551 research outputs found

    Graph Theoretical Analysis of the Dynamic Lines of Collaboration Model for Disruption Response

    Get PDF
    The Dynamic Lines of Collaboration (DLOC) model was developed to address the Network-to-Network (N2N) service challenge found in e-Work networks with pervasive connectivity. A variant of the N2N service challenge found in emerging Cyber-Physical Infrastructures (CPI) networks is the collaborative disruption response (CDR) operation under cascading failures. The DLOC model has been validated as an appropriate modelling tool to aid the design of disruption responders in CPIs by eliciting the dynamic relation among the service team when handling service requests from clients in the CPI network

    Synchronization in complex networks

    Get PDF
    Synchronization processes in populations of locally interacting elements are in the focus of intense research in physical, biological, chemical, technological and social systems. The many efforts devoted to understand synchronization phenomena in natural systems take now advantage of the recent theory of complex networks. In this review, we report the advances in the comprehension of synchronization phenomena when oscillating elements are constrained to interact in a complex network topology. We also overview the new emergent features coming out from the interplay between the structure and the function of the underlying pattern of connections. Extensive numerical work as well as analytical approaches to the problem are presented. Finally, we review several applications of synchronization in complex networks to different disciplines: biological systems and neuroscience, engineering and computer science, and economy and social sciences.Comment: Final version published in Physics Reports. More information available at http://synchronets.googlepages.com

    Optimal sensor placement for sewer capacity risk management

    Get PDF
    2019 Spring.Includes bibliographical references.Complex linear assets, such as those found in transportation and utilities, are vital to economies, and in some cases, to public health. Wastewater collection systems in the United States are vital to both. Yet effective approaches to remediating failures in these systems remains an unresolved shortfall for system operators. This shortfall is evident in the estimated 850 billion gallons of untreated sewage that escapes combined sewer pipes each year (US EPA 2004a) and the estimated 40,000 sanitary sewer overflows and 400,000 backups of untreated sewage into basements (US EPA 2001). Failures in wastewater collection systems can be prevented if they can be detected in time to apply intervention strategies such as pipe maintenance, repair, or rehabilitation. This is the essence of a risk management process. The International Council on Systems Engineering recommends that risks be prioritized as a function of severity and occurrence and that criteria be established for acceptable and unacceptable risks (INCOSE 2007). A significant impediment to applying generally accepted risk models to wastewater collection systems is the difficulty of quantifying risk likelihoods. These difficulties stem from the size and complexity of the systems, the lack of data and statistics characterizing the distribution of risk, the high cost of evaluating even a small number of components, and the lack of methods to quantify risk. This research investigates new methods to assess risk likelihood of failure through a novel approach to placement of sensors in wastewater collection systems. The hypothesis is that iterative movement of water level sensors, directed by a specialized metaheuristic search technique, can improve the efficiency of discovering locations of unacceptable risk. An agent-based simulation is constructed to validate the performance of this technique along with testing its sensitivity to varying environments. The results demonstrated that a multi-phase search strategy, with a varying number of sensors deployed in each phase, could efficiently discover locations of unacceptable risk that could be managed via a perpetual monitoring, analysis, and remediation process. A number of promising well-defined future research opportunities also emerged from the performance of this research

    Social forecasting: a literature review of research promoted by the United States National Security System to model human behavior

    Get PDF
    The development of new information and communication technologies increased the volume of information flows within society. For the security forces, this phenomenon presents new opportunities for collecting, processing and analyzing information linked with the opportunity to collect a vast and diverse amount data, and at the same time it requires new organizational and individual competences to deal with the new forms and huge volumes of information. Our study aimed to outline the research areas funded by the US defense and intelligence agencies with respect to social forecasting. Based on bibliometric techniques, we clustered 2688 articles funded by US defense or intelligence agencies in five research areas: a) Complex networks, b) Social networks, c) Human reasoning, d) Optimization algorithms, and e) Neuroscience. After that, we analyzed qualitatively the most cited papers in each area. Our analysis identified that the research areas are compatible with the US intelligence doctrine. Besides that, we considered that the research areas could be incorporated in the work of security forces provided that basic training is offered. The basic training would not only enhance capabilities of law enforcement agencies but also help safeguard against (unwitting) biases and mistakes in the analysis of data

    Using continuous sensor data to formalize a model of in-home activity patterns

    Get PDF
    Formal modeling and analysis of human behavior can properly advance disciplines ranging from psychology to economics. The ability to perform such modeling has been limited by a lack of ecologically-valid data collected regarding human daily activity. We propose a formal model of indoor routine behavior based on data from automatically-sensed and recognized activities. A mechanistic description of behavior patterns for identical activity is offered to both investigate behavioral norms with 99 smart homes and compare these norms between subgroups. We identify and model the patterns of human behaviors based on inter-arrival times, the time interval between two successive activities, for selected activity classes in the smart home dataset with diverse participants. We also explore the inter-arrival times of sequence of activities in one smart home. To demonstrate the impact such analysis can have on other disciplines, we use this same smart home data to examine the relationship between the formal model and resident health status. Our study reveals that human indoor activities can be described by non-Poisson processes and that the corresponding distribution of activity inter-arrival times follows a Pareto distribution. We further discover that the combination of activities in certain subgroups can be described by multivariate Pareto distributions. These findings will help researchers understand indoor activity routine patterns and develop more sophisticated models of predicting routine behaviors and their timings. Eventually, the findings may also be used to automate diagnoses and design customized behavioral interventions by providing activity-anticipatory services that will benefit both caregivers and patients
    corecore