Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicate...
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicated. It calls for the network operators to grapple with low-level vendor particular arrangements to execute the high degree network policies which are complicated. A method for monitoring networks with OpenFlow controller is presented in this paper in two separate functions for the same networks. Bandwidth utilization, Meter values, charts and statistics are provided by the method to extend controller monitoring capabilities. The method architecture and implementation will be introduced in order to present the feature set. Additionally, softswitches are used as a switch and Mininet to evaluate a virtualized network. This analysis shows whether Meters or ports value is better for network management.
“The cloud“ points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and s...
“The cloud“ points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and servers reply, but cloud computing is distinct in the form that cloud servers are not just replying to requests with on-demand processing but they are saving data and running programs instead of the client. Cloud computing is a technology that is crossing a great expansion today. In cloud computing you can dynamically expand resources without knowledge of a new infrastructure, without developing new software or preparing new staff and to access such great technology the only things that are asked for are an Internet connection and an Internet browser. The goal of this survey is to present the different cloud security threats and recognize the proper security mechanism used to reduce them.
The paper presents project and its verification of a prototype integrated circuit containing an analog, programmable finite impulse response (FIR) filter, implemented in CMOS 350 nm technology. The structure of the fi...
The paper presents project and its verification of a prototype integrated circuit containing an analog, programmable finite impulse response (FIR) filter, implemented in CMOS 350 nm technology. The structure of the filter is based on the switched capacitor technique. In circuits of this type, one of main challenges is an efficient implementation of filter coefficients, which result from several factors described in this work. When implementing such filters as programmable circuits, the values of their coefficients have to be limited to a selected range, i.e. a given resolution in bits. In the implemented prototype filter, the filter coefficients are represented by 6 bits in sign-magnitude notation, so they can take 63 different values only. In such filters, it is not possible to directly implement any frequency response of the filter. Each time, it is necessary to properly round the theoretical values of the coefficients so that they fit into the available range of discrete values resulting from the implementation. The authors of the work designed an algorithm that allows such matching. The paper also presents results of measurements of the prototype chip.
This paper focuses on the problem of resilient phase angle stabilization and frequency synchronization in converter-based microgrids, utilizing phasor measurement units (PMUs), in the presence of false data injection ...
This paper focuses on the problem of resilient phase angle stabilization and frequency synchronization in converter-based microgrids, utilizing phasor measurement units (PMUs), in the presence of false data injection (FDI) cyberattacks. The uniformly bounded cyber-attack signals are inserted to desynchronize converters and violate frequency constraints by manipulating control input channels. To tackle this issue, a resilient and robust cooperative angular control scheme is proposed by modifying the conventional angular control method and incorporating some auxiliary states interconnecting with physical states. By presenting the converter dynamics along with the proposed controller as a port-Hamiltonian (pH) system, the design considerations of the interconnection matrices are outlined. Theoretical analysis using input-output passivity and $H_{\infty}$ norm performance index are carried out to guarantee asymptotic stability and resilient frequency synchronization against FDI attacks. The performance and effectiveness of the proposed control scheme are evaluated through numerical simulations
Event-based cameras are inspired by the way the retina in the eye process information. Rather than capturing image frames at a constant rate, event cameras generate data asynchronously, based on changes in pixel value...
详细信息
It is well known that nowadays children tend to spend lot of time playing games on mobile devices at the expense of reading books. The current research aims to explore ways to design and develop a mobile application, ...
It is well known that nowadays children tend to spend lot of time playing games on mobile devices at the expense of reading books. The current research aims to explore ways to design and develop a mobile application, attractive for children, that uses voice recognition technology and gamification techniques to help children read more and better and to track the progress of reading. The application is implemented with Flutter, Dart and Firebase and is addressed to children, the books being made available in encyclopedia format. By integrating technologies such as NLP and gamification the application aims to improve reading fluency among children, but also to give them the opportunity to accumulate new and exciting information in the same time.
Diagnosing neurological disorders and tracking rehabilitation progress requires objective, quantitative measures. Isokinetic exercises are commonly employed to evaluate muscle strength and activity. However, repetitiv...
详细信息
Artificial intelligence (AI) is critical in evolving 5G and developing 6G networks, running on edge devices, and solving resource management challenges. The burgeoning number of edge devices draws attention to the pot...
详细信息
ISBN:
(数字)9798350362244
ISBN:
(纸本)9798350362251
Artificial intelligence (AI) is critical in evolving 5G and developing 6G networks, running on edge devices, and solving resource management challenges. The burgeoning number of edge devices draws attention to the potential of low-earth orbit (LEO) satellite networks with their onboard computing capabilities for edge inference. This paper explores LEO scenarios where multiple remote sensing edge AI inference tasks concurrently process data from a single source. However, due to there being parts with the same functions between different AI applications, traditional monolithic edge AI architecture must be deployed repeatedly and falls short in efficiently harnessing the heterogeneous resources of LEO satellite networks. To solve this problem, we utilize the microservice architecture to decouple a single AI application into several independent microservices to reuse these same functions. However, due to the high latency caused by multiple microservices’ communication, we need to design a deployment strategy to fully utilize resources to reduce the service latency. We present a microservice deployment model to minimize the total service latency across all AI applications and meet resource constraints with the constraints of hardware, energy, and memory limitations. This latency optimization problem is rewritten as a Markov decision process (MDP) to effectively deal with the challenge posed by the time-varying transmission rate caused by satellite mobility. To increase the training data utilization, we employ a Proximal Policy Optimization (PPO) based reinforcement learning algorithm to meet the dynamic environment challenge. Finally, we obtain a sub-optimal solution with minimal accuracy loss and an acceptable solution time.
In this paper we propose a consensus model using fractional calculus, which is an emerging topic in multi-agent modeling. Fractional models have infinite memory and can be understood as a relatively simple extension o...
In this paper we propose a consensus model using fractional calculus, which is an emerging topic in multi-agent modeling. Fractional models have infinite memory and can be understood as a relatively simple extension of traditional calculus. We propose a model structure motivating it by psychological research. For such model we also provide a stability analysis allowing results on possibilities of consensus arising in the modelled group of agents. To achieve this, we use fractional difference equations, which illustrate our considerations for agent groups of increasing complexity.
The development area of web technologies has gained great popularity due to the power with which these new technologies can manage resources and due to developers or experts of various types who can build applications...
详细信息
暂无评论