Cognitive control, which continues to mature throughout adolescence, is supported by the ability for well-defined organized brain networks to flexibly integrate information. However, the development ...of intrinsic brain network organization and its relationship to observed improvements in cognitive control are not well understood. In the present study, we used resting state functional magnetic resonance imaging (RS-fMRI), graph theory, the antisaccade task, and rigorous head motion control to characterize and relate developmental changes in network organization, connectivity strength, and integration to inhibitory control development. Subjects were 192 10-26-y-olds who were imaged during 5 min of rest. In contrast to initial studies, our results indicate that network organization is stable throughout adolescence. However, cross-network integration, predominantly of the cingulo-opercular/salience network, increased with age. Importantly, this increased integration of the cingulo-opercular/salience network significantly moderated the robust effect of age on the latency to initiate a correct inhibitory control response. These results provide compelling evidence that the transition to adult-level inhibitory control is dependent upon the refinement and strengthening of integration between specialized networks. Our findings support a novel, two-stage model of neural development, in which networks stabilize prior to adolescence and subsequently increase their integration to support the cross-domain incorporation of information processing critical for mature cognitive control.
Peer-to-Peer (P2P) reputation systems are essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest, and malicious peer behaviors. The system collects ...locally-generated peer feedbacks and aggregates them to yield the global reputation scores. Surprisingly, most previous work ignored the distribution of peer feedbacks. We use a trust overlay network (TON) to model the trust relationships among peers. After examining the eBay transaction trace of over 10,000 users, we discover a power-law distribution in user feedbacks. Our mathematical analysis justifies that power-law distribution is applicable to any dynamically growing P2P systems, either structured or unstructured. We develop a robust and scalable P2P reputation system, PowerTrust, to leverage the power-law feedback characteristics. The PowerTrust system dynamically selects small number of power nodes that are most reputable using a distributed ranking mechanism. By using a look-ahead random walk strategy and leveraging the power nodes, PowerTrust significantly improves in global reputation accuracy and aggregation speed. PowerTrust is adaptable to dynamics in peer joining and leaving and robust to disturbance by malicious peers. Through P2P network simulation experiments, we find significant performance gains in using PowerTrust. This power-law guided reputation system design proves to achieve high query success rate in P2P file-sharing applications. The system also reduces the total job makespan and failure rate in large-scale, parameter-sweeping P2P Grid applications.
In scheduling a large number of user jobs for parallel execution on an open-resource grid system, the jobs are subject to system failures or delays caused by infected hardware, software ...vulnerability, and distrusted security policy. This paper models the risk and insecure conditions in grid job scheduling. Three risk-resilient strategies, preemptive, replication, and delay-tolerant, are developed to provide security assurance. We propose six risk-resilient scheduling algorithms to assure secure grid job execution under different risky conditions. We report the simulated grid performances of these new grid job scheduling algorithms under the NAS and PSA workloads. The relative performance is measured by the total job makespan, grid resource utilization, job failure rate, slowdown ratio, replication overhead, etc. In addition to extending from known scheduling heuristics, we developed a new space-time genetic algorithm (STGA) based on faster searching and protected chromosome formation. Our simulation results suggest that, in a wide-area grid environment, it is more resilient for the global job scheduler to tolerate some job delays instead of resorting to preemption or replication or taking a risk on unreliable resources allocated. We find that delay-tolerant min-min and STGA job scheduling have 13-23 percent higher performance than using risky or preemptive or replicated algorithms. The resource overheads for replicated job scheduling are kept at a low 15 percent. The delayed job execution is optimized with a delay factor, which is 20 percent of the total makespan. A Kiviat graph is proposed for demonstrating the quality of grid computing services. These risk-resilient job scheduling schemes can upgrade grid performance significantly at only a moderate increase in extra resources or scheduling delays in a risky grid computing environment
To support an efficient carpooling service in heavy urban traffic, we propose an intelligent routing scheme based on mining Global Position System trajectories from shared riders. The carpooling ...system provides many-to-many services with multiple pickup and dropping points. To join a daily carpooling group, the riders must accept a compromised route that is efficient after merging the routes that are preferred by all qualified riders. We developed three frequency-correlated algorithms for route mining, rider selection, and route merging in an urban carpool service. Our approach can cope with the traffic dynamics to yield a suboptimal shared route. Our scheme was successfully tested under heavy Beijing traffic over hundreds of riders. We developed performance metrics to measure the service cost and mileage saved. The ultimate goal is to minimize the riding distances and the transportation costs, and thus alleviate urban traffic jams.
Dynamic complexity in brain functional connectivity has hindered the effective use of signal processing or machine learning methods to diagnose neurological disorders such as epilepsy. This paper ...proposed a new graph-generative neural network (GGN) model for the dynamic discovery of brain functional connectivity via deep analysis of scalp electroencephalogram (EEG) signals recorded from various regions of a patient's scalp. Brain functional connectivity graphs are generated for the extraction of spatial-temporal resolution of various onset epilepsy seizure patterns. Our supervised GGN model was substantiated by seizure detection and classification experiments. We train the GGN model using a clinically proven dataset of over 3047 epileptic seizure cases. The GGN model achieved a 91% accuracy in classifying seven types of epileptic seizure attacks, which outperformed the 65%, 74%, and 82% accuracy in using the convolutional neural network (CNN), graph neural networks (GNN), and transformer models, respectively. We present the GGN model architecture and operational steps to assist neuroscientists or brain specialists in using dynamic functional connectivity information to detect neurological disorders. Furthermore, we suggest to merge our spatial-temporal graph generator design in upgrading the conventional CNN and GNN models with dynamic convolutional kernels for accuracy enhancement.
Emerging infectious diseases (EIDs), including the latest COVID-19 pandemic, have emerged and raised global public health crises in recent decades. Without existing protective immunity, an EID may ...spread rapidly and cause mass casualties in a very short time. Therefore, it is imperative to identify cases with risk of disease progression for the optimized allocation of medical resources in case medical facilities are overwhelmed with a flood of patients. This study has aimed to cope with this challenge from the aspect of preventive medicine by exploiting machine learning technologies. The study has been based on 83,227 hospital admissions with influenza-like illness and we analysed the risk effects of 19 comorbidities along with age and gender for severe illness or mortality risk. The experimental results revealed that the decision rules derived from the machine learning based prediction models can provide valuable guidelines for the healthcare policy makers to develop an effective vaccination strategy. Furthermore, in case the healthcare facilities are overwhelmed by patients with EID, which frequently occurred in the recent COVID-19 pandemic, the frontline physicians can incorporate the proposed prediction models to triage patients suffering minor symptoms without laboratory tests, which may become scarce during an EID disaster. In conclusion, our study has demonstrated an effective approach to exploit machine learning technologies to cope with the challenges faced during the outbreak of an EID.
Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid ...clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
As cloud computing becomes more and more popular, understanding the economics of cloud computing becomes critically important. To maximize the profit, a service provider should understand both ...service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multiserver system. The problem of optimal multiserver configuration for profit maximization in a cloud computing environment is studied. Our pricing model takes such factors into considerations as the amount of a service, the workload of an application environment, the configuration of a multiserver system, the service-level agreement, the satisfaction of a consumer, the quality of a service, the penalty of a low-quality service, the cost of renting, the cost of energy consumption, and a service provider's margin and profit. Our approach is to treat a multiserver system as an M/M/m queuing model, such that our optimization problem can be formulated and solved analytically. Two server speed and power consumption models are considered, namely, the idle-speed model and the constant-speed model. The probability density function of the waiting time of a newly arrived service request is derived. The expected service charge to a service request is calculated. The expected net business gain in one unit of time is obtained. Numerical calculations of the optimal server size and the optimal server speed are demonstrated.
The ability to inhibit motor response is crucial for daily activities. However, whether brain networks connecting spatially distinct brain regions can explain individual differences in motor ...inhibition is not known. Therefore, we took a graph-theoretic perspective to examine the relationship between the properties of topological organization in functional brain networks and motor inhibition. We analyzed data from 141 healthy adults aged 20 to 78, who underwent resting-state functional magnetic resonance imaging and performed a stop-signal task along with neuropsychological assessments outside the scanner. The graph-theoretic properties of 17 functional brain networks were estimated, including within-network connectivity and between-network connectivity. We employed multiple linear regression to examine how these graph-theoretical properties were associated with motor inhibition. The results showed that between-network connectivity of the salient ventral attention network and dorsal attention network explained the highest and second highest variance of individual differences in motor inhibition. In addition, we also found those two networks span over brain regions in the frontal-cingulate-parietal network, suggesting that these network interactions are also important to motor inhibition.
In this paper, we present generic cloud performance models for evaluating Iaas, PaaS, SaaS, and mashup or hybrid clouds. We test clouds with real-life benchmark programs and propose some new ...performance metrics. Our benchmark experiments are conducted mainly on IaaS cloud platforms over scale-out and scale-up workloads. Cloud benchmarking results are analyzed with the efficiency, elasticity, QoS, productivity, and scalability of cloud performance. Five cloud benchmarks were tested on Amazon IaaS EC2 cloud: namely YCSB, CloudSuite, HiBench, BenchClouds, and TPC-W. To satisfy production services, the choice of scale-up or scale-out solutions should be made primarily by the workload patterns and resources utilization rates required. Scaling-out machine instances have much lower overhead than those experienced in scale-up experiments. However, scaling up is found more cost-effective in sustaining heavier workload. The cloud productivity is greatly attributed to system elasticity, efficiency, QoS and scalability. We find that auto-scaling is easy to implement but tends to over provision the resources. Lower resource utilization rate may result from auto-scaling, compared with using scale-out or scale-up strategies. We also demonstrate that the proposed cloud performance models are applicable to evaluate PaaS, SaaS and hybrid clouds as well.