The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible for its own behaviors so that the entity is part of larger chains of the system's accountability. In this paper, we propose designs of a multiresolution flow-net scheme to achieve...
In order to simulate catalytic reactive distillation process for biodiesel production via transesterification accurately, the Antoine parameters of biodiesel and NRTL binary interaction coefficients were regressed using Aspen Plus Data Regression function according to the data in literatures. Then vapor pressure of biodiesel under different temperature and phase equilibrium conditions could be described...
The relationship between the object temperature and time during heat transfer was analyzed with the basic principles of heat and mass transfer for the effective thermal protection of the memory. Thermal protection structure was simulated with ANSYS 10.0 and validated by experiment. The result demonstrated that nanometer aerogel which was placed between memory and protective layer, 5mm thick and the...
Classical network fluid model and RED algorithm are based on TCP flows in internet network, and they have not considered the UDP flows' effects in network. However, in real work of the network, the network link capacity is shared by the hybrid traffics: TCP flows and UDP flows, and UDP flows can occupy the original link capacity of TCP flow. Since there is no feedback control for UDP flows, the classical...
In this paper, we propose a method to construct the protograph LDPC codes based on Jacket matrices. In the proposed code construction, the Jacket matrices are regarded as derived protograph matrices, the column weights of permutation matrices in parity check matrix depend on the elements' values of Jacket matrices. While the shift rule of the permutation matrices needs to ensure no girth 4. The proposed...
OpenFlow is defined as a unified control plane and architecture for packet and circuit switched networks. We deal with the congestion control problem in the multi-layer network, and propose a cooperative congestion control scheme for a domain with multiple AQM routers based on the OpenFlow architecture. This scheme operates three different cases in the domain, where the domain server share information...
In this letter, based on 2-D s-z domain stability analysis, we derive stability conditions under which the TCP/RED system is stable. According to the proposed conditions, we can present the network parameter p_{max}'s stability bounds that lead to stable operations of the TCP/RED system. The simulation results illustrate the validity of the stability conditions.
This paper provides parameter setting and 2-D local stability conditions for TCP/RED networks. In general, a network cannot avoid congestions due to the limit of network capacity. The RED scheme is one of the representative AQM that was proposed to avoid and alleviate network congestions. However, the issue of network stability with many TCP subscribers needs to be considered when setting the RED...
We investigate the congestion control problem in the multi-layer network, and propose a cooperative congestion control scheme for a domain with multiple RED routers. This scheme operates three different cases in the domain, where the domain control module share information with core router and edge router interactively. The congestion control algorithm is simulated to ensure the convergence of the...
In this paper, based on our proposed mal-packet self-propagation models in wireless sensor networks, we use TOSSIM to study their propagation dynamics. We also present a preliminary study of the feasibility of mal-packet defense in sensor networks. Specifically, based on random graph theory and percolation theory, we propose the immunization of the highly-connected nodes in order to partition the...
As to the multi-variable, strong coupling, nonlinear, time-varying characteristics of the ball mill pulverizing system of power plant, a hierarchical fuzzy-PID control system is introduced in this paper based on the fuzzy control theory and the analysis of its dynamic characteristic, and the simulation results are also presented in this article. The simulation results show that the control method...
In this paper, a new control method for distribution static compensator (DSTATCOM) using artificial neural networks (ANN) instead of the conventional direct controller is presented. A feedforward three-layer neural network is adopted to control the output compensating currents. This is accomplished by producing the appropriate switching patterns of the IGBTs. A backpropagation algorithm trains this...
In this paper, a new control method for distribution static compensator (DSTATCOM) using artificial neural networks (ANN) instead of the conventional direct controller is presented. A feedforward three-layer neural network is adopted to control the output compensating currents. This is accomplished by producing the appropriate switching patterns of the IGBTs. A backpropagation algorithm trains this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.