The implementation of energy smart grids encompasses local area energy distribution to a fine grained network of locations. For many years, at this level of last mile energy consumption, smart grid management is an in...
详细信息
The implementation of energy smart grids encompasses local area energy distribution to a fine grained network of locations. For many years, at this level of last mile energy consumption, smart grid management is an inexistent concept, because little (or none at all) feedback is given from final consumer installations to utility infrastructure. Traditionally because installed energy meters where purely electromechanical systems, energy metering has been addressed by manual methods with few automated processes. In recent years a number of new electronic interface meter have been installed. These modern meter equipments are able to store, process and communicate using digital data formats. In this context the Automated Meter Reading (AMR) together with Advanced Meter Infrastructure (AMI) concepts have fundamental importance to implement reliable, on-line/real-time evaluated energy grids. Implementing an AMI may be done using the infrastructure of digital interface meters, thus maintaining compliance with existing protocols and digital formats.
Demand for fast failure recovery in modern IP-based networks has become compelling recently. Loop-Free Alternates (LFA) is a simple IP Fast ReRoute (IPFRR) specification proposed by the IETF that does not require prof...
详细信息
Demand for fast failure recovery in modern IP-based networks has become compelling recently. Loop-Free Alternates (LFA) is a simple IP Fast ReRoute (IPFRR) specification proposed by the IETF that does not require profound changes to the network infrastructure before deployment. However this simplicity has a disadvantage, in that usually LFA does not provide complete protection for all possible failure cases in a general topology. The LFA graph extension problem asks for adding new links to the network in an attempt to improve the failure case coverage. Unfortunately, this problem is NP-complete. In this paper, we give a detailed graph model for this problem, for the first time formulating it both for the link and node protecting cases, and we propose several fast approximation algorithms to solve it. We compare the performance of the algorithms in extensive numerical studies and we conclude that the optimum can be approximated well in most cases relevant to practice.
Social networks have rapidly grown over the last years. The socio-technical information that they include may be exploited to improve the performance of the underlying communication network. This is of utmost importan...
详细信息
Social networks have rapidly grown over the last years. The socio-technical information that they include may be exploited to improve the performance of the underlying communication network. This is of utmost importance especially in Next Generation Networks (NGNs), which provide multiple services with increased bandwidth requirements. In this paper, the problem of resource allocation in a bottleneck link of a NGN is examined. To this end, a utility based technique is proposed, which integrates the information of an overlaid social network expressed by the social distance parameter. In this case, the utility function employed is reformed, so as to incorporate this parameter, which in this study is determined by the users' average popularity. Network users are classified into friendship classes according to the social distance parameter. Then, the users' resource allocation objective is formulated as an optimization problem with inequality constraints. Due to the increased problem's complexity, a numerical method is employed to estimate the optimal resource allocation. Numerical results are presented, which indicate the impact of the social distance parameter on resource allocation.
In recent years, following the deployment of WDM networks, fault detection and localization has become a challenging issue in networks with high reliability. Optical layer monitoring schemes based on monitoring trail ...
详细信息
In recent years, following the deployment of WDM networks, fault detection and localization has become a challenging issue in networks with high reliability. Optical layer monitoring schemes based on monitoring trail (m-trail) is considered a promising approach localizing single link failure unambiguously in all optical networks. Although the extensive works on the m-trail concept, the issue has not been validated from the feasibility point of view. Previous works on the m-trail monitoring scheme have focused on algorithm design for minimizing the number of monitors, however, none of them has observed the physical limitations. In this paper, we investigate the physical constraints on launching m-trails, mainly focusing on the maximum length each m-trail may have. Numerous simulations were implemented in VPI Transmission Maker Simulation Tool for observing qualitative parameters in different m-trail length. In our simulation, we could validate the feasibility of 15000 km long m-trails when out-of-band monitoring is used.
Internet usage has increased drastically in the past years due to the emergence of new services and applications such as voice, video streaming, video-conference, e-banking, etc. As the number of Internet users increa...
详细信息
Internet usage has increased drastically in the past years due to the emergence of new services and applications such as voice, video streaming, video-conference, e-banking, etc. As the number of Internet users increased, the number of illegal activities, like spam, data and identity theft, among others, also increased in an exponential way. Identifying Internet applications became a very important task for several purposes, such as traffic engineering, quality of service, network optimization and, obviously, security. Several identification methodologies have been proposed, ranging from simple approaches like port-based methodologies to more generic approaches, like protocol statistical analysis. However, the frequent use of traffic encryption does not allow to perform inspection based on the packet payload, triggering the need for new methodologies that can provide an accurate mapping of traffic to their generating protocols based only on traffic flow statistics. This paper presents an identification methodology that relies on a multi-scale analysis of sampled traffic flows, enabling the identification of illicit activities on encrypted communications scenarios. Several multi-scale quantifiers are obtained from the multi-scale analysis of captured flows and the classification of these flows is then based on identifying the time-scales where the different multi-scale quantifiers are better discriminated. Two different approaches are used in the classification procedure: one that is based on the distances between the quantiles of the empirical distributions, assuming that the multi-scale quantifiers follow a generic probability distribution, and another methodology that assumes that the multi-scale quantifiers follow Gaussian Distributions. The methodology was applied to some of the mostly used licit Internet applications and two popular illicit applications, and the results obtained show that the proposed approach is able to accurately classify Internet traffic and
To predict the throughput of the cluster tool and simulate the system operation process,the paper develops a simulation platform,named as *** provides the easy-to-use interface to accept user's input about the clu...
详细信息
To predict the throughput of the cluster tool and simulate the system operation process,the paper develops a simulation platform,named as *** provides the easy-to-use interface to accept user's input about the cluster tool *** results that ClusterSim runs include the wafer foundation period,the lot period,chamber utilization,and *** output of ClusterSim is verified using Perkinson's *** result indicates this platform is *** provides an effective tool for users to analyze the cluster tool performance and validate feasibility of some routine recipe.
The Internet is a universal source of information for its users. However, obtaining desired content has become the main focus of interest rather than the communication with machine endpoints. The increased availabilit...
详细信息
The Internet is a universal source of information for its users. However, obtaining desired content has become the main focus of interest rather than the communication with machine endpoints. The increased availability of mobile devices makes such desired access continuous in time and space, adding an extra dimension and level of complexity for satisfying users' needs. Together with the almost ubiquitous availability of computing and storage resources, this has led to efforts that focus on disseminating information to a possibly changing set of consumers. In this paper, we revisit several strands of IP mobility work with respect to the benefit when being seen from an information-centric networking (ICN) angle. We present a set of architecture invariants together with a functional model, both of which allow for formulating the various concepts of mobility from an ICN angle. We furthermore present and evaluate two approaches to support mobility in ICN, a proactive one based on prefetching subscriptions to possible reconnection points of a mobile node and a reactive one based on buffer relocation. Finally, we also outline various challenges in evaluating such approaches, these challenges caused by the paradigm change that ICN constitutes.
The prestressed concrete beams are increasingly widely used in bridges, large span building structures, so old prestressed structural safety of the performance testing is increasingly important. Because nondestructive...
详细信息
ISBN:
(纸本)9781424451944
The prestressed concrete beams are increasingly widely used in bridges, large span building structures, so old prestressed structural safety of the performance testing is increasingly important. Because nondestructive detection testing do not damage the structure itself, it is one of the best detection methods. Through the five prestressed concrete beams static load test, measured the deflection and strain. The results show that, through the beam deflection, strain and other modal parameters of the test can effectively identify the health status of prestressed concrete beams for the bridge in the future provide a valuable reference for nondestructive testing.
In this paper, we propose a new study of the robot control by using model following control system (MFCS). With the MFCS method M45], we obtain a simple input control law. The bounded property of the internal states f...
详细信息
ISBN:
(纸本)9781424451944
In this paper, we propose a new study of the robot control by using model following control system (MFCS). With the MFCS method M45], we obtain a simple input control law. The bounded property of the internal states for the control is given and the utility of this control design is guaranteed. Finally, examples are given to illustrate the effectiveness of the proposed method, and MFCS control techniques are applied to robot control synthesis problems.
This paper, we propose a new design of linear descriptor discrete time mechanical system control law by using model following control system (MFCS). In previous studies, a method of MFCS was proposed by S. Okubo [11[2...
详细信息
ISBN:
(纸本)9781424451944
This paper, we propose a new design of linear descriptor discrete time mechanical system control law by using model following control system (MFCS). In previous studies, a method of MFCS was proposed by S. Okubo [11[2]. In this paper, the method of MFCS will be extended to discrete time descriptor mechanical system. The bounded property of internal states for control system is given and utility of this control design is guaranteed. In this case, a new criterion is proposed to ensure that internal states are stable.
暂无评论