The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biological molecules (e.g. DNAs, RNs, proteins, etc.) do not function in isolation themselves but in a sophisticated manner of various interactions between them to carry out every biological processes in living cells. Data about these interactions are exponentially increased thanks to advanced technologies. Analyzing biological interaction networks is essential to get insights into how biological...
Network virtualization provides a flexible solution to reduce costs, share network resources and improve recovery time upon failure. An important part of virtual network management consists in migrating them in order to optimize resource allocation and react to link failures. However, the migration process might entail the loss of security properties in the virtual network, such as confidentiality...
Virtual Network Embedding (VNE) is widely considered as a longstanding challenge in Network Virtualization: how to efficiently embed multiple virtual networks (VNs), with node-link resource requirements, onto the shared substrate network (SN), having finite underlying resources. Most heuristic VNE algorithms in the literature, only considering single network topology attribute and local network resources,...
Some rheumatoid arthritis patients are not clinical response to Rituximab treatment, so the identification of candidate genes for Rituximab response is very important which might contribute to improve the response chance. This paper identifies the candidate genes in a module view, which is more robust and biologically meaningful compared to the conventional gene differentially expressed analysis....
With the fast development of cloud computing and online business of Internet, the importance of data center is gradually increasing. Conventional Ethernet protocols can hardly meet the scalability and performance requirements of data centers (DCs). The traditional method solves the congestion problem by reducing the network throughput. In this paper, based on software-defined networks (SDNs) technology,...
Inferring fine-grained link metrics by using aggregated path measurements, known as network tomography, is essential for various network operations, such as network monitoring, load balancing, and failure diagnosis. Given a set of interesting links and the changing topologies of a dynamic network, we study the problem of calculating the link metrics of these links by end-to-end cycle-free path measurements...
This paper proposes a mixed-integer quadratic programming (MIQP) model for optimal day-ahead distribution networks dispatch considering Wind Generators (WGs) and topology reconfiguration. Firstly, linearized current injection model is introduced for generators by a series of approximations. Then the day-ahead Switching Operations (SOs) of reconfiguration could be calculated in a linear form based...
Virtual Network Embedding (VNE) problem has been widely considered as an important challenge in Network Virtualization (NV): how to embed virtual networks onto the shared substrate network effectively and efficiently. Previous VNE algorithms, only considering single network topology attribute and local resource of each node, may lead to inefficient resource utilization of the substrate network in...
This paper studies the distributed coordinated tracking problem for multiple Euler-Lagrange systems (MELSs) with full-state constraints. Firstly, a distributed finite-time sliding-mode estimator (DFSE) is introduced to access precise estimations of the leader's position and velocity. Then, to guarantee the full-state constraints of MELSs, we use the barrier Lyapunov function (BLF) technique and a...
Task mapping is an important problem in parallel and distributed computing. The goal in task mapping is to find an optimal layout of the processes of an application (or a task) onto a given network topology. We target this problem in the context of staging applications. A staging application consists of two or more parallel applications (also referred to as staging tasks) which run concurrently and...
This paper presents algorithm for optimal reconfiguration of distribution networks using hybrid heuristic genetic algorithm. Improvements introduced in this approach make it suitable for real-life networks with realistic degree of complexity and network size. The algorithm introduces several improvements related to the generation of initial set of possible solutions as well as crossover and mutation...
A wireless mesh network (WMN) is a set of three kinds of nodes: clients, routers and gateways. One of the most challenging issues when dealing with a WMN is how to deploy mesh routers when the positions of mesh clients are known. In this paper, we consider a dynamic router node placement problem where, in addition, mesh clients are mobile. To solve this issue, we apply the simulated annealing metaheuristic...
The existing privacy-preserving data aggregation methods in wireless sensor networks (WSNs) generally rely on a network infrastructure, and data privacy is achieved by encryption techniques. However, such an infrastructure is very susceptible to the dynamic network topologies, and excessive encryption process causes a high energy consumption and re-duces the accuracy of the aggregation results. In...
Graph filters, which are considered as the workhorses of graph signal analysis in the emerging field of signal processing on graphs, are useful for many applications such as distributed estimation in wireless sensor networks. Many of these tasks are based on basic distributed operators such as consensus, which are carried out by sensor devices under limited energy supply. To cope with the energy constraints,...
In order to solve the problem of instability clustering in Ad Hoc Networks with complex and changeable node motion, this paper proposes a weighted clustering algorithm based on node stability(SA-WCA). In this algorithm, we propose a node stability factor based on node received power, which does not need to calculate the specific distance between nodes and can only judge the relative motion between...
We present a heuristic algorithm to address the optimization problem of routing and spectrum allocation, aimed at traffic protection and restoration in an elastic optical network. The algorithm searches for working and backup disjoint paths, using the shared path protection scheme. It divides the spectrum into two partitions and prioritizes slots in one of them for backup path traffic. The way the...
In this paper, a new routing strategy named as Distributed Multiple Path (DMP) routing strategy is proposed. To yield a high-efficiency transmission performance, the proposed DMP routing strategy utilizes the information of static network topology, as well as that of dynamic network transmission status. Specifically, for each of the routing Origin-Destination (O-D) node pairs, the DMP routing strategy...
This paper focuses on consensus of multi-agent systems with leader-following and unknown nonlinear dynamics under heterogenous topologies. First of all, we give a control algorithm for the condition that the system without leader under heterogeneous topologies. Sufficient conditions in terms of linear matrix inequality (LMI) are established to guarantee distributed consensus of multi-agent systems...
In this paper, the containment control problem in second-order multi-agent systems for static and dynamic leaders under directed and undirected topologies are studied. We propose the periodic intermittent containment control algorithm, which both reduces the load of updating rates of controller and cuts down the working time of the controller in each sampling interval. Some necessary and sufficient...
Spatial outlier detection in wireless sensor network (WSN) can detect the objects whose non-spatial attributes are significantly different from their spatial neighbors, so as to ensure the reliability and accuracy of sensor data before decision-making process. The main drawback of existing spatial outlier detection algorithms is high user-dependency, which is not suitable for dynamic WSN data. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.