The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A lot of research has been proposed to improve network performance in the data center. However, with the development of distributed applications, these applications face a new performance bottleneck since existing solutions almost ignore the application level optimization. The concept of coflow has been proposed which provides a chance for us to optimize network in application level rather than individual...
With the development of cloud computing, disk arrays tolerating triple disk failures (3DFTs) are receiving more attention nowadays because they can provide high data reliability with low monetary cost. However, a challenging issue in these arrays is how to efficiently reconstruct the lost data, especially for partial stripe errors (e.g., sector and chunk errors). It is one of the most significant...
Lack of relevant data is a major challenge for Bayesian network (BN) parameters learning. For the issue, this paper proposes a constrained parameter evolutionary learning algorithm (CPEL) which is based on the qualitative knowledge and evolutionary strategy. In detail, firstly qualitative knowledge is employed into BN parameters learning process to reduce the parameter search space where two types...
In the control of maglev systems, decentralized control structure is widely used due to its simplicity. Due to the existence of mechanical coupling, the performance of decentralized control is limited. This paper focuses on designing a centralized controller for a small maglev platform that already has a decentralized control structure. A distributed reduced-order observer is first proposed for one...
Nowadays, unattended monitoring system has been widely used in substation for its efficiency and efficacy, and it sometimes may cause safety problems for utility workers. In order to ensure workers' safety, in this paper, we focus on the problem of illegal human ladder climbing action recognition in substation using vision-based algorithm. Specifically, we first detect “forbidden” and “allowing” types...
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization (CBBO) method, and applied it in centroid-based clustering methods. The results over three types of simulation data showed that this proposed CBBO method gave better performance than chaotic particle swarm optimization, genetic algorithm, firefly algorithm,...
With the rapid development of Internet and cloud services, logs become one of the fastest growing data types in backup storage systems. These massive data always require long-term storage, which incurs high storage overhead. Typical compression algorithms, such as traditional lossless compression and log-specific compression algorithms, are employed to increase storage efficiency. However, these algorithms...
A combination of dynamic adjustment method and multi-robot task allocation auction algorithm is presented, which is an efficient algorithm to solve task allocation problem of multi-robot cooperative hunting. Firstly, this paper optimizes the auction algorithm which can improve the coordination and negotiation performance in multi-robot system and greatly reduce the amount of communication and computation...
In the context of Software-Defined Networking (SDN), various sophisticated policy-aware network functions such as intrusion detection, access control and load balancer, can be realized via specified middlebox devices. However, high congestions may occur in specific bottleneck links if middlebox selection and traffic routing are not well jointly planed. To this end, we study a joint optimization of...
This paper presents a novel WLAN-based indoor localization algorithm (i.e., HED) to combat the environmental dynamics by tolerating the sequence disorders caused by AP (access point) changes, while harvesting from the bursting number of available wireless resources. Via extensive real-world experiments lasting for over 6 months, we show the superiority of our HED algorithm in terms of accuracy and...
Indoor localization remains a hot topic and receives tremendous research efforts during the last few decades. While most previous efforts focus on the designing issue, little effort has been paid to the impact of different environmental parameters on the system performance. To this end, we present an extensive empirical study with real-world experiments to provide sufficient data for analysis. By...
As a mobile operating system framework, Android plays a significant role in supporting mobile apps. Using cloud-based approaches have further enabled the implementations of mobile apps. However, current Android application model is not efficient by using current common approaches. In this paper, we proposed a new mobile app model using precache technology to overcome the current existing obstacles...
An improved multi-objective artificial bee colony algorithm is designed in this paper reflecting the multi-objective characteristic of multi-robot path planning problems. Firstly, the foraging mechanism is optimized and a new method to calculate crowding distance is proposed. The restructuring and elimination mechanism of food sources are also presented. Secondly, an improved environment map representation...
Soft errors have been a concern in memory reliability for many years. With device feature size decreasing and memories density increasing, a single event upset (SEU) in memory may generate adjacent bit upsets in a word that may cause data errors. To avoid data errors in memories, Error Correction Codes (ECCs) are used. As multiple bits affected become frequent, the Single Error Correction (SEC) codes...
Collaborative filtering (CF) is one of the major approaches to building recommender systems. Traditional batch-trained algorithms for CF suffer from some drawbacks, and online learning algorithms for CF, is a promising tool for attacking the large-scale dynamic problems. However, the low time complexity of online algorithm often be accompanied by low convergence rate, and the convergence rate of current...
In this work, the performance of 5 representative caching replacement policies was investigated and compared for caching Internet video-on-demand (VoD) in local access networks. Two measured traces of end-user requests were used in the analyses for two typical VoD services: TV-on-demand and user generated content represented by YouTube. The studied policies range from simple least recently used (LRU)...
Proper parameter settings of support vector machine (SVM) and feature selection are of great importance to its efficiency and accuracy. In this paper, we propose a parallel adaptive particle swarm optimization algorithm to simultaneously perform the parameter optimization and feature selection for SVM, termed PTVPSO-SVM. It is implemented in an efficient parallel environment using PVM (Parallel Virtual...
Device-to-device (D2D) communication underlaying a cellular infrastructure has been proposed as a means of facilitating rich local services and offloading the base station traffic. However, D2D communication presents a challenge in radio resource management due to the potential interference it may cause to the cellular network. In this paper, the joint optimization problem of D2D mode selection, modulation...
This paper focuses on the transceiver design for multiple-input-multiple-output (MIMO) interference channel. The optimization objective is to minimize the maximum per-stream mean square error (MSE) which greatly influences the bit error rate (BER) performance. Considering the imperfect channel state information (CSI) in reality, we propose two robust algorithms based on statistical and bounded CSI...
In this paper, we study the network Lifetime Maximization problem in Mobile healthcare sensor systems (LMM). For the healthecare system, we consider a dynamic scenario where users are mobile at their own wills and periodically report their personal health information (PHI) to a static sink, e.g. a powerful server, for further processing and distributing. The objective is to optimize the network lifetime...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.