7,405 research outputs found

    Synchronization in Random Geometric Graphs

    Full text link
    In this paper we study the synchronization properties of random geometric graphs. We show that the onset of synchronization takes place roughly at the same value of the order parameter that a random graph with the same size and average connectivity. However, the dependence of the order parameter with the coupling strength indicates that the fully synchronized state is more easily attained in random graphs. We next focus on the complete synchronized state and show that this state is less stable for random geometric graphs than for other kinds of complex networks. Finally, a rewiring mechanism is proposed as a way to improve the stability of the fully synchronized state as well as to lower the value of the coupling strength at which it is achieved. Our work has important implications for the synchronization of wireless networks, and should provide valuable insights for the development and deployment of more efficient and robust distributed synchronization protocols for these systems.Comment: 5 pages, 4 figure

    Considerations for a design and operations knowledge support system for Space Station Freedom

    Get PDF
    Engineering and operations of modern engineered systems depend critically upon detailed design and operations knowledge that is accurate and authoritative. A design and operations knowledge support system (DOKSS) is a modern computer-based information system providing knowledge about the creation, evolution, and growth of an engineered system. The purpose of a DOKSS is to provide convenient and effective access to this multifaceted information. The complexity of Space Station Freedom's (SSF's) systems, elements, interfaces, and organizations makes convenient access to design knowledge especially important, when compared to simpler systems. The life cycle length, being 30 or more years, adds a new dimension to space operations, maintenance, and evolution. Provided here is a review and discussion of design knowledge support systems to be delivered and operated as a critical part of the engineered system. A concept of a DOKSS for Space Station Freedom (SSF) is presented. This is followed by a detailed discussion of a DOKSS for the Lyndon B. Johnson Space Center and Work Package-2 portions of SSF

    Aging cellular networks: chaperones as major participants

    Full text link
    We increasingly rely on the network approach to understand the complexity of cellular functions. Chaperones (heat shock proteins) are key "networkers", which have among their functions to sequester and repair damaged protein. In order to link the network approach and chaperones with the aging process, we first summarize the properties of aging networks suggesting a "weak link theory of aging". This theory suggests that age-related random damage primarily affects the overwhelming majority of the low affinity, transient interactions (weak links) in cellular networks leading to increased noise, destabilization and diversity. These processes may be further amplified by age-specific network remodelling and by the sequestration of weakly linked cellular proteins to protein aggregates of aging cells. Chaperones are weakly linked hubs [i.e., network elements with a large number of connections] and inter-modular bridge elements of protein-protein interaction, signalling and mitochondrial networks. As aging proceeds, the increased overload of damaged proteins is an especially important element contributing to cellular disintegration and destabilization. Additionally, chaperone overload may contribute to the increase of "noise" in aging cells, which leads to an increased stochastic resonance resulting in a deficient discrimination between signals and noise. Chaperone- and other multi-target therapies, which restore the missing weak links in aging cellular networks, may emerge as important anti-aging interventions.Comment: 7 pages, 4 figure

    Providing Access to Safe Water: Lessons Learned from Two Decades of Philanthropic Investment in the Rural Poor

    Get PDF
    The Conrad N. Hilton Foundation has been a leading U.S. funder for increasing safe water access for over 20 years. The author reflects on that history to describe valuable lessons, especially on partnership (in the context of West Africa Water Initiative), and how to think strategically in the long- and short-term about efficient and sustainable WASH funding

    Distributed Denial-of-Service Defense System

    Get PDF
    Distributed denial-of-service (DoS) attacks present a great threat to the Internet, and existing security mechanisms cannot detect or stop them successfully. The problem lies in the distributed nature of attacks, which engages the power of a vast number of coordinated hosts. To mitigate the impacts of DDoS attacks, it is important to develop such defenses system that canbothdetect andreact against ongoing attacks. The attacks ideally should be stopped as close to the sources as possible, saving network resources andreducing congestion. The DDoS defense system that is deployed at the source-end should prevent the machines at associated network from participating in DDoS attacks. The primary objective of this project, which is developing a DDoS defense system, is to provide good service to a victim's legitimate clients during the attack, thus canceling the denial-of-service effect. The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. As a source-end defense against DDoS attacks, the attack flows can be stopped before they enter the Internet core and before they aggregate with other attack flows. The methodology chosen for this project is the combination of sequential and iterative approaches of the software development process, which comprises of six main phases, which are initial planning phase, requirement definition phase, system design phase, coding and testing phase, implementation phase, and lastly maintenance and support phase. The system used a source router approach, in which the source router serves as a gateway between the source network containing some of the attack nodes and the rest of the Internet, to detectand limitDDoS streams long before they reach the target. This will be covered in the Findings section of the report. TheDiscussion section will be focus more onthe architecture onthe system, which having three important component; observation, rate-limiting and traffic-policing
    corecore