The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a rumor propagation model considering rumor acceptability function and simulate rumor propagation on complex networks with Repast simulation platform in this paper. We introduce the structure and the main class library of Repast simulation platform. Then we build an efficient model based on the multi-agent modeling method. Through the model, we simulate the behavior of rumor propagation...
This paper studies how Connected Vehicle (CV) routing can be leveraged to tame the propagation of congestion after the onset of an incident. To do so, the study focuses on an idealized one-way grid network with a homogenous demand pattern. Congestion propagation dynamics is first modeled analytically and simulated in Aimsun considering a scenario with non-adaptive agents. The results are then compared...
Large-scale software systems like Amazon and healthcare.gov are used by thousands or millions of people every day. To ensure the quality of these systems, load testing is a required testing procedure in addition to the conventional functional testing techniques like unit and system integration testing. One of the important requirements of load testing is to create a field-like test environment. Unfortunately,...
The research of the cascading failure and the spread of the disease belong to two separate fields. However, in practice, there are many mutual effects between two processes each other. This paper first introduces some basic concepts of complex networks, and analyzes the application of cascading failure model and several typical virus transmission models. Then, based on a spreading model, the interaction...
Simulation models are expensive to design and run. Commercial modeling software made for specific industries are costly and do not allow for compatibility across languages. Free and open source languages allow for more control in model creation. However, models written using these languages require more time to develop and interpret. We present a platform compatible with open source languages that...
Flowering is a key process that determines yield in fruit trees, and a negative relationship between crop load and floral induction has been observed in many species. In apple tree, hormonal signals coming from seeds, which are assumed to be transported within the tree, are suspected to inhibit floral induction. To analyze the intertwined effects of tree architecture, crop load and inhibitory signal...
The design and implementation of analytical information systems requires both technical expertise and domain knowledge, the complexity of which often deters small and medium-sized enterprises from adopting business intelligence (BI) technology. Reference models for data analysis consist of domain-specific best-practice multidimensional models and greatly facilitate the development of analytical information...
Difference equation based on load model is generally adopted in power system. However, the parameters of the model are often attained by identification method, which leads to the absence of mechanism. In this paper, the authors analytically derive the parameters of difference equation based load model incorporating the induction motor load and static load. Based on the analytical parameters, mechanism...
DC voltage balance strategy is an important control part for Cascaded H-Bridge Rectifier. Proportional pulse compensation strategy is a typical voltage balance strategy, which can realize DC voltage balance with good performance under special working condition. However, the balance effect may be influenced by load current, and it is hard for self adoption under different load conditions. This paper...
Despite their wide adoption, industrial business process models often display a wide range of quality issues. While significant efforts have been undertaken to better understand factors impacting process model comprehension, only few studies focused on their creation. This paper presents a set of fixation patterns that have been derived from a modeling session with 120 participants during which the...
In this paper, a new and practical method is presented to investigate and improve the effect of distributed generation (DG) on recloser-fuse coordination. The main idea is to develop a comprehensive data base from fault currants and protection coordination status of electric distribution system (EDS) against different penetration/location of DGs. For large EDSs, this approach can be used for candidate...
Effective resource provisioning for collocated cloud applications each with unique traffic patterns is a challenging task. Furthermore, resource requirements cannot be adequately determined a priori to deployment while traffic generated and received during application communication lifecycles is subject to fluctuations that exacerbate provisioning. Given this volatility, we analyzed traces from production...
Large-scale maritime simulation platform faces the contradiction among timeliness, accuracy and integrity in the data collection, storage, analysis and exploitation, due to the features of maritime big data, such as large-volume, multi-source heterogeneity, abruptness and high noise. With this background, in order to deal with the complexity and imperfectness of maritime big data, this paper employs...
This paper presents a physics of failure model for pitting corrosion with the coupled effect of corrosion environment and mechanical stresses. With the developed model, corrosion damage growth can be projected and corrosion reliability can be analyzed. To carry out corrosion reliability analysis, the developed pitting corrosion model can be formulated as time-dependent limit state functions considering...
Forecast is applied in many fields. The determination of system signals, states or parameters of technical and not technical processes allows the solution of higher level tasks, for instance the optimization of complex systems or the generation of decisions. Basic methods of prediction are signal models, analytical, symbolic, cognitive models and state-space models [1], [2], [3], [4], [5]. The problem...
Deadlock is a common problem in 3D networks-on-chip. In this paper, we propose a lightweight and deadlock-free turn-guided routing scheme named TURO without requiring any virtual channels, which is a minimal routing guided by a new 3D turn model NeoOE. The theoretical analysis and experimental results show that TURO possesses improved adaptivity, higher performance and lower overhead compared with...
The accurate prediction of runtimes of future job tasks on the nodes of a grid supplies vital information for the users to make CPU resource usage decisions. There are number of different approaches to predict runtimes of the future job tasks. These approaches range from the statistical to non statistical and some of them require expensive search algorithms or availability of the source code of job...
It is envisioned that small cells are going to play an important role in future cellular networks. Due to limited coverage areas of small cells and increased user mobility, a proper analysis and evaluation of handoff traffic is of major importance. In this paper, we propose a novel teletraffic model for the analysis of handoff traffic in cellular CDMA networks. When the cell load is above a predefined...
The Cloud computing model is considered as a very promising internet-based computing platform, the resources it provides to create virtual machines are rarely used to manage security. Researchers used this power in a new way, in order to offer new security services based on Cloud paradigm to copc with threats such as DDOS (Distribute Denial Of Service) attacks, using the extensible resources and other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.