首页 > 最新文献

Network Neuroscience最新文献

英文 中文
A parcellation scheme of mouse isocortex based on reversals in connectivity gradients 基于连接梯度反转的小鼠同皮层分割方案
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-02-23 DOI: 10.1101/2022.08.30.505842
Michael W. Reimann, Timothé Guyonnet-Hencke
The brain is composed of several anatomically clearly separated structures. This parcellation is often extended into the isocortex, based on anatomical, physiological or functional differences. Here, we derive a parcellation scheme based purely on the spatial structure of long-range synaptic connections within the cortex. To that end, we analyzed a publicly available dataset of average mouse brain connectivity, and split the isocortex into disjunct regions. Instead of clustering connectivity based on modularity, our scheme is inspired by methods that split sensory cortices into subregions where gradients of neuronal response properties, such as the location of the receptive field, reverse. We calculated comparable gradients from voxelized brain connectivity data and automatically detected reversals in them. This approach better respects the known presence of functional gradients within brain regions than clustering-based approaches. Placing borders at the reversals resulted in a parcellation into 41 subregions that differs significantly from an established scheme in nonrandom ways, but is comparable in terms of the modularity of connectivity between regions. It reveals unexpected trends of connectivity, such as a tripartite split of somatomotor regions along an anterior to posterior gradient. The method can be readily adapted to other organisms and data sources, such as human functional connectivity.
大脑由几个在解剖学上清晰分离的结构组成。基于解剖、生理或功能的差异,这种分割通常延伸到等角体。在这里,我们推导了一个纯粹基于皮层内长程突触连接的空间结构的分割方案。为此,我们分析了一个公开的小鼠大脑平均连接数据集,并将等角体划分为析取区域。我们的方案不是基于模块化的聚类连接,而是受到将感觉皮层划分为神经元反应特性梯度(如感受野的位置)反转的子区域的方法的启发。我们从体素化的大脑连接数据中计算出可比较的梯度,并自动检测到其中的反转。这种方法比基于聚类的方法更好地尊重大脑区域内已知的功能梯度的存在。在反转处设置边界导致了41个亚区域的划分,这在非随机方面与既定方案有很大不同,但在区域之间的连通性模块性方面具有可比性。它揭示了意想不到的连接趋势,例如身体运动区域沿前后梯度的三分体。该方法可以很容易地适用于其他生物体和数据源,例如人类功能连接。
{"title":"A parcellation scheme of mouse isocortex based on reversals in connectivity gradients","authors":"Michael W. Reimann, Timothé Guyonnet-Hencke","doi":"10.1101/2022.08.30.505842","DOIUrl":"https://doi.org/10.1101/2022.08.30.505842","url":null,"abstract":"The brain is composed of several anatomically clearly separated structures. This parcellation is often extended into the isocortex, based on anatomical, physiological or functional differences. Here, we derive a parcellation scheme based purely on the spatial structure of long-range synaptic connections within the cortex. To that end, we analyzed a publicly available dataset of average mouse brain connectivity, and split the isocortex into disjunct regions. Instead of clustering connectivity based on modularity, our scheme is inspired by methods that split sensory cortices into subregions where gradients of neuronal response properties, such as the location of the receptive field, reverse. We calculated comparable gradients from voxelized brain connectivity data and automatically detected reversals in them. This approach better respects the known presence of functional gradients within brain regions than clustering-based approaches. Placing borders at the reversals resulted in a parcellation into 41 subregions that differs significantly from an established scheme in nonrandom ways, but is comparable in terms of the modularity of connectivity between regions. It reveals unexpected trends of connectivity, such as a tripartite split of somatomotor regions along an anterior to posterior gradient. The method can be readily adapted to other organisms and data sources, such as human functional connectivity.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"7 1","pages":"999 - 1021"},"PeriodicalIF":4.7,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44430231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
State switching and high-order spatiotemporal organization of dynamic Functional Connectivity are disrupted by Alzheimer's Disease 阿尔茨海默病破坏了动态功能连接的状态转换和高阶时空组织
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-02-22 DOI: 10.1101/2023.02.19.23285768
Lucas Arbabyazd, S. Petkoski, M. Breakspear, A. Solodkin, Demian Battaglia, V. Jirsa
Spontaneous activity during the resting state, tracked by BOLD fMRI imaging, or shortly rsfMRI, gives rise to brain-wide dynamic patterns of inter-regional correlations, whose structured flexibility relates to cognitive performance. Here we analyze resting state dynamic Functional Connectivity (dFC) in a cohort of older adults, including amnesic Mild Cognitive Impairment (aMCI, N = 34) and Alzheimer's Disease (AD, N = 13) patients, as well as normal control (NC, N = 16) and cognitively "super-normal" (SN, N = 10) subjects. Using complementary state-based and state-free approaches, we find that resting state fluctuations of different functional links are not independent but are constrained by high-order correlations between triplets or quadruplets of functionally connected regions. When contrasting patients with healthy subjects, we find that dFC between cingulate and other limbic regions is increasingly bursty and intermittent when ranking the four groups from SNC to NC, aMCI and AD. Furthermore, regions affected at early stages of AD pathology are less involved in higher-order interactions in patient than in control groups, while pairwise interactions are not significantly reduced. Our analyses thus suggest that the spatiotemporal complexity of dFC organization is precociously degraded in AD and provides a richer window into the underlying neurobiology than time-averaged FC connections.
通过BOLD功能磁共振成像(简称rsfMRI)追踪静息状态下的自发活动,产生了全脑区域间相关性的动态模式,其结构灵活性与认知表现有关。在此,我们分析了一组老年人的静息状态动态功能连接(dFC),包括遗忘性轻度认知障碍(aMCI, N = 34)和阿尔茨海默病(AD, N = 13)患者,以及正常对照(NC, N = 16)和认知“超常”(SN, N = 10)受试者。利用基于状态和无状态的互补方法,我们发现不同功能链接的静息状态波动不是独立的,而是受到功能连接区域的三联体或四联体之间的高阶相关性的约束。在与健康受试者对比时,我们发现从SNC到NC、aMCI和AD四组,扣带区与其他边缘区之间的dFC越来越突发性和间歇性。此外,与对照组相比,患者在阿尔茨海默病病理早期受影响的区域较少参与高阶相互作用,而成对相互作用并没有显著减少。因此,我们的分析表明,dFC组织的时空复杂性在AD中提前退化,并提供了一个比时间平均FC连接更丰富的潜在神经生物学窗口。
{"title":"State switching and high-order spatiotemporal organization of dynamic Functional Connectivity are disrupted by Alzheimer's Disease","authors":"Lucas Arbabyazd, S. Petkoski, M. Breakspear, A. Solodkin, Demian Battaglia, V. Jirsa","doi":"10.1101/2023.02.19.23285768","DOIUrl":"https://doi.org/10.1101/2023.02.19.23285768","url":null,"abstract":"Spontaneous activity during the resting state, tracked by BOLD fMRI imaging, or shortly rsfMRI, gives rise to brain-wide dynamic patterns of inter-regional correlations, whose structured flexibility relates to cognitive performance. Here we analyze resting state dynamic Functional Connectivity (dFC) in a cohort of older adults, including amnesic Mild Cognitive Impairment (aMCI, N = 34) and Alzheimer's Disease (AD, N = 13) patients, as well as normal control (NC, N = 16) and cognitively \"super-normal\" (SN, N = 10) subjects. Using complementary state-based and state-free approaches, we find that resting state fluctuations of different functional links are not independent but are constrained by high-order correlations between triplets or quadruplets of functionally connected regions. When contrasting patients with healthy subjects, we find that dFC between cingulate and other limbic regions is increasingly bursty and intermittent when ranking the four groups from SNC to NC, aMCI and AD. Furthermore, regions affected at early stages of AD pathology are less involved in higher-order interactions in patient than in control groups, while pairwise interactions are not significantly reduced. Our analyses thus suggest that the spatiotemporal complexity of dFC organization is precociously degraded in AD and provides a richer window into the underlying neurobiology than time-averaged FC connections.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":" ","pages":""},"PeriodicalIF":4.7,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44049220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Bundle Routing in a Space DTN by Approximating the Transmission Time of the Reliable LTP 通过逼近可靠LTP的传输时间改进空间DTN中的分组路由
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-02-03 DOI: 10.3390/network3010009
R. Lent
Because the operation of space networks is carefully planned, it is possible to predict future contact opportunities from link budget analysis using the anticipated positions of the nodes over time. In the standard approach to space delay-tolerant networking (DTN), such knowledge is used by contact graph routing (CGR) to decide the paths for data bundles. However, the computation assumes nearly ideal channel conditions, disregarding the impact of the convergence layer retransmissions (e.g., as implemented by the Licklider transmission protocol (LTP)). In this paper, the effect of the bundle forwarding time estimation (i.e., the link service time) to routing optimality is analyzed, and an accurate expression for lossy channels is discussed. The analysis is performed first from a general and protocol-agnostic perspective, assuming knowledge of the statistical properties and general features of the contact opportunities. Then, a practical case is studied using the standard space DTN protocol, evaluating the performance improvement of CGR under the proposed forwarding time estimation. The results of this study provide insight into the optimal routing problem for a space DTN and a suggested improvement to the current routing standard.
由于空间网络的运行是经过仔细规划的,因此可以利用节点随时间推移的预期位置,从链路预算分析中预测未来的接触机会。在空间容忍延迟网络(DTN)的标准方法中,接触图路由(CGR)使用这些知识来确定数据包的路径。然而,计算假设了近乎理想的信道条件,忽略了收敛层重传的影响(例如,由Licklider传输协议(LTP)实现)。本文分析了包转发时间估计(即链路服务时间)对路由最优性的影响,并讨论了有耗信道的精确表达式。首先从一般和协议不可知的角度进行分析,假设了解接触机会的统计特性和一般特征。然后,利用标准空间DTN协议研究了一个实际案例,评估了在提出的转发时间估计下CGR的性能改进。本研究的结果为空间DTN的最优路由问题提供了深入的见解,并对当前的路由标准提出了改进建议。
{"title":"Improving Bundle Routing in a Space DTN by Approximating the Transmission Time of the Reliable LTP","authors":"R. Lent","doi":"10.3390/network3010009","DOIUrl":"https://doi.org/10.3390/network3010009","url":null,"abstract":"Because the operation of space networks is carefully planned, it is possible to predict future contact opportunities from link budget analysis using the anticipated positions of the nodes over time. In the standard approach to space delay-tolerant networking (DTN), such knowledge is used by contact graph routing (CGR) to decide the paths for data bundles. However, the computation assumes nearly ideal channel conditions, disregarding the impact of the convergence layer retransmissions (e.g., as implemented by the Licklider transmission protocol (LTP)). In this paper, the effect of the bundle forwarding time estimation (i.e., the link service time) to routing optimality is analyzed, and an accurate expression for lossy channels is discussed. The analysis is performed first from a general and protocol-agnostic perspective, assuming knowledge of the statistical properties and general features of the contact opportunities. Then, a practical case is studied using the standard space DTN protocol, evaluating the performance improvement of CGR under the proposed forwarding time estimation. The results of this study provide insight into the optimal routing problem for a space DTN and a suggested improvement to the current routing standard.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"1 1","pages":"180-198"},"PeriodicalIF":4.7,"publicationDate":"2023-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89711553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Algebraic Model of an Edge Data Center with a Redundant Ring Topology 冗余环拓扑边缘数据中心的形式化代数模型
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-01-30 DOI: 10.3390/network3010007
P. Roig, S. Alcaraz, K. Gilly, Cristina Bernad, C. Juiz
Data center organization and optimization presents the opportunity to try and design systems with specific characteristics. In this sense, the combination of artificial intelligence methodology and sustainability may lead to achieve optimal topologies with enhanced feature, whilst taking care of the environment by lowering carbon emissions. In this paper, a model for a field monitoring system has been proposed, where an edge data center topology in the form of a redundant ring has been designed for redundancy purposes to join together nodes spread apart. Additionally, a formal algebraic model of such a design has been exposed and verified.
数据中心的组织和优化为尝试和设计具有特定特征的系统提供了机会。从这个意义上说,人工智能方法和可持续性的结合可能会导致实现具有增强功能的最佳拓扑,同时通过降低碳排放来照顾环境。本文提出了一种现场监控系统模型,其中设计了冗余环形式的边缘数据中心拓扑,以实现冗余目的,将分散的节点连接在一起。此外,这种设计的正式代数模型已经暴露和验证。
{"title":"Formal Algebraic Model of an Edge Data Center with a Redundant Ring Topology","authors":"P. Roig, S. Alcaraz, K. Gilly, Cristina Bernad, C. Juiz","doi":"10.3390/network3010007","DOIUrl":"https://doi.org/10.3390/network3010007","url":null,"abstract":"Data center organization and optimization presents the opportunity to try and design systems with specific characteristics. In this sense, the combination of artificial intelligence methodology and sustainability may lead to achieve optimal topologies with enhanced feature, whilst taking care of the environment by lowering carbon emissions. In this paper, a model for a field monitoring system has been proposed, where an edge data center topology in the form of a redundant ring has been designed for redundancy purposes to join together nodes spread apart. Additionally, a formal algebraic model of such a design has been exposed and verified.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"4 1","pages":"142-157"},"PeriodicalIF":4.7,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77159468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Federated Learning-Based Approach for Improving Intrusion Detection in Industrial Internet of Things Networks 基于联邦学习的工业物联网入侵检测改进方法
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-01-30 DOI: 10.3390/network3010008
Md Mamunur Rashid, Shahriar Usman Khan, Fariha Eusufzai, Md. Azharuddin Redwan, S. R. Sabuj, Mahmoud Elsharief
The Internet of Things (IoT) is a network of electrical devices that are connected to the Internet wirelessly. This group of devices generates a large amount of data with information about users, which makes the whole system sensitive and prone to malicious attacks eventually. The rapidly growing IoT-connected devices under a centralized ML system could threaten data privacy. The popular centralized machine learning (ML)-assisted approaches are difficult to apply due to their requirement of enormous amounts of data in a central entity. Owing to the growing distribution of data over numerous networks of connected devices, decentralized ML solutions are needed. In this paper, we propose a Federated Learning (FL) method for detecting unwanted intrusions to guarantee the protection of IoT networks. This method ensures privacy and security by federated training of local IoT device data. Local IoT clients share only parameter updates with a central global server, which aggregates them and distributes an improved detection algorithm. After each round of FL training, each of the IoT clients receives an updated model from the global server and trains their local dataset, where IoT devices can keep their own privacy intact while optimizing the overall model. To evaluate the efficiency of the proposed method, we conducted exhaustive experiments on a new dataset named Edge-IIoTset. The performance evaluation demonstrates the reliability and effectiveness of the proposed intrusion detection model by achieving an accuracy (92.49%) close to that offered by the conventional centralized ML models’ accuracy (93.92%) using the FL method.
物联网(IoT)是一个无线连接到互联网的电子设备网络。这组设备会产生大量包含用户信息的数据,最终使整个系统变得敏感,容易受到恶意攻击。集中式机器学习系统下快速增长的物联网连接设备可能会威胁到数据隐私。流行的集中式机器学习(ML)辅助方法由于需要在中心实体中获取大量数据而难以应用。由于数据在众多连接设备网络上的分布越来越多,因此需要分散的机器学习解决方案。在本文中,我们提出了一种联邦学习(FL)方法来检测不必要的入侵,以保证对物联网网络的保护。该方法通过联合训练本地物联网设备数据来确保隐私和安全。本地物联网客户端仅与中央全局服务器共享参数更新,该服务器将它们聚合并分发改进的检测算法。在每一轮FL训练之后,每个物联网客户端都会从全球服务器接收更新的模型并训练其本地数据集,物联网设备可以在优化整体模型的同时保持自己的隐私完整。为了评估所提出方法的效率,我们在一个名为Edge-IIoTset的新数据集上进行了详尽的实验。性能评估表明,该入侵检测模型的准确率(92.49%)接近传统集中式ML模型使用FL方法获得的准确率(93.92%),证明了该模型的可靠性和有效性。
{"title":"A Federated Learning-Based Approach for Improving Intrusion Detection in Industrial Internet of Things Networks","authors":"Md Mamunur Rashid, Shahriar Usman Khan, Fariha Eusufzai, Md. Azharuddin Redwan, S. R. Sabuj, Mahmoud Elsharief","doi":"10.3390/network3010008","DOIUrl":"https://doi.org/10.3390/network3010008","url":null,"abstract":"The Internet of Things (IoT) is a network of electrical devices that are connected to the Internet wirelessly. This group of devices generates a large amount of data with information about users, which makes the whole system sensitive and prone to malicious attacks eventually. The rapidly growing IoT-connected devices under a centralized ML system could threaten data privacy. The popular centralized machine learning (ML)-assisted approaches are difficult to apply due to their requirement of enormous amounts of data in a central entity. Owing to the growing distribution of data over numerous networks of connected devices, decentralized ML solutions are needed. In this paper, we propose a Federated Learning (FL) method for detecting unwanted intrusions to guarantee the protection of IoT networks. This method ensures privacy and security by federated training of local IoT device data. Local IoT clients share only parameter updates with a central global server, which aggregates them and distributes an improved detection algorithm. After each round of FL training, each of the IoT clients receives an updated model from the global server and trains their local dataset, where IoT devices can keep their own privacy intact while optimizing the overall model. To evaluate the efficiency of the proposed method, we conducted exhaustive experiments on a new dataset named Edge-IIoTset. The performance evaluation demonstrates the reliability and effectiveness of the proposed intrusion detection model by achieving an accuracy (92.49%) close to that offered by the conventional centralized ML models’ accuracy (93.92%) using the FL method.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"3 1","pages":"158-179"},"PeriodicalIF":4.7,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84611867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IoT and Blockchain Integration: Applications, Opportunities, and Challenges 物联网和区块链整合:应用、机遇和挑战
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-01-24 DOI: 10.3390/network3010006
Naresh Adhikari, M. Ramkumar
During the recent decade, two variants of evolving computing networks have augmented the Internet: (i) The Internet of Things (IoT) and (ii) Blockchain Network(s) (BCNs). The IoT is a network of heterogeneous digital devices embedded with sensors and software for various automation and monitoring purposes. A Blockchain Network is a broadcast network of computing nodes provisioned for validating digital transactions and recording the “well-formed” transactions in a unique data storage called a blockchain ledger. The power of a blockchain network is that (ideally) every node maintains its own copy of the ledger and takes part in validating the transactions. Integrating IoT and BCNs brings promising applications in many areas, including education, health, finance, agriculture, industry, and the environment. However, the complex, dynamic and heterogeneous computing and communication needs of IoT technologies, optionally integrated by blockchain technologies (if mandated), draw several challenges on scaling, interoperability, and security goals. In recent years, numerous models integrating IoT with blockchain networks have been proposed, tested, and deployed for businesses. Numerous studies are underway to uncover the applications of IoT and Blockchain technology. However, a close look reveals that very few applications successfully cater to the security needs of an enterprise. Needless to say, it makes less sense to integrate blockchain technology with an existing IoT that can serve the security need of an enterprise. In this article, we investigate several frameworks for IoT operations, the applicability of integrating them with blockchain technology, and due security considerations that the security personnel must make during the deployment and operations of IoT and BCN. Furthermore, we discuss the underlying security concerns and recommendations for blockchain-integrated IoT networks.
在最近十年中,不断发展的计算网络的两种变体增强了互联网:(i)物联网(IoT)和(ii)区块链网络(bcn)。物联网是一个由嵌入传感器和软件的异构数字设备组成的网络,用于各种自动化和监控目的。区块链网络是一个由计算节点组成的广播网络,用于验证数字交易,并将“格式良好”的交易记录在一个称为区块链分类账的唯一数据存储中。区块链网络的强大之处在于(理想情况下)每个节点都维护自己的账本副本,并参与交易验证。物联网与BCNs的融合将在教育、卫生、金融、农业、工业、环境等诸多领域带来广阔的应用前景。然而,物联网技术的复杂、动态和异构计算和通信需求,可选择通过区块链技术集成(如果强制),在扩展、互操作性和安全目标方面提出了一些挑战。近年来,许多将物联网与区块链网络集成的模型已经被提出、测试和部署到企业中。许多研究正在进行中,以揭示物联网和区块链技术的应用。然而,仔细观察就会发现,很少有应用程序能够成功地满足企业的安全需求。不用说,将区块链技术与可以满足企业安全需求的现有物联网集成在一起的意义不大。在本文中,我们研究了物联网运营的几个框架,它们与区块链技术集成的适用性,以及安全人员在物联网和BCN部署和运营过程中必须考虑的安全问题。此外,我们还讨论了区块链集成物联网网络的潜在安全问题和建议。
{"title":"IoT and Blockchain Integration: Applications, Opportunities, and Challenges","authors":"Naresh Adhikari, M. Ramkumar","doi":"10.3390/network3010006","DOIUrl":"https://doi.org/10.3390/network3010006","url":null,"abstract":"During the recent decade, two variants of evolving computing networks have augmented the Internet: (i) The Internet of Things (IoT) and (ii) Blockchain Network(s) (BCNs). The IoT is a network of heterogeneous digital devices embedded with sensors and software for various automation and monitoring purposes. A Blockchain Network is a broadcast network of computing nodes provisioned for validating digital transactions and recording the “well-formed” transactions in a unique data storage called a blockchain ledger. The power of a blockchain network is that (ideally) every node maintains its own copy of the ledger and takes part in validating the transactions. Integrating IoT and BCNs brings promising applications in many areas, including education, health, finance, agriculture, industry, and the environment. However, the complex, dynamic and heterogeneous computing and communication needs of IoT technologies, optionally integrated by blockchain technologies (if mandated), draw several challenges on scaling, interoperability, and security goals. In recent years, numerous models integrating IoT with blockchain networks have been proposed, tested, and deployed for businesses. Numerous studies are underway to uncover the applications of IoT and Blockchain technology. However, a close look reveals that very few applications successfully cater to the security needs of an enterprise. Needless to say, it makes less sense to integrate blockchain technology with an existing IoT that can serve the security need of an enterprise. In this article, we investigate several frameworks for IoT operations, the applicability of integrating them with blockchain technology, and due security considerations that the security personnel must make during the deployment and operations of IoT and BCN. Furthermore, we discuss the underlying security concerns and recommendations for blockchain-integrated IoT networks.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"8 1","pages":"115-141"},"PeriodicalIF":4.7,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89786814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Edge Data Center Organization and Optimization by Using Cage Graphs 基于笼图的边缘数据中心组织与优化
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-01-18 DOI: 10.3390/network3010005
P. Roig, S. Alcaraz, K. Gilly, Cristina Bernad, C. Juiz
Data center organization and optimization are increasingly receiving attention due to the ever-growing deployments of edge and fog computing facilities. The main aim is to achieve a topology that processes the traffic flows as fast as possible and that does not only depend on AI-based computing resources, but also on the network interconnection among physical hosts. In this paper, graph theory is introduced, due to its features related to network connectivity and stability, which leads to more resilient and sustainable deployments, where cage graphs may have an advantage over the rest. In this context, the Petersen graph cage is studied as a convenient candidate for small data centers due to its small number of nodes and small network diameter, thus providing an interesting solution for edge and fog data centers.
由于边缘计算和雾计算设施的部署不断增长,数据中心的组织和优化越来越受到关注。其主要目标是实现一种拓扑结构,该拓扑不仅依赖于基于人工智能的计算资源,而且依赖于物理主机之间的网络互连。本文介绍了图论,由于其与网络连接性和稳定性相关的特性,这导致了更有弹性和可持续的部署,其中笼图可能比其他图具有优势。在这种情况下,Petersen图笼由于其节点数量少,网络直径小,被研究为小型数据中心的方便候选者,从而为边缘和雾数据中心提供了一个有趣的解决方案。
{"title":"Edge Data Center Organization and Optimization by Using Cage Graphs","authors":"P. Roig, S. Alcaraz, K. Gilly, Cristina Bernad, C. Juiz","doi":"10.3390/network3010005","DOIUrl":"https://doi.org/10.3390/network3010005","url":null,"abstract":"Data center organization and optimization are increasingly receiving attention due to the ever-growing deployments of edge and fog computing facilities. The main aim is to achieve a topology that processes the traffic flows as fast as possible and that does not only depend on AI-based computing resources, but also on the network interconnection among physical hosts. In this paper, graph theory is introduced, due to its features related to network connectivity and stability, which leads to more resilient and sustainable deployments, where cage graphs may have an advantage over the rest. In this context, the Petersen graph cage is studied as a convenient candidate for small data centers due to its small number of nodes and small network diameter, thus providing an interesting solution for edge and fog data centers.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"279 1","pages":"93-114"},"PeriodicalIF":4.7,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77493023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acknowledgment to the Reviewers of Network in 2022 感谢2022年网络审稿人
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-01-17 DOI: 10.3390/network3010004
High-quality academic publishing is built on rigorous peer review [...]
高质量的学术出版建立在严格的同行评审的基础上[…]
{"title":"Acknowledgment to the Reviewers of Network in 2022","authors":"","doi":"10.3390/network3010004","DOIUrl":"https://doi.org/10.3390/network3010004","url":null,"abstract":"High-quality academic publishing is built on rigorous peer review [...]","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"10 1","pages":""},"PeriodicalIF":4.7,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89645828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can hubs of the human connectome be identified consistently with diffusion MRI? 人类连接组的枢纽能否与扩散MRI一致地识别?
3区 医学 Q2 NEUROSCIENCES Pub Date : 2023-01-01 DOI: 10.1162/netn_a_00324
Mehul Gajwani, Stuart J. Oldham, James C. Pang, Aurina Arnatkevičiūtė, Jeggan Tiego, Mark A. Bellgrove, Alex Fornito
Abstract Recent years have seen a surge in the use of diffusion MRI to map connectomes in humans, paralleled by a similar increase in processing and analysis choices. Yet these different steps and their effects are rarely compared systematically. Here, in a healthy young adult population (n = 294), we characterized the impact of a range of analysis pipelines on one widely studied property of the human connectome: its degree distribution. We evaluated the effects of 40 pipelines (comparing common choices of parcellation, streamline seeding, tractography algorithm, and streamline propagation constraint) and 44 group-representative connectome reconstruction schemes on highly connected hub regions. We found that hub location is highly variable between pipelines. The choice of parcellation has a major influence on hub architecture, and hub connectivity is highly correlated with regional surface area in most of the assessed pipelines (ρ > 0.70 in 69% of the pipelines), particularly when using weighted networks. Overall, our results demonstrate the need for prudent decision-making when processing diffusion MRI data, and for carefully considering how different processing choices can influence connectome organization.
近年来,扩散核磁共振成像在人类连接体图谱中的应用激增,与此同时,处理和分析选择也有类似的增加。然而,很少有人系统地比较这些不同的步骤及其效果。在这里,在一个健康的年轻成人人群(n = 294)中,我们描述了一系列分析管道对一个被广泛研究的人类连接组属性的影响:它的程度分布。我们评估了40个管道(比较了分组、流线播种、通道成像算法和流线传播约束的常见选择)和44个具有组代表性的连接体重建方案在高度连接的枢纽区域的效果。我们发现轮毂位置在管道之间变化很大。分组的选择对枢纽结构有重大影响,在大多数评估的管道中,枢纽连通性与区域表面积高度相关(ρ >0.70(69%的管道),特别是在使用加权网络时。总的来说,我们的结果表明,在处理扩散MRI数据时需要谨慎的决策,并仔细考虑不同的处理选择如何影响连接体组织。
{"title":"Can hubs of the human connectome be identified consistently with diffusion MRI?","authors":"Mehul Gajwani, Stuart J. Oldham, James C. Pang, Aurina Arnatkevičiūtė, Jeggan Tiego, Mark A. Bellgrove, Alex Fornito","doi":"10.1162/netn_a_00324","DOIUrl":"https://doi.org/10.1162/netn_a_00324","url":null,"abstract":"Abstract Recent years have seen a surge in the use of diffusion MRI to map connectomes in humans, paralleled by a similar increase in processing and analysis choices. Yet these different steps and their effects are rarely compared systematically. Here, in a healthy young adult population (n = 294), we characterized the impact of a range of analysis pipelines on one widely studied property of the human connectome: its degree distribution. We evaluated the effects of 40 pipelines (comparing common choices of parcellation, streamline seeding, tractography algorithm, and streamline propagation constraint) and 44 group-representative connectome reconstruction schemes on highly connected hub regions. We found that hub location is highly variable between pipelines. The choice of parcellation has a major influence on hub architecture, and hub connectivity is highly correlated with regional surface area in most of the assessed pipelines (ρ > 0.70 in 69% of the pipelines), particularly when using weighted networks. Overall, our results demonstrate the need for prudent decision-making when processing diffusion MRI data, and for carefully considering how different processing choices can influence connectome organization.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135686179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Attacking Future 5G Networks with Adversarial Examples: Survey 用对抗性例子攻击未来5G网络:调查
IF 4.7 3区 医学 Q2 NEUROSCIENCES Pub Date : 2022-12-30 DOI: 10.3390/network3010003
M. Zolotukhin, Di Zhang, Timo Hämäläinen, Parsa Miraghaei
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in those components becoming a high-value attack target. In particular, a smart adversary may exploit vulnerabilities of the state-of-the-art machine learning models deployed in a 5G system to initiate an attack. This study focuses on the analysis of adversarial example generation attacks against machine learning based frameworks that may be present in the next generation networks. First, various AI/ML algorithms and the data used for their training and evaluation in mobile networks is discussed. Next, multiple AI/ML applications found in recent scientific papers devoted to 5G are overviewed. After that, existing adversarial example generation based attack algorithms are reviewed and frameworks which employ these algorithms for fuzzing stat-of-art AI/ML models are summarised. Finally, adversarial example generation attacks against several of the AI/ML frameworks described are presented.
随着5G技术的引入和连接设备的指数级增长,预计将对高效可靠的网络资源分配带来挑战。网络提供商现在需要动态地创建和部署多个服务,这些服务在不同垂直部门的各种需求下运行,同时在相同的物理基础设施上运行。人工智能和机器学习的最新进展被认为是解决资源分配挑战的潜在答案。因此,预计下一代移动网络将严重依赖其人工智能组件,这可能导致这些组件成为高价值的攻击目标。特别是,聪明的对手可能会利用部署在5G系统中的最先进机器学习模型的漏洞发起攻击。本研究的重点是分析针对下一代网络中可能存在的基于机器学习的框架的对抗性示例生成攻击。首先,讨论了各种AI/ML算法及其在移动网络中用于训练和评估的数据。接下来,概述了最近致力于5G的科学论文中发现的多个AI/ML应用。然后,回顾了现有的基于对抗性示例生成的攻击算法,并总结了使用这些算法模糊最先进的AI/ML模型的框架。最后,介绍了针对所描述的几个AI/ML框架的对抗性示例生成攻击。
{"title":"On Attacking Future 5G Networks with Adversarial Examples: Survey","authors":"M. Zolotukhin, Di Zhang, Timo Hämäläinen, Parsa Miraghaei","doi":"10.3390/network3010003","DOIUrl":"https://doi.org/10.3390/network3010003","url":null,"abstract":"The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in those components becoming a high-value attack target. In particular, a smart adversary may exploit vulnerabilities of the state-of-the-art machine learning models deployed in a 5G system to initiate an attack. This study focuses on the analysis of adversarial example generation attacks against machine learning based frameworks that may be present in the next generation networks. First, various AI/ML algorithms and the data used for their training and evaluation in mobile networks is discussed. Next, multiple AI/ML applications found in recent scientific papers devoted to 5G are overviewed. After that, existing adversarial example generation based attack algorithms are reviewed and frameworks which employ these algorithms for fuzzing stat-of-art AI/ML models are summarised. Finally, adversarial example generation attacks against several of the AI/ML frameworks described are presented.","PeriodicalId":48520,"journal":{"name":"Network Neuroscience","volume":"8 1","pages":"39-90"},"PeriodicalIF":4.7,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88754032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Network Neuroscience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1