The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies how to extract and group essential nodes to guarantee loop freedom during the update of the network, while minimizing update time. We propose a model to establish the relationships of loops which may arise during the updating procedure. Given the model, we design a heuristic algorithm, with the recursive optimizing for the relationships, to extract essential nodes for the loop-free...
Empowered by the orthogonal frequency division multiplexing (OFDM) technology, elastic optical networks (EONs) have emerged as a promising solution for future high-speed networks. Routing and spectrum allocation (RSA) is one of the key challenges to the design of EONs. An adaptive RSA is required to meet the robustness objective of EONs. The relative cost concept can be used to implement an adaptive...
This paper proposes a new mobile phone user authentic scheme. It discerns a particular user by the smartphone sensor data which is collected when he picks his phone up from table. The data from phone sensors which collected by preprocessing method, it includes denoising, interception and normalization. Precondition the sensor data with denoising and signal truncating technology, then normalize it,...
Current network architecture suffers overloading due to extensive resource utility. This paper proposes a resource mapping algorithm upon service layer of service-based network: the unit of service component requests resource as well as limits; an agent is embedded in the component to surveil the utility of network resource. If network resource violates the limits, agent will punish the component...
The stability analysis of evolutionary algorithms is considered to be an important research topic. DE is among the effective and popular, continuous optimization algorithm. In this paper, the stability analysis for DE has been carried out. As outcome of this stability analysis, DE parameters' optimal choice has been suggested.
Commercial clouds are quickly becoming the goto platform for hosting on-demand and dynamically scalable services for scientific analyses and computation. Dynamic provisioning of resources is a critical element when utilising the cloud for executing large-scale and complex scientific analyses. In particular, hosting and managing data intensive applications on the cloud raises new challenges in terms...
The analysis of the temporal evolution of dynamic networks is a key challenge for understanding complex processes hidden in graph structured data. Graph evolution rules capture such processes on the level of small subgraphs by describing frequently occurring structural changes within a network. Existing rule discovery methods make restrictive assumptions on the change processes present in networks...
The construction of cut trees (also known as Gomory-Hu trees) for a given graph enables the minimum-cut size of the original graph to be obtained for any pair of vertices. Cut trees are a powerful back-end for graph management and mining, as they support various procedures related to the minimum cut, maximum flow, and connectivity. However, the crucial drawback with cut trees is the computational...
In real-time multicast, delay and inter-destination delay variation of group members are bounded above by a value. The problem is known as Delay and Delay Variation Bounded Multicast Tree (DVBMT), which is proven to be NP-complete. In this paper, we propose a directional approach (DCS) for core selection and tree generation satisfying delay and inter-destination delay variation constraints. After...
The energy consumption of a data center and hence the carbon footprint from it largely depends on the energy consumption by its active Physical Machines (PMs). Researchers have taken many attempts to minimize the data center energy consumption through the Virtual Machines (VMs) allocation into a minimal number of PMs of homogeneous types. However, the current VM placement strategies do not consider...
We consider Boolean networks defined on directed graphs in which the state of every node belongs to the set {0; 1}. We think of a node in state 1 as having ‘failed’. The state of every node at the next time instant is a function of the states of those nodes that link to it. Nodes fail according to a set of rules, and once a node fails it stays so forever. We develop a mathematical framework that allows...
The research aims to design and implement an automatic speech recognition and synthesis system. A TMS320C6713 DSK Board manufactured by Texas Instrument (TI) is adopted as the system operation platform to support independent development, and the MATLAB software is adopted as the operation platform of the speech synthesis system. Moreover, the two platforms are integrated by a human machine interface...
Modern network functions (NFs) are able to scale out conveniently with the help of network function virtualization (NFV). When network traffic rises, NFV can provide more instances easily for migrating network flows to new instances to balance the traffic on the existing ones. However, the main challenge is to select which subset of existing flows to migrate when scale out, minimizing the negative...
Many influenced factors will directly or indirectly impact on system performance in a dynamic system. These factors are not always independent but interacted with each other. Therefore, it is an important issue for understanding the influence relationships of factors to improve the system performance. Fuzzy cognitive map (FCM) is one of analysis tools that it uses graphic network to show the causal...
The goal of Vehicle Routing Problems (VRP) and their variations is to transport a set of orders with the minimum number of vehicles at least cost. Most approaches are designed to solve specific problem variations independently whereas in real world applications, those constraints are handled concurrently. This paper describes a novel approach to solve variants of Open VRP, Multi Depot VRP, Capacitated...
Classical planning is the problem of synthesizing an executable sequence of actions to achieve the given goal from the given completely-specified initial state, assuming perfect perception, deterministic actions, and a static and fullyobservable environment. Domain-specific knowledge can be specified to improve the quality of plans or control search in plan synthesis or express user intent to get...
This work describes the Dynse framework, which uses dynamic selection of classifiers to deal with concept drift. Basically, classifiers trained on new supervised batches available over time are add to a pool, from which is elected a custom ensemble for each test instance during the classification time. The Dynse framework is highly customizable, and can be adapted to use any method for dynamic selection...
This paper focuses on dynamic performance control of modular multilevel converters (MMC) in high-voltage direct current (HVDC) transmission systems. To achieve this objective, a new mathematical model including six state variables of ac-currents and dc-link voltage of MMC, and circulating currents of converter arms are proposed for MMC in d-q reference frame. In addition, a robust control technique...
Ultra Wideband Real-Time Location System (UWB RTLS) is a real-time positioning system with high precision, which contains a number of positioning tags and anchors, and the collision between multi tags is the main reason that affects the communication efficiency and positioning accuracy in UWB RTLS. The ALOHA algorithm and the binary tree algorithm are the mainstream of the anti-collision algorithm...
In a cognitive radio (CR) network, a secondary user learns the spectrum environment and dynamically accesses the channel where the primary user is inactive. At the same time, a primary user emulation (PUE) attacker can send falsified primary user signals and prevent the secondary user from utilizing the available channel. Although there is a large body of work on PUE attack detection and defending...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.