The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the process of multi index analysis and evaluation, the index weight is determined according to each index relative principal component contribution through principal component analysis and principal component extraction. Then, combined evaluation model will be formed through the Grey Relational Analysis, calculation of each index according to grey weighted relative degree. Combined with key performance...
Future distribution networks in Australia are likely to include large volume of medium scale concentrated solar power (CSP) plants. Like other renewable resources such as photovoltaic (PV) and wind, CSP has a variable output. To plan the power system's reserves with variable generator like CSP, it is important to study the long term energy yield in detail. Moreover, the long term energy yield is the...
Dynamic program analysis is a technique which records a program execution for the purpose of analyzing its behavior and building high-level models and views. This paper presents an approach to build a high-level model of the behavior of a PLC program component as observed in a program execution. Based on a deterministic record and replay technique, a model is synthesized which represents the transition...
Programming of high performance computing systems has become more complex over time. Several layers of parallelism need to be exploited to efficiently utilize the available resources. To support application developers and performance analysts we propose a technique for identifying the most performance critical optimization targets in distributed heterogeneous applications. We have developed CASITA,...
Any path routing has been proposed as a new routing paradigm for enhancing the performance of Wireless Mesh Networks (WMNs) by exploiting the inherent broadcasting and spatial diversity properties of a wireless medium. This routing paradigm is based on a MAC protocol which provides an any cast transmission capability and therefore allows each node to send its packets to any candidate neighboring node...
In this paper, our aim is to stabilize an Active Queue Management (AQM) Algorithm that aims to achieve low loss rate and high throughput as well as high link utilization. We have tried to study about stabilization of Random Early Detection (RED) for different models. Further, we have presented comparative performance analysis of existing stabilized models with our modified RED. The key idea is to...
To provide seamless Source mobility support in the NDN (Named Data Networking) architecture, we propose a Proxy Based Mobility support Approach, dubbed PBMA. In this approach, we deploy a Proxy to maintain the mobility status of the Source, and suppose the Proxy is continuously active in transmitting or caching Interest packets in the person of the Source. For that, we assign a layered ID to each...
The most important thing to workflow management is modeling business processes. It can ensure the correctness after model is put to use only when efficient modeling technology is used to build complex business processes. On the one hand the readability of model represented can be improved on the other hand it is convenient to the model performance analysis. This paper points out that the strict semantic...
Wireless Sensor Networks (WSNs) have their profound applications almost in all possible fields to facilitate automation. All WSNs contain low powered nodes for sensing information about the environmental conditions and incessant reporting to the base station. Security is a very essential and critical criterion for communication. The nodes must be trust worthy and believable for routing sensed information...
The performance analysis of a parallel application can be a difficult task. Specially in the case that this application is an operational atmospheric-chemistry model there can be multiple performance bottlenecks caused from different fields. Although the exascale era is coming, the applications are not ready to take advantage of all the new technologies and programming models. It is needed to improve...
The present work describes the analysis and optimisation of the PELAGOS025 configuration based on the coupling of the NEMO physic component of the ocean dynamics and the BFM (Biogeochemical Flux Model), a sophisticated biogeochemical model that can simulate both pelagic and benthic processes. The methodology here followed is characterised by the performance analysis of the original parallel code,...
Cloud computing is becoming popular as the next infrastructure of computing platform. However, with data and business applications outsourced to a third party, how to protect cloud data centers from numerous attacks has become a critical concern. In this paper, we propose a clusterized framework of cloud firewall, which characters performance and cost evaluation. To provide quantitative performance...
Theoretical tools are proposed to analyze the tracking error of a Boeing 737 closed-loop digital flight control system implemented on a class of distributed recoverable platforms subject to digital upsets which are used to describe a harsh environment. Markov upset processes are directly injected into the flight control system. Furthermore, the corresponding theoretical and simulation estimations...
Predicting IT infrastructure performance under varying conditions, e.g., the addition of a new server or increased transaction loads, has become a typical IT management exercise. However, within a service delivery context, enterprise clients are demanding predictive analytics that outline future “costs” associated with changing conditions. The service delivery staffing costs incurred in addressing...
The next generation of networks represents a heterogeneous wireless environment, characterized by the coexistence of multiple technologies. In this environment, the users have the privilege to use different services at any time and any where. In this context, the most important aim is to manage the terminal mobility while ensuring the best continuity of services. In order to achieve this task, the...
Fraud detection has become an important research topic recently. In a credit application, fraud can occur in forgery of documents or business processes. Fraud on the business process is known as Process-based Fraud (PBF). Previous studies proposed several detection methods of fraud in the business process model. This fraud detection includes analysis methods and an identification process. However,...
In this paper, the performance analysis of the model of gradient neural network (or termed G-type model), which was designed originally for solving constant linear equation, is investigated, analyzed and simulated for online solution of Zhang linear equation (ZLE or termed time-varying linear equation). Compared with the constant case, G-type model for online ZLE solving can only approximately approach...
With the development of wireless broadband access, OFDMA technology is widely used for the next generation telecommunication systems. In this paper, we focus on analyzing the performance of contention-based services in IEEE 802.16 OFDMA networks with bulk services. We derive various performance measures such as queue utilization in an subscriber station, probability of unsuccessful bandwidth request,...
Network-on-Chip (NoC) is the most promising communication architecture for modern System-on-Chip (SoC). A system level analysis with a sound NoC model may provide an efficient NoC implementation. In this paper, we propose an accurate NoC model for performance evaluation based on Timed and Colored Petri Net (TCPN). The TCPN provides a detailed modeling of discrete event systems, enabling further evaluation...
Two-tier femtocell networks are an efficient communication architecture that significantly improves throughput in indoor environments with low power consumption. Traditionally, a femtocell network is usually configured to be either completely open or completely closed in that its channels are either made available to all users or used by its own users only. This may limit network flexibility and performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.