The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to enhance reliability and safety procedures of the dam, it is very important to gather dam behavior data in real-time monitoring system. The sensors installed into dam's structure and in reservoir measure physical quantities of interests such as seepage flow, water level, deformation, pressure and temperature parameters. In this paper, the remote terminal unit (RTU) based on DSPIC30F4011...
Behaviour inspection of huge dams is a very important procedure for dam failure prevention as early fault detection could reduce potential losses or damages. Traditionally, a behaviour inspection requires a lot of man-power and is not practical in some situations where critical inspection points are not accessible. This paper presents a design and implementation of Supervisory Control and Data Acquisition...
In this paper, we addressed the problem of improving call-based QoS measurement accuracy with the focus on call blocking probability as monitored via the active measurement or test drives in cellular-type networks. The system has been modelled as continuous time Markov chains with necessary assumption of Poisson traffics for both actual load and injected or intrusive load. With a product-form solution,...
To obtain a network with high fault tolerance, all possible characteristics of a failure event must be captured in the analysis. Also, an efficient method to identify and then upgrade vulnerable network components is required. A network game model between a router and intelligent attacker has been widely explored to overcome this challenge. In this paper, based on game theory framework, we have proposed...
Recently, SLAs become an important issue considered in the next generation telecommunication services. The subscriberspsilas perspective drives ISPs eager to support their requirements by offering SLAs across domains. Under deregulatory environment, this paper has adopted a path-classification scheme in order to capture the freedom of policy selection. To prevent selfish path provisioning in the interdomain...
In this paper, by applying the game theoretical framework, we propose a new vulnerability identification method in the multicommodity stochastic network. A new performance indicator-expected achievable capacity (EAC)-is proposed to quantify the vulnerability level of network links when the network is attacked by an intelligent adversary. To compute for EAC, a maximin problem is formulated and solved...
In next generation networks, technological advancements lead a trend towards offering guaranteed services. ISPs are eager to support subscribers' requirements by offering SLAs across domains. This paper considers the interaction between ISPs under deregulatory environment. In order to capture a freedom of the policy selection, path-classification scheme is proposed to group paths into a few choices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.