The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To improve the local accessibility performance, some important services are usually replicated and maintained in multiple datacenters. A user can request any datacenter which hosts the required service. The traditional end-to-end path is gradually replaced by the end-to-service path. To resist the frequently occurred natural disasters or human-made faults, survivability technologies need to be deployed...
We study the problem of joint spectrum and storage resource backup (JSSRB) to improve the survivability of elastic optical datacenter networks (EODNs) for cloud services. An ILP model and heuristic algorithms are developed. Simulation results show that JSSRB can effectively improve the survivability and spectrum efficiency of EODNs.
The existing group consensus models for solving the group decision making (GDM) problems with [0,1] reciprocal preference relations are always on the basis of absolute deviation measures. In this paper, we define the individual consistency accuracy index and the group consensus accuracy index based on the relative deviation measure, which can measure the relative precision of difference among the...
The obstacle avoidance is the key technology of nonholonomic mobile robot, where obstacle avoidance algorithm is the core. Artificial potential field (APF) algorithm has the advantage of sample mathematical model, which is understood and applied into practice easily. However, there are some problems in APF algorithm, for examples, local minimum and GNRON problem, which limits the effect of APF algorithm...
An economic and practical measure is put forward to realize energy saving and consumption lowering for alumina evaporation process in this paper. Firstly, based on the energy analysis, investigate the system, unit or equipment which has high energy consumption and saving potential in the alumina evaporation process, secondly, by optimizing the process energy, upgrade the equipment, improve existed...
Recently the disconnected Delay-Tolerant Network (DTN) draws more and more attention.It is different from the traditional Ad-hoc and MANET. In DTN the disconnected nature and lack of end to end connectivity between nodes mean that the nodes communicate by the way of store-carry-forward. Therefore, it was rencently been recognized that mobility can be turn into a useful ally, by making nodes carry...
With increasing of the number of safeguard cases, the research field of evaluation the serious damage is becoming important. In this paper, from the cases, we establish a relatively comprehensive evaluation system to determine the extent of damage, which is based on Catastrophe theory. Empirical research shows that the model can effectively improve the injury determination of safeguard cases, and...
To monitor fluid flow dynamically and obtain more reliable gas reservoir information of 3D time-lapse seismic data, in this paper we present a 4D-AVO inversion algorithm, in which visualization technology, cross-correlation technology, time and phase shift theory, matched filtering algorithm and normalization technology are used to correct and analyze time-varying seismic data after AVO inversion...
Because switching frequency of the fixed band hysteresis current controller varies greatly, it is more difficult to design the output filter. Although variable band hysteresis control can achieve fixed switching frequency, it requires more processor resources when it is actualized by software. This paper analyzes the changing patterns of switching frequency by transient current equation, and replaces...
The nonlinear response and strong coupling effect of control channel in Deformable Mirrors make it difficult to obtain the desired mirror surface shapes. An efficient nonlinear model of deformation with respect to input voltages is presented using a back propagation neural network (BPNN). The residual relative error of the proposed model shows the improvement of accuracy of an order about 5 as compared...
Most denoising method can deal with Gaussian noise or some kind of colored noise. This paper presents a new method of higher order spectral denoising on phase matching noise estimation. The method can remove not only the Gaussian noise but also Non-Gaussian noise. The noise is removed by high order spectral and phase matching estimate of current noise. The experimental results clearly show that this...
A maneuver target interception algorithm based on multiple model adaptive estimator (MMAE) is researched and a modified differential game guidance law is given. The efficiency of this simplified MMAE algorithm lies mainly in the exploitation of the special structure of the evader maneuver command hypothesis space to reduce the number of MMAE elemental filters running in parallel and to realize the...
An all-attitude estimation algorithm for low cost attitude and heading reference system using extended Kalman filter based on modified Rodrigues parameters is designed. Aiming at the shortage of redundancy when using quaternion to describe attitude, modified Rodrigues parameters which are a three-dimensional independent vector are proposed for attitude representation. By switching between the modified...
The research proposed an approach that based on domain partitional Markov decision process to make decisions about the protection and defense against cyber attacks. We partitioned the network into several security domains. Markov decision models were made in each domain, with each state established by situational awareness. Strategy sets were set according to the system states. Cost-benefit factors...
Intention recognition is the ability to predict an opposing force's high level goals. Knowing an attacker's intention can support the decision-making of the network security administrators. Threat assessment based on intention analysis is an important part of network security situation awareness. So how to recognize attack intention and assess threat has become a research hot in network security domain...
Intention recognition is the ability to predict an opposing forcepsilas high level goals. Knowing an attackerpsilas intention can support the decision-making of the network security administrators. Furthermore intent analysis plays an import role in the calculation of the inherent threat value. So how to recognize attack intention has become a research hot in network security domain recently.In this...
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireless networks have emerged. Based on the epidemic theory, this paper proposes a general model which predicts how a worm propagates through a wireless ad hoc network. Then the differential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.