The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automotive functions require validation of the underlying network in advance. Especially driver assistance functions may require hard time bounds concerning their communication infrastructure. In several works analytical models have been introduced, enabling the calculation of worst case delays for realtime applications using Ethernet as communication technology. On the other hand considerable effort...
MapReduce is an important paradigm to support modern data-intensive applications. In this paper we address the challenge of modeling performance of one implementation of MapReduce called Hadoop Online Prototype (HOP), with a specific target on the intra-job pipeline parallelism. We use a hierarchical model that combines a precedence model and a queuing network model to capture the intra-job synchronization...
Cloud computing enables shared servers to provide resources, software and data for collaborative services on demand with high interoperability and scalability. However, there are a number of technical challenges that need to be tackled before these benefits can be fully realized, which include system reliability, resource provisioning, and efficient resources consuming, etc. Among them, load-balancing...
VHF radio systems commonly used to support search and rescue activities after disasters limit the flow of information among response teams deployed in the field. It generates islands of information that jeopardizes the coordination and effectiveness of the response activities. This article proposes a communication model that uses opportunistic networks and real-time messages delivery to help address...
Due to limited storage capacity in the DTN nodes, storage congestion occurs when too many bundles are contending for this scarce resource. As a result, bundle loss increases and the delivery ratio of the network suffers. In a proactive scheme, a node can decide whether to accept or reject the custody of a new bundle based on its current storage status. In this paper, we propose a novel proactive congestion...
Traffic signal control is a challenging task for traffic systems. As fuzzy logic is proved to be well suited to control some complex systems with uncertainties and human perception, it has been widely used to control the traffic signal in recent years. This paper proposes a novel fuzzy logic controller for signalizing modern roundabouts. Different from existing fuzzy traffic-signal controllers, the...
The Proto spatial programming language abstracts the distributed execution of programs as evaluation of space-time functions over dynamically defined subspaces on a manifold. Previously, however, function evaluation has always been defined in terms of a complete in lining of expressions during compilation. This simplified the definition of programs, at the cost of limiting expressiveness and duplicating...
Cognitive networks use context aware as its basic approach to realize intelligent decision-making and network reconfiguration, thus, context aware becomes a worthy researching field. However, the current existing context aware schemes are almost general and indistinct. In this paper, a novel practical design of context aware based on DEF variable length equalizer (VLE) is proposed. By perceiving the...
Distributed systems benefit substantially from the ability to exchange jobs between temporarily heavily and lightly loaded nodes. Depending on whether the lightly or heavily loaded nodes initiate the job exchange, such strategies are termed pull or push strategies. In this paper we compare the performance of an aggressive push strategy with the more traditional pull strategies in large distributed...
Noise simulators were never accurate estimators of interconnect noise values as the switching pattern, slew and delay in a cluster of adjacent nets were never addressed. In modern signal integrity flows, a very high level of pessimism is incorporated into the noise methodology to augment the lack of accuracy, such as lumped aggression, noise ramps and lumped slews. Desirably, such pessimistic assumptions...
In this paper we demonstrate the online applicability of the fault detection and diagnosis approach which we previously developed and published in [1]. In our former work we showed that a purely data driven fault detection approach can be successfully built based on monitored inter-component communication data of a robotic system and used for a-posteriori fault detection. Here we propose an extension...
This paper proposed a random multi-access protocol STPRM-A (slotted three-dimension probability random multi-access protocol with acknowledgement) for wireless communication. Performance of STPRM-A was evaluated by mathematical expression of channel throughput and delay of packet. The characteristic comparison between STPRM-A and PDPMRM was present. Experiment and simulation results validated correction...
Opportunistic networks are an evolution of MANETs, where highly mobile nodes that have no physical route connecting them might need to communicate. In this case routes are built dynamically, as nodes act according to a store-carry-and-forward paradigm. A natural continuation of forwarding in opportunistic networks is data dissemination, which is usually performed using the publish/subscribe model...
Multipath error is the most important unavoidable source of error contributing to the User Equivalent Range Error (UERE). It is difficult to model, but it is very necessary for us to describe signal multipath performance of Global Navigation Satellite System (GNSS). Multipath error envelope based on noncoherent early-late code tracking loop has become a common approach to describe the effects of specular...
In this paper, we propose and analyze an analytical propagation model of a vulnerability mitigation worm (Seawave). The model takes into consideration the topology structure of enterprise networks such as switches, LANs, and backbone, proposing the first computer worm that use layer two of the OSI model as its main propagation medium. The model also addresses the worm's communication delays due to...
Mobile Ad hoc network (MANET) is a multi-hops wireless network without fixed infrastructure. Now how to evaluate network survivability performance is the key work of the research of MNAET. According to the requirement of the survivability of MANET, a more comprehensive hierarchical model for quantitative evaluation of survivability is proposed. The model was constructed based on continuous time Markov...
This paper presents the new result in the Trajectory approach when considering more than one packet of a sporadic flow is overstocked on an output port for an AFDX network, using the FIFO assumption. The principal contribution is to compute upper bounds of end-to-end delays for the processing flows by the recursive calculation of interference time windows. The paper proposes a memo recursive computation...
Manipulation of wire sizing, buffer sizing, and buffer insertion are a few techniques that can be used to improve time delay in very large scale integration (VLSI) circuit routing. This paper enhances an existing approach, which is based on Particle Swarm Optimization (PSO) for solving routing problem in VLSI circuits. A two-step Binary Particle Swarm Optimization (BPSO) approach, which is based on...
As the complexity of the influence factors of the equipment using process and the problems of the existing models, we delaminate the process and describe each of them with models, then we advance the all-purpose Task-Model and bring forward the task logical flow. We analyze the characteristics of the High Level Architecture (HLA) and advance the frame of the equipment using process simulation system.
We present a new model order reduction technique for electrically large systems with delay elements, which can be modeled by means of neutral delayed differential equations. An adaptive multipoint expansion and model order reduction of equivalent first order systems are combined in the new proposed method that preserves the neutral delayed differential formulation. An adaptive algorithm to select...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.