With the recent increase in the number of Internet of things(IoT) services, an intelligent scheduling strategy is needed to manage these services. In this paper, the problem of automatic choreography of microservices ...
详细信息
With the recent increase in the number of Internet of things(IoT) services, an intelligent scheduling strategy is needed to manage these services. In this paper, the problem of automatic choreography of microservices in IoT is explored. A type of reinforcement learning(RL) algorithm called TD3 is used to generate the optimal choreography policy under the framework of a softwaredefined network. The optimal policy is gradually reached during the learning procedure to achieve the goal, despite the dynamic characteristics of the network environment. The simulation results show that compared with other methods, the TD3 algorithm converges faster after a certain number of iterations, and it performs better than other non-RL algorithms by obtaining the highest reward. The TD3 algorithm can effciently adjust the traffic transmission path and provide qualified IoT services.
This paper applies the model petri net method based on the semi-tensor product of matrices to colored petri net. Firstly, we establish the marking evolution equation for colored petri net by using the semitensor produ...
详细信息
This paper applies the model petri net method based on the semi-tensor product of matrices to colored petri net. Firstly, we establish the marking evolution equation for colored petri net by using the semitensor product of matrices. Then we define the concept of controllability and the control-marking adjacency matrix for colored petri net. Based on the marking evolution equation and control-marking adjacency matrix, we give the necessary and sufficient condition of reachability and controllability for colored petri net. The algorithm to verify the reachability of colored petri net is given, and we analyze the computational complexity of the algorithm. Finally, an example is given to illustrate the effectiveness of the proposed theory. The significance of the paper lies in the application of the model petri net method based on the semitensor product of matrices to colored petri net. This is a convenient way of verifying whether one marking is reachable from another one as well as finding all firing sequences between any two reachable ***, the method lays the foundations for the analysis of other properties of colored petri net.
In this study, the stability and stabilization problem of a colored Petri net based on the semitensor product of matrices is investigated. First, the marking evolution equation of the colored Petri net in a Boolean al...
详细信息
In this study, the stability and stabilization problem of a colored Petri net based on the semitensor product of matrices is investigated. First, the marking evolution equation of the colored Petri net in a Boolean algebra framework is established, and the necessary and sufficient condition for the stability of the equilibrium point of the colored Petri net is given. Then, the concept of the pre-k steps reachability set is defined and is used to study the problem of marking feedback stabilization. Some properties of the pre-k steps reachability set are developed. The condition of the stabilization of the colored Petri net is given. The algorithm of the optimal marking feedback controller is designed. The proposed method in this paper could judge the stability and stabilization of the colored Petri net by matrix approach. The obtained results are simple and easy to implement by computer. An example is provided to illustrate the effectiveness of the proposed method.
From Cyber Physical System (CPS) perspective, it is nature for the system to tightly couple the communications and computing aspects with its physical dynamics. In this paper, we investigate this characteristic for mu...
详细信息
In the paper, the electro-hydraulic system (EHS) is regulated by the proportional directional valve (PDV) which has nonlinearities such as the dead-zone. Furthermore, the effective bulk modulus varies with the tempera...
详细信息
This paper proposes a node localization algorithm of wireless sensor network based on Delaunay triangular subdivision, which is referred to as the Delaunay Rank Localization (DRL) algorithm. The algorithm constructs t...
详细信息
Popularity prediction of online video is widely used in many different scenarios. It can not only help video service providers to schedule video web sites,but also bring considerable profits on investment for both pro...
详细信息
Popularity prediction of online video is widely used in many different scenarios. It can not only help video service providers to schedule video web sites,but also bring considerable profits on investment for both providers and advertisers if popularity of online video is predicted accurately. However, online video popularity prediction still cannot have a satisfactory result, due to the complexity of many crucial factors especially of video distribution network. In this article, we extract seven factors from huge amounts of data about user behavior,establishing a new multiple linear regression model to initially predict online video popularity. After that, a multichannel video popularity dynamic scheduling model is proposed to schedule videos on which channel and what time to be broadcast, according to its popularity predicted by multiple linear regression model, ensuring that maximum the sum value of online video popularity of each channel. Experimental results on dataset obtained from Sohu Video, a video service provider in China, and real-world video flow in Sohu Video demonstrate that the proposed model is robust and has promising performance in predicting online video popularity, which is helpful for video service providers to schedule videos on web sites effectively in the future.
Dear editor,Recently, crossfire attack has been witnessed as a new distributed denial-of-service (DDoS) weapon that can effectively cut off the data connections between the chosen target area (wd) of servers and the e...
详细信息
Dear editor,Recently, crossfire attack has been witnessed as a new distributed denial-of-service (DDoS) weapon that can effectively cut off the data connections between the chosen target area (wd) of servers and the end hosts (H). The attack is launched by a network of bot (botnet) to drain bandwidth of persistent routes (PRs) in the indirect and lowrate data flooding towards the decoys that are located in upstream to the target, where the PRs are
Nine-degrees-of-freedom (9-DoF) object pose and size estimation is crucial for enabling augmented reality and robotic manipulation. Category-level methods have received extensive research attention due to their potent...
详细信息
Considering the joint channel estimation and data detection in time-varying orthogonal frequency division multiplexing (OFDM) and addressing transmission performance degradation induced by the severe inter-carrier i...
详细信息
Considering the joint channel estimation and data detection in time-varying orthogonal frequency division multiplexing (OFDM) and addressing transmission performance degradation induced by the severe inter-carrier interference (ICI) at very high speed, a new progressive iterative channel estimation scheme is proposed. To alleviate the error propagation of the inaccurate data due to ICI, the measurement subcarriers in the Kalman filter is designed to be extended from pilots subcarriers to all the subcarriers progressively through the iterations. Furthermore, in iteration process, the interference of the non-pilot data to the measurement subcarriers is considered to be part of noise in the modified Kalman filter, which improves the estimation accuracy. Simulation indicates that the proposed scheme improves the performance in fast time-varying situation.
暂无评论