In this paper, a novel approach for availability evaluation is presented. In order to precisely capture the features of practical network operation and improve the accuracy in the availability evaluation, the dependen...
详细信息
In this paper, a novel approach for availability evaluation is presented. In order to precisely capture the features of practical network operation and improve the accuracy in the availability evaluation, the dependency of network element failures is characterized by failure states (FS). For this purpose, a method that generating a failure state list for protection is developed and embedded in the proposed survivable routing algorithm such that the pre-defined connection availability can be guaranteed as simple as by protecting a single FS failure. Built on the availability evaluation a novel availability-constrained survivable routing algorithm, called Generalized Dedicated Protection (GDP), is introduced for circuit switched mesh networks. The proposed algorithm inherits the simplicity of dedicated protection mechanisms while offering the connection availability guarantee in presence of the network topological limitation that has been taken as the greatest challenge in the related research effort. Finally, extensive simulation is conducted to verify the advantages gained in the proposed GDP method compared with a number of previously reported counterparts.
This paper is focusing on rollover prevention to provide a heavy vehicle with the ability to resist overturning moments generated during cornering. A combined yaw-roll model including the roll dynamics of unsprung mas...
详细信息
Projects are living entities. They are born with the project idea and end with the project termination. The time in between can last for many years, in most of the cases, requiring continuous implementation and manage...
详细信息
Projects are living entities. They are born with the project idea and end with the project termination. The time in between can last for many years, in most of the cases, requiring continuous implementation and management effort. Over the time project changes on requirements change the implementation process and in turn the management process, the maintenance process and so on. In order to maintain qualitative and quantitative project results both the project implementation and management processes need to be adjusted in the overall project changes and environment. This adjustment can be made by using agile project management methodologies, defining processes based on the identification of the project goals, constraints and expatiations. Unfortunately that is not enough, and projects, especially software projects are still in implementation and management crisis. This paper presents the concept of process mutation on project management methodological frameworks as a supplementary method to the agile models and agility the concept.
We present a novel active mask framework for the segmentation of fluorescence microscope images of cells, and in particular, for the segmentation of the Golgi body as well as cell- volume computation. We demonstrate t...
详细信息
We present a novel active mask framework for the segmentation of fluorescence microscope images of cells, and in particular, for the segmentation of the Golgi body as well as cell- volume computation. We demonstrate that the algorithm is able to efficiently segment a stack of images and successfully assign multiple pieces of the Golgi body in a 2D image to the cell to which they belong. Further, we demonstrate that our algorithm is more accurate than manual segmentation of these images.
In this paper, we propose a novel architecture of photo core transform (PCT) which is used as transformation of image data into frequency domain in HD Photo, an emerging image coding system developed by Microsoft. In ...
详细信息
In this paper, we propose a novel architecture of photo core transform (PCT) which is used as transformation of image data into frequency domain in HD Photo, an emerging image coding system developed by Microsoft. In order to support various memory bus bandwidths used in system-on-a-chip (SoC) design, an implementation for each bandwidth can be derived based on our architecture. In addition, in order to reduce the local memory size and the traffic between the main and local memories, we propose a novel data transfer and storing scheme for PCT. The experimental results show that hardware modules corresponding to the given bus bandwidths can be reasonably derived from the proposed architecture.
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring tha...
详细信息
ISBN:
(纸本)9781424429165
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are often physically exposed to potential adversaries who may manipulate them and therefore compromise the security of the system. Such attacks can be detected by continuous and secure sensor monitoring. The proposed scheme is based on the Kerberos protocol for dealing with sensor authentication issues. Using authenticated control/data packets its functionality has been extended to provide secure sensor monitoring, which can help in detecting physical attacks on the sensor itself.
Multicasting is an efficient way for delivering rich multimedia applications to large user groups as it allows the transmission of packets to multiple destinations using fewer network resources. Content and service pr...
详细信息
ISBN:
(纸本)9781424411436
Multicasting is an efficient way for delivering rich multimedia applications to large user groups as it allows the transmission of packets to multiple destinations using fewer network resources. Content and service providers are increasingly interested in supporting multicast communications over wireless networks and in particular over Universal Mobile Telecommunications System (UMTS). To this direction, the third Generation Partnership Project (3GPP) is currently standardizing the Multimedia Broadcast/Multicast Service (MBMS) framework of UMTS. In this paper, we present an overview of the MBMS multicast mode of UMTS. We analytically present the multicast mode of the MBMS and analyze its performance in terms of packet delivery cost under various network topologies, cell environments and multicast users' distributions. Furthermore, for the evaluation of the scheme, we consider different transport channels for the transmission of the data over the UTRAN interfaces and propose a cost based scheme for the efficient radio bearer selection that minimizes the packet delivery cost.
The content-based publish/subscribe (pub/sub) paradigm for system design is becoming increasingly popular, offering unique benefits for a large number of data-intensive applications. Coupled with the peer-to-peer tech...
详细信息
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresses the need for the efficient usage of ...
详细信息
ISBN:
(纸本)9781424415205
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresses the need for the efficient usage of the expensive radio resources. Power control is one of the most important aspects in MBMS due to the fact that Node B's transmission power is a limited resource and must be shared among all MBMS users in a cell. Consequently, the analysis of transmitted power plays a fundamental role in the planning and optimization process of Universal Mobile Telecommunications System (UMTS) radio access networks. This paper investigates several factors affecting Node B's transmission power levels such as, cell deployment, propagation models, Quality of Service (QoS) requirements, users' distributions and mobility issues. Finally different transport channels for the transmission of the multicast data over the UTRAN interfaces are considered.
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasingly interested in supporting multicast ...
详细信息
ISBN:
(纸本)9781424415205
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasingly interested in supporting multicast communications over wireless networks and in Particular over Universal Mobile Telecommunications System (UMTS). To this direction, the third Generation Partnership Project (3GPP) is currently standardizing the Multimedia Broadcast/Multicast Service (MBMS) framework of UMTS. 117 this paper, we present on overview of the MBMS multicast mode of UMTS. We analytically present the multicast mode of the MBMS and analyze its performance ill terms of packet delivery cost under various network topologies, cell types and multicast users' distributions. Furthermore, for the evaluation of the scheme, we consider different transport channels for the transmission of the data the UTRAN interfaces.
暂无评论