node is awake

Fisher, Kathleen

436

Energy Efficient Broadcast Routing in Static Ad Hoc Wireless Networks  

E-Print Network (OSTI)

such that the energy cost of the broadcast tree is minimized. Each node in the network is assumed to have a fixed level a broadcast tree such that the energy cost of the broadcast tree is minimized. We first prove that the problemEnergy Efficient Broadcast Routing in Static Ad Hoc Wireless Networks Deying Li, Xiaohua Jia

Jia, Xiaohua

437

Efficient searching and annotation of metabolic networks using chemical similarity  

Science Journals Connector (OSTI)

......report a Byers-Waterman type pathway search algorithm for further paring down pertinent networks. Results: Benchmarking tests run with SimIndex show it can reduce the number of nodes visited in searching a putative network by 100-fold with a computational......

Dante A. Pertusi; Andrew E. Stine; Linda J. Broadbelt; Keith E.J. Tyo

2014-11-01T23:59:59.000Z

438

Deployment Alternatives for Performance Debugging in Wireless Sensor Networks  

E-Print Network (OSTI)

of accuracy in the available representation of network status. As well as the energy saving associated with , both bandwidth and energy are at a premium. The common performance monitoring approach of frequently in the network. Carrying out this analysis on the node's themselves rather than at the sink allows us to reduce

Sreenan, Cormac J.

439

A Scalable Interconnection Network Architecture for Petaflops Computing  

Science Journals Connector (OSTI)

Extrapolating technology advances in the near future, a computer architecture capable of petaflops performance will likely be based on a collection of processing nodes interconnected by a high-performance network. One possible organization would consist ... Keywords: computer architecture, interconnection networks, performance analysis, petaflops computing

Constantine Katsinis; Bahram Nabet

2004-02-01T23:59:59.000Z

440

Network Economics Anna Nagurney  

E-Print Network (OSTI)

and Operations Management Isenberg School of Management University of Massachusetts Amherst, Massachusetts 01003 Handbook of Computational Econometrics David Belsley and Erricos Kontoghiorghes, Editors, John Wiley & Sons, network theory has developed into a powerful and dynamic mechanism for abstracting complex problems, which

Nagurney, Anna

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Coverage-Based Information Retrieval for Lifetime Maximization in Sensor Networks  

E-Print Network (OSTI)

the maximum number of sets of sensor nodes that cover the whole monitored area. Each sensor node is associated constrained coverage problem and proposal a scheduling algorithm based on a greedy approach. In the proposed algorithm, we consider the impact of both the network geometry and the energy consumption by sensors

Islam, M. Saif

442

An Optimal Energy Allocation Algorithm for Energy Harvesting Wireless Sensor Networks  

E-Print Network (OSTI)

. Traditionally, a sensor node is mainly powered by a non-rechargeable battery, which has a limited energy storage by enabling the wireless sensor nodes to replenish energy from ambient sources, such as solar, windAn Optimal Energy Allocation Algorithm for Energy Harvesting Wireless Sensor Networks Shaobo Mao

Wong, Vincent

443

Localized Low-Weight Graph and Its Applications in Wireless Ad Hoc Networks  

E-Print Network (OSTI)

with O(log n) bits) and small computation cost, where n is the number of wireless nodes. Test results through multi- hop wireless links by using intermediate nodes to relay the message. Consequently, each if the Euclidean distance uv is less than one unit. Wireless ad hoc networks require special treatment

444

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks  

E-Print Network (OSTI)

nodes are anchored to the bottom of the ocean and deployed for long periods of time. Each sensor node reconstructs the map of the physical field. Bandwidth and battery power are severely limited in underwater [3][4]. Authors in [5] are the first to introduce the application of compressed sensing in networks

Hochberg, Michael

445

Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor Networks  

E-Print Network (OSTI)

that BiSNET allows sensor nodes to autonomously adapt their duty cycle intervals for power efficiency. Introduction Multi-modal wireless sensor networks (MWSNs) face several challenges1 . The first challenge is autonomy. Since sensor nodes can be deployed in an unattended area (e.g., forest and ocean) or physically

Suzuki, Jun

446

Communities in Networks Mason A. Porter, Jukka-Pekka Onnela, and Peter J. Mucha  

E-Print Network (OSTI)

take a collection of interacting agents, such as the nodes of a network, with some set of micro- scopicCommunities in Networks Mason A. Porter, Jukka-Pekka Onnela, and Peter J. Mucha Introduction: Networks and Communities "But although, as a matter of history, statistical mechanics owes its origin

McIntosh, Ian

447

Application of Artificial Neural Network for Estimating Tight Gas Sand Intrinsic Permeability  

Science Journals Connector (OSTI)

Application of Artificial Neural Network for Estimating Tight Gas Sand Intrinsic Permeability ... This jth neuron occupies a general position in the network since it accepts inputs from nodes in the input layer and sends its output to neurons to the second hidden layer. ... (15)?Veelenturf, L. P. J. Analysis and Applications of Artificial Neural Networks; Prentice Hall:? London, 1995. ...

Ali A. Garrouch; Nejib Smaoui

1996-09-19T23:59:59.000Z

448

A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks  

E-Print Network (OSTI)

A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks Ping Wang, Member, IEEE, Hai Jiang, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract--In wireless ad hoc networks information exchanges among the nodes. Index Terms--Wireless ad hoc networks, medium access control, fairness

Jiang, Hai

449

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks  

E-Print Network (OSTI)

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Yih-Chun Hu a University, Houston, TX 77005, USA Abstract An ad hoc network is a collection of wireless computers (nodes stations or access points. Although many previous ad hoc network routing protocols have been based in part

Ramkumar, Mahalingam

450

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks  

E-Print Network (OSTI)

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong which can provide mobile nodes in IPv6 mobile ad hoc network with secure name-to-address resolution and service discovery. Because mobile ad hoc network has dynamic topology, the current DNS is inappropriate

Jeong, Jaehoon "Paul"

451

A spatial statistics approach to characterizing and modeling the structure of cognitive wireless networks  

Science Journals Connector (OSTI)

The performance of cognitive wireless networks (CWNs) depends heavily on their spatial structure. However, highly simplified models are still routinely used for performance evaluation of CWNs and other wireless networks, with node locations often being ... Keywords: Cognitive wireless networks, Point processes, Spatial statistics, Stochastic geometry

Janne Riihijärvi; Petri Mähönen

2012-07-01T23:59:59.000Z

452

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks  

E-Print Network (OSTI)

that the network field is covered by these nodes at the desired ratio while the usage of the energy by the sensorThe Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks problems in wireless sensor networks. To reduce the energy consumption that arises when the high number

Varela, Carlos

453

Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks  

E-Print Network (OSTI)

Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks,whitehouse}@cs.virginia.edu Abstract--We present the Flash flooding protocol for rapid network flooding in wireless sensor networks. Traditional flooding protocols can be very slow because of neighborhood contention: nodes cannot propagate

Whitehouse, Kamin

454

The exact evaluation of the corner-to-corner resistance of an M N resistor network  

E-Print Network (OSTI)

, U.S.A. PACS numbers: 01.55+b, 02.10.Yn Key words: resistance, electrical networks, asymptotics of electric circuits is the computation of the resistance between two nodes in a resistor network. FormulatedThe exact evaluation of the corner-to-corner resistance of an M Ă? N resistor network: Asymptotic

455

Synchronous Ultra-Wide Band Wireless Sensors Networks for oil and gas exploration  

E-Print Network (OSTI)

Synchronous Ultra-Wide Band Wireless Sensors Networks for oil and gas exploration Stefano Savazzi1 of new oil and gas reservoir. Seismic exploration requires a large number (500 Ă· 2000 nodes, MAC and network layer to develop wireless sensors networks tailored for oil (and gas) exploration

Savazzi, Stefano

456

B.2.Creating a network Using the icons in the Topology Configuration window to create a network  

E-Print Network (OSTI)

47 B.2.Creating a network Using the icons in the Topology Configuration window to create a network topology. =========== Step 1) create a node Select an icon (e.g., RFG) by clicking on it in the Topology Configuration window. Now move the pointer to the Topology window, the pointer will become the selected icon

457

New Technique for Proposing Network's Topology using GPS and GIS  

E-Print Network (OSTI)

The problem of proposed topology for network comes when using Prim's algorithm with default distance (unrealistic distances) between network's nodes and don't care about the lakes, high hills, buildings, etc. This problem will cause incorrect estimations for cost (budget) of requirements like the media (optic fibre) and the number or type of Access-points, regenerator, Optic Amplifier, etc. This paper proposed a new technique of implementing Prim's algorithm to obtain realistic topology using realistic distances between network's nodes via Global Positioning System GPS and Geographic Information Systems GIS packages. Applying the new technique on academic institutes network of Erbil city from view of media (optic fibre) shows that there is disability in cost (budget) of the media which is needed (nearly) 4 times if implement default Prim's algorithm (don't using GPS & GIS) base on unrealistic distances between the nodes.

Ismaeel, Ayad Ghany

2012-01-01T23:59:59.000Z

458

Method and apparatus for obtaining stack traceback data for multiple computing nodes of a massively parallel computer system  

DOE Patents (OSTI)

A data collector for a massively parallel computer system obtains call-return stack traceback data for multiple nodes by retrieving partial call-return stack traceback data from each node, grouping the nodes in subsets according to the partial traceback data, and obtaining further call-return stack traceback data from a representative node or nodes of each subset. Preferably, the partial data is a respective instruction address from each node, nodes having identical instruction address being grouped together in the same subset. Preferably, a single node of each subset is chosen and full stack traceback data is retrieved from the call-return stack within the chosen node.

Gooding, Thomas Michael (Rochester, MN); McCarthy, Patrick Joseph (Rochester, MN)

2010-03-02T23:59:59.000Z

459

Network Maps  

NLE Websites -- All DOE Office Websites (Extended Search)

Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Network R&D Overview Experimental Network Testbeds Performance (perfSONAR) Software & Tools...

460

Scaling of load in communications networks  

Science Journals Connector (OSTI)

We show that the load at each node in a preferential attachment network scales as a power of the degree of the node. For a network whose degree distribution is p(k)?k??, we show that the load is l(k)?k? with ?=??1, implying that the probability distribution for the load is p(l)?1/l2 independent of ?. The results are obtained through scaling arguments supported by finite size scaling studies. They contradict earlier claims, but are in agreement with the exact solution for the special case of tree graphs. Results are also presented for real communications networks at the IP layer, using the latest available data. Our analysis of the data shows relatively poor power-law degree distributions as compared to the scaling of the load versus degree. This emphasizes the importance of the load in network analysis.

Onuttom Narayan and Iraj Saniee

2010-09-02T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor  

NLE Websites -- All DOE Office Websites (Extended Search)

Wireless Sensor Networks for Data Centers to someone by E-mail Wireless Sensor Networks for Data Centers to someone by E-mail Share Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Facebook Tweet about Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Twitter Bookmark Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Google Bookmark Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Delicious Rank Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on Digg Find More places to share Federal Energy Management Program: FEMP Technology Brief: Wireless Sensor Networks for Data Centers on

462

Hospitality Management Hospitality Management  

E-Print Network (OSTI)

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

463

Place-Based Attributes Predict Community Membership in a Mobile Phone Communication Network  

E-Print Network (OSTI)

Social networks can be organized into communities of closely connected nodes, a property known as modularity. Because diseases, information, and behaviors spread faster within communities than between communities, understanding ...

Eagle, Nathan N.

464

Robust Distributed Routing in Dynamical Networks - Part II: Strong Resilience, Equilibrium Selection and Cascaded Failures  

E-Print Network (OSTI)

Strong resilience properties of dynamical networks are analyzed for distributed routing policies. The latter are characterized by the property that the way the outflow at a non-destination node gets split among its outgoing ...

Como, Giacomo

465

A Network Layer Protocol for UANs to Address Propagation Delay Induced Performance Limitations*  

E-Print Network (OSTI)

network nodes and presents some of the preliminary simulation findings regarding the viability by several key characteristics of the shallow water channel. Many of these issues are adequately addressed technologies. These include selective frequency absorption, temporal spreading, Doppler induced frequency

Xie, Geoffrey

466

Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems  

E-Print Network (OSTI)

networks: tuning density to trade operational quality against lifetime; using multi- ple sensor modalities, water, soil, chemistry); condition based maintenance; smart spaces; military surveillance; preci- sion or urban locations). The above requirements impose substantial physical constraints at both the node

Heidemann, John

467

E-Print Network 3.0 - added transportation capacity Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department... As node density D , transport capacity converges to zero at rate O(1D)...

468

Detecting dense communities in large social and information networks with the Core & Peel algorithm  

E-Print Network (OSTI)

Detecting and characterizing dense subgraphs (tight communities) in social and information networks is an important exploratory tool in social network analysis. Several approaches have been proposed that either (i) partition the whole network into clusters, even in low density region, or (ii) are aimed at finding a single densest community (and need to be iterated to find the next one). As social networks grow larger both approaches (i) and (ii) result in algorithms too slow to be practical, in particular when speed in analyzing the data is required. In this paper we propose an approach that aims at balancing efficiency of computation and expressiveness and manageability of the output community representation. We define the notion of a partial dense cover (PDC) of a graph. Intuitively a PDC of a graph is a collection of sets of nodes that (a) each set forms a disjoint dense induced subgraphs and (b) its removal leaves the residual graph without dense regions. Exact computation of PDC is an NP-complete problem...

Pellegrini, Marco; Baglioni, Miriam

2012-01-01T23:59:59.000Z

469

Partitioning networks into communities by message passing  

Science Journals Connector (OSTI)

Community structures are found to exist ubiquitously in a number of systems conveniently represented as complex networks. Partitioning networks into communities is thus important and crucial to both capture and simplify these systems’ complexity. The prevalent and standard approach to meet this goal is related to the maximization of a quality function, modularity, which measures the goodness of a partition of a network into communities. However, it has recently been found that modularity maximization suffers from a resolution limit, which prevents its effectiveness and range of applications. Even when neglecting the resolution limit, methods designed for detecting communities in undirected networks cannot always be easily extended, and even less directly applied, to directed networks (for which specifically designed community detection methods are very limited). Furthermore, real-world networks are frequently found to possess hierarchical structure and the problem of revealing such type of structure is far from being addressed. In this paper, we propose a scheme that partitions networks into communities by electing community leaders via message passing between nodes. Using random walk on networks, this scheme derives an effective similarity measure between nodes, which is closely related to community memberships of nodes. Importantly, this approach can be applied to a very broad range of networks types. In fact, the successful validation of the proposed scheme on real and synthetic networks shows that this approach can effectively (i) address the problem of resolution limit and (ii) find communities in both directed and undirected networks within a unified framework, including revealing multiple levels of robust community partitions.

Darong Lai; Christine Nardini; Hongtao Lu

2011-01-31T23:59:59.000Z

470

Reducing power consumption while performing collective operations on a plurality of compute nodes  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for reducing power consumption while performing collective operations on a plurality of compute nodes that include: receiving, by each compute node, instructions to perform a type of collective operation; selecting, by each compute node from a plurality of collective operations for the collective operation type, a particular collective operation in dependence upon power consumption characteristics for each of the plurality of collective operations; and executing, by each compute node, the selected collective operation.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda E. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2011-10-18T23:59:59.000Z

471

Computer Systems and Network Manager  

E-Print Network (OSTI)

SQL database configuration and administration, as well as experience with SharePoint configuration, criminal history, national sex offender search and motor vehicle history. SALARY Salary is commensurate

472

Energy management in sensor networks  

Science Journals Connector (OSTI)

...many factors, including form factor, cost and energy use. This gives rise to one...However, the cost, form factor and energy requirements often make this...conversionProc. 35th Intersociety Energy Conversion Engineering Conference (IECEC...

2012-01-01T23:59:59.000Z

473

Reviewing P2P network community detection  

Science Journals Connector (OSTI)

In this paper we present a summary of the state of the art concerning community detection in distributed computer architectures, for instance so-called P2P systems. The main algorithms for the extraction of communities are reviewed. Each set of nodes ... Keywords: P2P, clustering, community detection algorithms, networks

Anna Puig-Centelles; Oscar Ripolles; Miguel Chover

2007-03-01T23:59:59.000Z

474

Wireless Networking Projects Ashok K. Agrawala  

E-Print Network (OSTI)

677err 4243correct 4920total Training set = SET2 Nuzzer #12;Energy Efficient Routing EER #12;Energy portion of node energy ­ Noise Error Rate Retransmission Energy Consumption S D b a c 5 2 3 2 2 1 · To reduce energy consumption, we need reduce the number of retransmissions. · In ad hoc networks, paths

Gruner, Daniel S.

475

Hardware demonstration of high-speed networks for satellite applications.  

SciTech Connect

This report documents the implementation results of a hardware demonstration utilizing the Serial RapidIO{trademark} and SpaceWire protocols that was funded by Sandia National Laboratories (SNL's) Laboratory Directed Research and Development (LDRD) office. This demonstration was one of the activities in the Modeling and Design of High-Speed Networks for Satellite Applications LDRD. This effort has demonstrated the transport of application layer packets across both RapidIO and SpaceWire networks to a common downlink destination using small topologies comprised of commercial-off-the-shelf and custom devices. The RapidFET and NEX-SRIO debug and verification tools were instrumental in the successful implementation of the RapidIO hardware demonstration. The SpaceWire hardware demonstration successfully demonstrated the transfer and routing of application data packets between multiple nodes and also was able reprogram remote nodes using configuration bitfiles transmitted over the network, a key feature proposed in node-based architectures (NBAs). Although a much larger network (at least 18 to 27 nodes) would be required to fully verify the design for use in a real-world application, this demonstration has shown that both RapidIO and SpaceWire are capable of routing application packets across a network to a common downlink node, illustrating their potential use in real-world NBAs.

Donaldson, Jonathon W.; Lee, David S.

2008-09-01T23:59:59.000Z

476

Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks  

Science Journals Connector (OSTI)

Secure and pervasive internet access is the goal of present research in wireless networks realm. Wireless Mesh Network (WMN) is expected to be the most widely used network in the near future to make the anywhere-anytime internet access into ... Keywords: handoff latency, handoff mechanisms, hybrid routing, key management, mobility management, pervasive internet access, security, simulation, urban WMN:, wireless mesh networks, wireless networks

Ramanarayana Kandikattu; Lillykutty Jacob

2008-10-01T23:59:59.000Z

477

Multiplexity-facilitated cascades in networks  

Science Journals Connector (OSTI)

Elements of networks interact in many ways, so modeling them with graphs requires multiple types of edges (or network layers). Here we show that such multiplex networks are generically more vulnerable to global cascades than simplex networks. We generalize the threshold cascade model [Watts, Proc. Natl. Acad. Sci. USA 99, 5766 (2002)] to multiplex networks, in which a node activates if a sufficiently large fraction of neighbors in any layer are active. We show that both combining layers (i.e., realizing other interactions play a role) and splitting a network into layers (i.e., recognizing distinct kinds of interactions) facilitate cascades. Notably, layers unsusceptible to global cascades can cooperatively achieve them if coupled. On one hand, this suggests fundamental limitations on predicting cascades without full knowledge of a system's multiplexity; on the other hand, it offers feasible means to control cascades by introducing or removing sparse layers in an existing network.

Charles D. Brummitt; Kyu-Min Lee; K.-I. Goh

2012-04-27T23:59:59.000Z

478

Routing algorithms for large scale wireless sensor networks  

E-Print Network (OSTI)

such as power, memory, and CPU processing capabilities. In this thesis, we assume an All to All communication mode in an N ? N grid sensor network. We explore routing algorithms which load balance the network without compromising the shortest paths constrain. We... failed nodes). In static network case, we derived mathematical formulae representing the maximum and minimum loads on a sensor grid, when specific routing strategies are employed. We show improvement in performance in load balancing of the grid by using...

Nittala Venkata, Lakshmana Prasanth

2005-02-17T23:59:59.000Z

479

Reducing power consumption during execution of an application on a plurality of compute nodes  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: executing, by each compute node, an application, the application including power consumption directives corresponding to one or more portions of the application; identifying, by each compute node, the power consumption directives included within the application during execution of the portions of the application corresponding to those identified power consumption directives; and reducing power, by each compute node, to one or more components of that compute node according to the identified power consumption directives during execution of the portions of the application corresponding to those identified power consumption directives.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda E. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-06-05T23:59:59.000Z

480

Profiling an application for power consumption during execution on a compute node  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for profiling an application for power consumption during execution on a compute node that include: receiving an application for execution on a compute node; identifying a hardware power consumption profile for the compute node, the hardware power consumption profile specifying power consumption for compute node hardware during performance of various processing operations; determining a power consumption profile for the application in dependence upon the application and the hardware power consumption profile for the compute node; and reporting the power consumption profile for the application.

Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

2013-09-17T23:59:59.000Z

Note: This page contains sample records for the topic "network node manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Scatter – secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

482

E-Print Network 3.0 - autonomous congestion control Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

- Congestion control is an essential task in communication networks. Especially in ad hoc and sensor networks... , the task of bandwidth management and congestion control...

483

Policies for implementing network firewalls  

SciTech Connect

Corporate networks are frequently protected by {open_quotes}firewalls{close_quotes} or gateway systems that control access to/from other networks, e.g., the Internet, in order to reduce the network`s vulnerability to hackers and other unauthorized access. Firewalls typically limit access to particular network nodes and application protocols, and they often perform special authentication and authorization functions. One of the difficult issues associated with network firewalls is determining which applications should be permitted through the firewall. For example, many networks permit the exchange of electronic mail with the outside but do not permit file access to be initiated by outside users, as this might allow outside users to access sensitive data or to surreptitiously modify data or programs (e.g., to intall Trojan Horse software). However, if access through firewalls is severely restricted, legitimate network users may find it difficult or impossible to collaborate with outside users and to share data. Some of the most serious issues regarding firewalls involve setting policies for firewalls with the goal of achieving an acceptable balance between the need for greater functionality and the associated risks. Two common firewall implementation techniques, screening routers and application gateways, are discussed below, followed by some common policies implemented by network firewalls.

Brown, C.D.

1994-05-01T23:59:59.000Z

484

Directory Enabled Policy Based Networking  

SciTech Connect

This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking.

KELIIAA, CURTIS M.

2001-10-01T23:59:59.000Z

485

Protein folding on rugged energy landscapes: Conformational diffusion on fractal networks  

Science Journals Connector (OSTI)

We perform simulations of model proteins to study folding on rugged energy landscapes. We construct “first-passage” networks as the system transitions from unfolded to native states. The nodes and bonds in these networks correspond to basins and transitions between them in the energy landscape. We find power-law relations between the folding time and the number of nodes and bonds. We show that these scalings are determined by the fractal properties of first-passage networks. Thus, we have identified a possible mechanism—the small fractal dimension of first passage networks—which can give rise to reliable folding in proteins with rugged energy landscapes.

Gregg Lois; Jerzy Blawzdziewicz; Corey S. O’Hern

2010-05-06T23:59:59.000Z

486

Protein folding on rugged energy landscapes: Conformational diffusion on fractal networks  

E-Print Network (OSTI)

We employ simulations of model proteins to study folding on rugged energy landscapes. We construct ``first-passage'' networks as the system transitions from unfolded to native states. The nodes and bonds in these networks correspond to basins and transitions between them in the energy landscape. We find power-laws between the folding time and number of nodes and bonds. We show that these scalings are determined by the fractal properties of first-passage networks. Reliable folding is possible in systems with rugged energy landscapes because first passage networks have small fractal dimension.

Gregg Lois; J. Blawzdziewicz; Corey S. O'Hern

2009-06-24T23:59:59.000Z

487

Adjuvant Docetaxel for Node-Positive Breast Cancer  

Science Journals Connector (OSTI)

...contained doxorubicin or epirubicin reduced the annual risk of recurrence of breast cancer by 12 percent and the annual risk of death by 11 percent. Rates of disease-free and overall survival were similar among women treated with either six cycles (spanning 24 weeks) of cyclophosphamide, methotrexate, and... This randomized trial included almost 1500 women with breast cancer and positive axillary nodes and compared treatment with doxorubicin and cyclophosphamide combined with either fluorouracil or docetaxel. The rates of disease-free and overall survival were significantly higher among women in the docetaxel group.

Martin M.; Pienkowski T.; Mackey J.

2005-06-02T23:59:59.000Z

488

Voltage Control Devices on the IEEE 8500 Node Test Feeder  

SciTech Connect

The IEEE Test Cases provide researchers with distribution system models that can be used to validate new analytic methods. The newest of these models is the 8500-node test feeder which contains multiple devices for voltage control. In addition to a substation regulator there are multiple inline regulators as well as capacitor banks. This paper will discuss the detail in which voltage control devises should be modeled when examining large distribution systems. This discussion will include issues associated with power flow analysis for a single time step as well as for time series analysis.

Schneider, Kevin P.; Fuller, Jason C.

2010-01-06T23:59:59.000Z

489

Low latency, high bandwidth data communications between compute nodes in a parallel computer  

DOE Patents (OSTI)

Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.

Blocksome, Michael A

2014-04-22T23:59:59.000Z

490

Low latency, high bandwidth data communications between compute nodes in a parallel computer  

DOE Patents (OSTI)

Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.

Blocksome, Michael A

2014-04-01T23:59:59.000Z

491

Performing an allreduce operation on a plurality of compute nodes of a parallel computer  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer. Each compute node includes at least two processing cores. Each processing core has contribution data for the allreduce operation. Performing an allreduce operation on a plurality of compute nodes of a parallel computer includes: establishing one or more logical rings among the compute nodes, each logical ring including at least one processing core from each compute node; performing, for each logical ring, a global allreduce operation using the contribution data for the processing cores included in that logical ring, yielding a global allreduce result for each processing core included in that logical ring; and performing, for each compute node, a local allreduce operation using the global allreduce results for each processing core on that compute node.

Faraj, Ahmad (Rochester, MN)

2012-04-17T23:59:59.000Z

492

Low latency, high bandwidth data communications between compute nodes in a parallel computer  

DOE Patents (OSTI)

Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.

Blocksome, Michael A

2013-07-02T23:59:59.000Z

493

A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations  

SciTech Connect

Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

2010-01-01T23:59:59.000Z

494

Self-limiting adaptive protocols for controlled flooding in ad hoc networks Larry Hughes and Ying Zhang  

E-Print Network (OSTI)

Self-limiting adaptive protocols for controlled flooding in ad hoc networks Larry Hughes and Ying power consumption, reduce traffic, and restrict flooding, are of growing importance. In this paper-aware nodes, can reduce the number of nodes involved in a transmission. Simulation results show

Hughes, Larry

495

A MODIFIED BROADCAST STRATEGY FOR DISTRIBUTED SIGNAL ESTIMATION IN A WIRELESS SENSOR NETWORK WITH A TREE TOPOLOGY  

E-Print Network (OSTI)

WITH A TREE TOPOLOGY Joseph Szurley§ , Alexander Bertrand§ , Marc Moonen§ §KU Leuven-Dept. Electrical of the distributed adaptive node-specific estimation (DANSE) algorithm in a tree topology (T-DANSE). In this paper, we consider a network where there is at least one node with a large (vir- tually infinite) energy

496

Abstract--Securing multicast communications in Mobile Ad Hoc Networks (MANET) is considered among the most challenging  

E-Print Network (OSTI)

with the requirement to design secure KM schemes that achieve better performance than existing ones (either for wire-line difficulties in establishing a secure framework suitable for such services. The design of efficient key no nodes with special capabilities exist, b) produce considerably lower overhead for the network nodes

Baras, John S.

497

Feedback Circuits in Evolving Networks: Micro-Macro Linkages for Biases in Attachment, Routing and Distance Decay  

E-Print Network (OSTI)

Feedback Circuits in Evolving Networks: Micro-Macro Linkages for Biases in Attachment, Routing the phe- nomenon of feedback creation at the micro-level leads to changes in network topology at the macro and analyses still to be completed, v3.03) Abstract. We investigate information networks whose nodes can emit

White, Douglas R.

498

Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks  

E-Print Network (OSTI)

1 Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-enhanced and standard IEEE 802.11 nodes can coexist in a MANET is also discussed. Keywords: mobile ad hoc network, promiscuous mode, broadcast, IEEE 802.11, routing. #12;2 1. Introduction In mobile ad hoc networks (MANETs

Chen, Sheng-Wei

499

Hybrid function projective synchronization in complex dynamical networks  

SciTech Connect

This paper investigates hybrid function projective synchronization in complex dynamical networks. When the complex dynamical networks could be synchronized up to an equilibrium or periodic orbit, a hybrid feedback controller is designed to realize the different component of vector of node could be synchronized up to different desired scaling function in complex dynamical networks with time delay. Hybrid function projective synchronization (HFPS) in complex dynamical networks with constant delay and HFPS in complex dynamical networks with time-varying coupling delay are researched, respectively. Finally, the numerical simulations show the effectiveness of theoretical analysis.

Wei, Qiang; Wang, Xing-yuan, E-mail: wangxy@dlut.edu.cn; Hu, Xiao-peng [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024 (China)] [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024 (China)

2014-02-15T23:59:59.000Z

500

Characteristic times of biased random walks on complex networks  

Science Journals Connector (OSTI)

We consider degree-biased random walkers whose probability to move from a node to one of its neighbors of degree k is proportional to k?, where ? is a tuning parameter. We study both numerically and analytically three types of characteristic times, namely (i) the time the walker needs to come back to the starting node, (ii) the time it takes to visit a given node for the first time, and (iii) the time it takes to visit all the nodes of the network. We consider a large data set of real-world networks and we show that the value of ? which minimizes the three characteristic times differs from the value ?min=?1 analytically found for uncorrelated networks in the mean-field approximation. In addition to this, we found that assortative networks have preferentially a value of ?min in the range [?1,?0.5], while disassortative networks have ?min in the range [?0.5,0]. We derive an analytical relation between the degree correlation exponent ? and the optimal bias value ?min, which works well for real-world assortative networks. When only local information is available, degree-biased random walks can guarantee smaller characteristic times than the classical unbiased random walks by means of an appropriate tuning of the motion bias.

Moreno Bonaventura; Vincenzo Nicosia; Vito Latora

2014-01-09T23:59:59.000Z