In transparent wavelength routed optical networks, the signal quality degrades due to physical layer impairments. Certain physical effects make routing decisions made for one lightpath affect and be affected by the de...
详细信息
ISBN:
(纸本)9781424448258
In transparent wavelength routed optical networks, the signal quality degrades due to physical layer impairments. Certain physical effects make routing decisions made for one lightpath affect and be affected by the decisions for other lightpaths. To safely establish a lightpath for a new connection two main approaches can be used. The most common approach is to select a lightpath that has acceptable transmission quality under the worst case interference assumption. This ensures that the selected lightpath will not become infeasible due to the possible establishment of future interfering connections, but it sacrifices candidate path space for a quick and stable lightpath selection process. The second approach is to consider the actual current network utilization and account for the interference among lightpaths so as to perform a cross layer optimization between the network and physical layers. In the latter approach, the algorithm has to evaluate and check if the establishment of the new lightpath turns infeasible some of the already established connections. The question that arises is whether the performance benefits obtained through the second approach are worth the added complexity introduced by the cross-layer optimization required.
The book presents selected papers from Second International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications (SITAIBA 2023), held at Chihlee University of Techn...
详细信息
ISBN:
(数字)9789819777860
ISBN:
(纸本)9789819777853;9789819777884
The book presents selected papers from Second International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications (SITAIBA 2023), held at Chihlee University of Technology, New Taipei City during 7 – 9 December 2023. This book presents current research in information security, AI and deep learning applications, information processing, cyber-security and evidence investigations, and information hiding and cryptography.
Enterprise integration is significant for the enforcement of novel business models in an enterprise/industry. The great heterogeneity of systems/applications in the enterprise environment requires the introduction of ...
详细信息
Enterprise integration is significant for the enforcement of novel business models in an enterprise/industry. The great heterogeneity of systems/applications in the enterprise environment requires the introduction of interoperability aspects in order to resolve integration problems in a flexible and dynamic way. Our approach introduces an advanced enterprise semantic model representing both enterprise structure and available services, through the use of ontologies. The model is associated by a specific architecture that uses the above model in combination with state-of-the-art technologies such as Web services and workflows
This paper presents the current state of the art in Web3d multi-user technologies and more specifically networked virtual environment platforms that support the X3D standard, which are currently limited in number, and...
详细信息
This paper presents the current state of the art in Web3d multi-user technologies and more specifically networked virtual environment platforms that support the X3D standard, which are currently limited in number, and also the existing X3D browsers that enable these applications. Furthermore, this paper presents the architecture of a platform, called EVE, which was developed to support multi-user virtual environments and was initially based on VRML, as well as the implementation regarding the process of upgrading this platform in order to fully support the X3D standard, using the open-source Xj3D library. Finally, the benefits of shifting to the X3D standard are presented, and some of the problems that currently exist are discussed.
The Wireless Sensor Network(WSN)is a promising technology that could be used to monitor rivers’water levels for early warning flood detection in the 5G ***,during a flood,sensor nodes may be washed up or become fault...
详细信息
The Wireless Sensor Network(WSN)is a promising technology that could be used to monitor rivers’water levels for early warning flood detection in the 5G ***,during a flood,sensor nodes may be washed up or become faulty,which seriously affects network *** address this issue,Unmanned Aerial Vehicles(UAVs)could be integrated with WSN as routers or data mules to provide reliable data collection and flood *** light of this,we propose a fault-tolerant multi-level framework comprised of a WSN and a UAV to monitor river *** framework is capable to provide seamless data collection by handling the disconnections caused by the failed nodes during a ***,an algorithm hybridized with Group Method Data Handling(GMDH)and Particle Swarm Optimization(PSO)is proposed to predict forthcoming floods in an intelligent collaborative *** proposed water-level prediction model is trained based on the real dataset obtained fromthe Selangor River *** performance of the work in comparison with other models has been also evaluated and numerical results based on different metrics such as coefficient of determination(R2),correlation coefficient(R),RootMean Square Error(RMSE),Mean Absolute Percentage Error(MAPE),and BIAS are provided.
3 rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and Multicast Service (e-MBMS) uses Multi...
详细信息
3 rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and Multicast Service (e-MBMS) uses Multimedia Broadcast over a Single Frequency Network (MBSFN) operation in order to improve its performance. In MBSFN operation, data are transmitted simultaneously over the air from multiple tightly time-synchronized cells. Raptor codes have been standardized as the main application layer Forward Error Correction (FEC) method for e-MBMS due to the advanced error protection they offer and their overall performance. In this study, we investigate the application of FEC in MBSFN-enabled LTE cellular networks and we propose a new scheme that takes into account the properties of MBSFN in order to provide a more efficient operation of FEC during e-MBMS transmissions. The proposed scheme is compared with other file recovery methods and is evaluated against various network parameters in a realistic simulation environment.
In this work, we discuss a recently proposed approach for supervised dimensionality reduction, the Supervised Distance Preserving Projection and, we investigate its applicability to monitoring material's propertie...
详细信息
With the booming of multimedia services, the 3rd Generation Partnership Project (3GPP) has introduced the evolved Multimedia Multicast/Broadcast Service (e-MBMS) feature for LTE systems. The main objective of MBMS is ...
详细信息
With the booming of multimedia services, the 3rd Generation Partnership Project (3GPP) has introduced the evolved Multimedia Multicast/Broadcast Service (e-MBMS) feature for LTE systems. The main objective of MBMS is to introduce real broadcast distribution capabilities into cellular systems. This purposed 3GPP to introduce the MBMS over a Single Frequency Network (MBSFN) operation. In this work we investigate the provision of MBMS service over a combination of MBSFN and PTM transmission schemes. We focus on the file repair procedure, because the distribution of binary data via MBMS must result in 100% error-free downloaded files. In order to achieve this goal, MBMS offers a Forward Error Correction (FEC) mechanism. Our simulation results show that there are some file repair schemes that achieve better performance as far as different network configurations are concerned. Furthermore, we compare all the file recovery methods and evaluate them against various network parameters in a realistic simulation environment.
We design and implement various algorithms for solving the static RWA problem with the objective of minimizing the maximum number of requested wavelengths based on LP relaxation formulations. We present a link formula...
详细信息
We design and implement various algorithms for solving the static RWA problem with the objective of minimizing the maximum number of requested wavelengths based on LP relaxation formulations. We present a link formulation, a path formulation and a heuristic that breaks the problem in the two constituent subproblems and solves them individually and sequentially. The flow cost functions that are used in these formulations result in providing integer optimal solutions despite the absence of integrality constraints for a large subset of RWA input instances, while also minimizing the total number of used wavelengths. We present a random perturbation technique that is shown to increase the number of instances for which we find integer solutions, and we also present appropriate iterative fixing and rounding methods to be used when the algorithms do not yield integer solutions. We comment on the number of variables and constraints these formulations require and perform extensive simulations to compare their performance to that of a typical min-max congestion formulation.
暂无评论