期刊文献+
共找到168篇文章
< 1 2 9 >
每页显示 20 50 100
Joint Optimization of Energy Consumption and Network Latency in Blockchain-Enabled Fog Computing Networks
1
作者 Huang Xiaoge Yin Hongbo +3 位作者 Cao Bin Wang Yongsheng Chen Qianbin Zhang Jie 《China Communications》 SCIE CSCD 2024年第4期104-119,共16页
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap... Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature. 展开更多
关键词 blockchain energy consumption fog computing network Internet of Things latency
下载PDF
An Emergency Plan Selection Method for Emergency Latency
2
作者 Huajun Liu 《Proceedings of Business and Economic Studies》 2024年第1期193-198,共6页
Drawing upon a characteristic analysis of the latency period in emergencies,this paper proposes an emergency plan selection method based on interval language variables and information entropy to address the challenge ... Drawing upon a characteristic analysis of the latency period in emergencies,this paper proposes an emergency plan selection method based on interval language variables and information entropy to address the challenge of acquiring critical information during this crucial stage.Initially,decision-makers employ interval language variables to express the preference information regarding emergency plans,while also introducing an enhanced information entropy theory to derive the weight coefficients of key indicators.Subsequently,the weighted arithmetic average operator of interval language is applied twice to aggregate the preference information alongside the relative importance of decision-makers and the weight coefficients of key indicators.Finally,the ranking coefficients of each emergency plan are sorted to determine the optimal scheme.The feasibility and effectiveness of this method are demonstrated through a case study involving the selection of an emergency plan for a flood disaster in a specific location. 展开更多
关键词 EMERGENCY latency period Linguistic terms Information entropy
下载PDF
Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis
3
作者 Borja Bordel Ramón Alcarria +3 位作者 Joaquin Chung Rajkumar Kettimuthu Tomás Robles Iván Armuelles 《Computers, Materials & Continua》 SCIE EI 2023年第1期855-880,共26页
Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable ... Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable low-latency communications(URLLC)but whose security properties remain under discussion.Although different 5G network slices may have different requirements,in general,both visions seem to fall short at provisioning secure URLLC in the future.In this work we address this challenge,by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks.We categorize those new security components into different groups according to their purpose and deployment scope.We propose to analyze them in the context of existing 5G architectures using two different approaches.First,using model checking techniques,we will evaluate the probability of an attacker to be successful against each security solution.Second,using analytical models,we will analyze the impact of these security mechanisms in terms of delay,throughput consumption,and reliability.Finally,we will combine both approaches using stochastic cost-security functions and the PRISM model checker to create a global picture.Our results are first evidence of how a 5G network that covers and strengthened all security areas through enhanced,dedicated non-native mechanisms could only guarantee secure URLLC with a probability of∼55%. 展开更多
关键词 5G networks security analysis secure low latency COMMUNICATIONS URLLC eMBBC
下载PDF
Latency Minimization Using an Adaptive Load Balancing Technique in Microservices Applications
4
作者 G.Selvakumar L.S.Jayashree S.Arumugam 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1215-1231,共17页
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems.Microservices Architecture is one of th... Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems.Microservices Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed independently.This methodology brings numerous benefits like scalability,resilience,flexibility in development,faster time to market,etc.and the advantages;Microservices bring some challenges too.Multiple microservices need to be invoked one by one as a chain.In most applications,more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s request.It results in competition for resources and the need for more inter-service communication among the services,which increases the overall latency of the application.A new approach has been proposed in this paper to handle a complex chain of microservices and reduce the latency of user requests.A machine learning technique is followed to predict the weighting time of different types of requests.The communication time among services distributed among different physical machines are estimated based on that and obtained insights are applied to an algorithm to calculate their priorities dynamically and select suitable service instances to minimize the latency based on the shortest queue waiting time.Experiments were done for both interactive as well as non interactive workloads to test the effectiveness of the solution.The approach has been proved to be very effective in reducing latency in the case of long service chains. 展开更多
关键词 Microservices load balancing cloud computing latency optimization netflix
下载PDF
Latency arbitrage and the synchronized placement of orders
5
作者 Wolfgang Kuhle 《Financial Innovation》 2023年第1期2650-2667,共18页
We argue that owing to traders’inability to fully express their preferences over the execution times of their orders,contemporary stock market designs are prone to latency arbitrage.In turn,we propose a new order typ... We argue that owing to traders’inability to fully express their preferences over the execution times of their orders,contemporary stock market designs are prone to latency arbitrage.In turn,we propose a new order type,which allows traders to specify the time at which their orders are executed after reaching the exchange.Using recent latency data,we demonstrate that the order type proposed here allows traders to synchronize order executions across different exchanges,such that high-frequency traders,even if they operate at the speed of light,can no-longer engage in latency arbitrage. 展开更多
关键词 Market design High-frequency trading latency arbitrage
下载PDF
Optimal edge-cloud collaboration based strategies for minimizing valid latency of railway environment monitoring system
6
作者 Xiaoping Ma Jing Zhao +2 位作者 Limin Jia Xiyuan Chen Zhe Li 《High-Speed Railway》 2023年第3期185-194,共10页
Response speed is vital for the railway environment monitoring system,especially for the sudden-onset disasters.The edge-cloud collaboration scheme is proved efficient to reduce the latency.However,the data characteri... Response speed is vital for the railway environment monitoring system,especially for the sudden-onset disasters.The edge-cloud collaboration scheme is proved efficient to reduce the latency.However,the data characteristics and communication demand of the tasks in the railway environment monitoring system are all different and changeable,and the latency contribution of each task to the system is discrepant.Hence,two valid latency minimization strategies based on the edge-cloud collaboration scheme is developed in this paper.First,the processing resources are allocated to the tasks based on the priorities,and the tasks are processed parallly with the allocated resources to minimize the system valid latency.Furthermore,considering the differences in the data volume of the tasks,which will induce the waste of the resources for the tasks finished in advance.Thus,the tasks with similar priorities are graded into the same group,and the serial and parallel processing strategies are performed intra-group and inter-group simultaneously.Compared with the other four strategies in four railway monitoring scenarios,the proposed strategies proved latency efficiency to the high-priority tasks,and the system valid latency is reduced synchronously.The performance of the railway environment monitoring system in security and efficiency will be promoted greatly with the proposed scheme and strategies. 展开更多
关键词 Railway environment monitoring Edge-cloud collaboration computing Valid latency optimization
下载PDF
Investigation of DNA Sequences Related to Latency-Associated Transcripts in the Genome of Canine Herpesvirus Type 1 (CHV-1) by Means of Bioinformatics Tools
7
作者 Ortiz M. A. Herná ndez +2 位作者 Verde C. Cuenca Lara E. G. Valdivia Anda G. Valdivia 《Open Journal of Veterinary Medicine》 2019年第10期147-160,共14页
A characteristic common to herpesviruses is the ability to establish a latent infection in the hosts, a transcriptionally active region has detected during latency as well as a set of RNA that are known as Latency Ass... A characteristic common to herpesviruses is the ability to establish a latent infection in the hosts, a transcriptionally active region has detected during latency as well as a set of RNA that are known as Latency Associated Transcripts (LATs), their functions have been clarified in recent work. The present work was carried using different bioinformatics method in order to determine if Herpesvirus Canine 1 (CHV-1) has a region associated with latency. Our result was the selection of nine sequences candidate of micro RNA (miRNA) (MIREval 2.0 software), and 26 miRNA (miRNAFold v.1.0 software), of them, were selected 14 with real precursors of miRNA, two were found between the RL2 and RS1 genes, one in the RL2 gene and 11 in the RS1 gene. The results showed that the similarities of these regions are very low among the herpesviruses analyzed, so it was not possible to deduce the presence of the LAT gene in canine herpesvirus type 1 with bioinformatics. On the other hand, the comparison showed that the miRNA predicted: chv1-mir-mirnafold-8 has similarity with the ebv-mir-BART7-3p of Epstein-Barr Virus (EBV), in this way, the microRNAs predicted by means of bioinformatic programs met the theoretical requirements of these molecules, however at not having a degree of preservation in other herpesviruses, the expression by CHV-1 in latency cannot be confirmed and it is necessary to identify through experimental tests. 展开更多
关键词 latency CANINE HERPESVIRUS latency-Associated TRANSCRIPTS
下载PDF
Mobile Edge Computing and Field Trial Results for 5G Low Latency Scenario 被引量:7
8
作者 Jianmin Zhang Weiliang Xie +1 位作者 Fengyi Yang Qi Bi 《China Communications》 SCIE CSCD 2016年第S2期174-182,共9页
Through enabling the IT and cloud computation capacities at Radio Access Network(RAN),Mobile Edge Computing(MEC) makes it possible to deploy and provide services locally.Therefore,MEC becomes the potential technology ... Through enabling the IT and cloud computation capacities at Radio Access Network(RAN),Mobile Edge Computing(MEC) makes it possible to deploy and provide services locally.Therefore,MEC becomes the potential technology to satisfy the requirements of 5G network to a certain extent,due to its functions of services localization,local breakout,caching,computation offloading,network context information exposure,etc.Especially,MEC can decrease the end-to-end latency dramatically through service localization and caching,which is key requirement of 5G low latency scenario.However,the performance of MEC still needs to be evaluated and verified for future deployment.Thus,the concept of MEC is introduced into5 G architecture and analyzed for different 5G scenarios in this paper.Secondly,the evaluation of MEC performance is conducted and analyzed in detail,especially for network end-to-end latency.In addition,some challenges of the MEC are also discussed for future deployment. 展开更多
关键词 mobile edge computing(MEC) 5G network architecture low latency
下载PDF
Hierarchical Content Caching in Fog Radio Access Networks:Ergodic Rate and Transmit Latency 被引量:6
9
作者 Shiwei Jia Yuan Ai +2 位作者 Zhongyuan Zhao Mugen Peng Chunjing Hu 《China Communications》 SCIE CSCD 2016年第12期1-14,共14页
In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific clu... In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific cluster of remote radio heads is formed through a common centralized cloud at the baseband unit pool, while the local content is directly delivered at fog access points with edge cache and distributed radio signal processing capability. Focusing on a downlink F-RAN, the explicit expressions of ergodic rate for the hierarchical paradigm is derived. Meanwhile, both the waiting delay and latency ratio for users requiring a single content are exploited. According to the evaluation results of ergodic rate on waiting delay, the transmit latency can be effectively reduced through improving the capacity of both fronthaul and radio access links. Moreover, to fully explore the potential of hierarchical content caching, the transmit latency for users requiring multiple content objects is optimized as well in three content transmission cases with different radio access links. The simulation results verify the accuracy of the analysis, further show the latency decreases significantly due to the hierarchical paradigm. 展开更多
关键词 fog radio access network hierarchical content caching latency ergodic rate
下载PDF
Subtle role of latency for information diffusion in online social networks 被引量:3
10
作者 熊菲 王夕萌 程军军 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第10期587-595,共9页
Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of lat... Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks. 展开更多
关键词 information diffusion node latency user behavior complex networks
原文传递
Specificity and sensitivity of visual evoked potentials P100 latency to different events exercise 被引量:3
11
作者 Jing-Guo Zhao Shu-Juan Pang Guang-Wei Che 《Health》 2009年第1期47-50,共4页
Visual evoked potentials (VEPs) are a series of signals about visual occipital cortex in response to visual stimuli and can be used as one of ob-jective non-invasive neuro-physiological pa-rameters to reflect the visu... Visual evoked potentials (VEPs) are a series of signals about visual occipital cortex in response to visual stimuli and can be used as one of ob-jective non-invasive neuro-physiological pa-rameters to reflect the visual organs and central visual pathway’s functional integrity. Previous studies have shown that acute and chronic ex-ercise could affect VEPs independent from body temperature and other physiological parameters. VEPs may well be used as neuro-physiological criteria in defining the performances of the ath-letes. Different sports training have different effects on VEPs, but the results are not consis-tent. P100 latency is the representative compo-nent of VEPs and it is of high, steady amplitude and of slight intra- and inter-individual variabil-ity so that the index is most commonly used. The purpose of this study was to investigate the specificity and sensitivity of P100 latency to dif-ferent physical activities. The neural electricity device of NDI-200 was used to measure the pattern reversal VEPs of all subjects, including the values of the resting state before and after different events exercise. Different events exer-cise contained an aerobic cycloergometric ex-ercise (7 subjects were conducted to a Bruce Graded Exercise Test on the Monark Ergomedic 839E cycloergometer, THR (target heart rate) = 85% HRmax, 3 times/week, about 10 minutes once time, 6 weeks), tennis training (16 volun-teers, 2 hours/day, 3 days/week, 8 weeks), aerobic Latin exercise (7 subjects, 1 hour/day, 3 days/week, 6 weeks) and the Baduanjin of Health Qigong training (6 subjects, 1 hour/day, 3 days/week, 6 weeks). The VEPs recordings of the control groups obtained synchronized with the experimental groups. SPSS 11.5 for win-dows was used for statistical analysis. A level of P﹤0.05 was accepted as statistically significant. The VEPs P100 latency of post-exercise of all experimental groups except Baduanjin group became shorter significantly compared with those of pre-exercise (P﹤0.05). No significant difference was found between pre-and post- exercise for the control groups. This study showed that exercise could shorten the P100 la-tency significantly. Moreover, it also indicated that VEPs were sensitive to exercise to a certain extent. We concluded that VEPs might well be used as neuro-physiological criteria in defining the performances of the athletes. It was found that the VEPs P100 latency became shorter after most training programs;furthermore, it demon-strated that P100 latency of VEPs had little specificity to different events. 展开更多
关键词 Visual EVOKED POTENTIALS P100 latency SPECIFICITY Sensitivity
下载PDF
End-to-End Latency Evaluation of the Sat5G Network Based on Stochastic Network Calculus 被引量:2
12
作者 Huaifeng Shi Chengsheng Pan +2 位作者 Li Yang Debin Wei Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1335-1348,共14页
Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a l... Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latency-sensitive service.To this end,we build a tandem model considering the connection relationship between the various components in Sat5G network architecture,and give an end-to-end latency calculation function based on this model.By introducing stochastic network calculus,we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics of multimedia.Numerical results demonstrate the impact of different burst states and different service rates on this relationship,which means the higher the burst of arrival traffic and the higher the average rate of arrival traffic,the greater the probability of end-to-end latency violation.The results will provide valuable guidelines for the traffic control and cache management in Sat5G network. 展开更多
关键词 5G satellite network stochastic network calculus latency evaluation
下载PDF
A New Scheduling Algorithm for Reducing Data Aggregation Latency in Wireless Sensor Networks 被引量:3
13
作者 Meirui Ren Longjiang Guo Jinbao Li 《International Journal of Communications, Network and System Sciences》 2010年第8期679-688,共10页
Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- ... Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- gation is a fundamental yet time-consuming task in WSNs. We present an improved algorithm to reduce data aggregation latency. Our algorithm has a latency bound of 16R + Δ – 11, where Δ is the maximum degree and R is the network radius. We prove that our algorithm has smaller latency than the algorithm in [1]. The simulation results show that our algorithm has much better performance in practice than previous works. 展开更多
关键词 REDUCING latency WIRELESS SENSOR Networks SCHEDULING Algorithm
下载PDF
Design of Latency-Aware IoT Modules in Heterogeneous Fog-Cloud Computing Networks 被引量:1
14
作者 Syed Rizwan Hassan Ishtiaq Ahmad +3 位作者 Jamel Nebhen Ateeq Ur Rehman Muhammad Shafiq Jin-Ghoo Choi 《Computers, Materials & Continua》 SCIE EI 2022年第3期6057-6072,共16页
The modern paradigm of the Internet of Things(IoT)has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing.However,such applications cannot meet strict quality of ser... The modern paradigm of the Internet of Things(IoT)has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing.However,such applications cannot meet strict quality of service(QoS)requirements.The large-scale deployment of IoT requires more effective use of network infrastructure to ensure QoS when processing big data.Generally,cloud-centric IoT application deployment involves different modules running on terminal devices and cloud servers.Fog devices with different computing capabilities must process the data generated by the end device,so deploying latency-sensitive applications in a heterogeneous fog computing environment is a difficult task.In addition,when there is an inconsistent connection delay between the fog and the terminal device,the deployment of such applications becomes more complicated.In this article,we propose an algorithm that can effectively place application modules on network nodes while considering connection delay,processing power,and sensing data volume.Compared with traditional cloud computing deployment,we conducted simulations in iFogSim to confirm the effectiveness of the algorithm.The simulation results verify the effectiveness of the proposed algorithm in terms of end-to-end delay and network consumption.Therein,latency and execution time is insensitive to the number of sensors. 展开更多
关键词 IOT fog-cloud computing architecture module placement latency sensitive application resource aware placement
下载PDF
Method for Latency Measurement of Visual Feedback-Based Master–Slave Minimally Invasive Surgical Robot 被引量:1
15
作者 Jinhua Li Jingchao Shen +2 位作者 He Su Shuxin Wang Jianmin Li 《Transactions of Tianjin University》 EI CAS 2018年第4期375-386,共12页
To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations ... To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations of input and output events through image-processing technology. This method used a black bar to keep pace with the measured joint rotating at a number of speeds. During tests,an external camera was placed in front of the apparatus with a proper visual field,so that it can simultaneously view orientations of both bars fixed on the corresponding joints. After quantitatively analyzing the accuracy of the proposed measurement method,the method was applied to a visual feedback-based master–slave robotic system with two-degrees-of-freedom. Experimental results show that the latency of the overall system was approximately 250 ms,and the opposite clearance of the measured joint was in the range of 1.7°–1.9°. 展开更多
关键词 MINIMALLY INVASIVE surgical(MIS)robot latency measurement Real time Visual feedback
下载PDF
Higher Speed Passive Optical Networks for Low Latency Services 被引量:1
16
作者 ZHANG Weiliang YUAN Liquan 《ZTE Communications》 2021年第2期61-66,共6页
Latency sensitive services have attracted much attention lately and imposedstringent requirements on the access network design. Passive optical networks (PONs) providea potential long-term solution for the underlying ... Latency sensitive services have attracted much attention lately and imposedstringent requirements on the access network design. Passive optical networks (PONs) providea potential long-term solution for the underlying transport network supporting theseservices. This paper discusses latency limitations in PON and recent progress in PONstandardization to improve latency. Experimental results of a low latency PON system arepresented as a proof of concept. 展开更多
关键词 passive optical networks time-division multiple access wavelength-division multiple access low latency
下载PDF
Correlation-Aware Replica Prefetching Strategy to Decrease Access Latency in Edge Cloud
17
作者 Yang Liang Zhigang Hu +1 位作者 Xinyu Zhang Hui Xiao 《China Communications》 SCIE CSCD 2021年第9期249-264,共16页
With the number of connected devices increasing rapidly,the access latency issue increases drastically in the edge cloud environment.Massive low time-constrained and data-intensive mobile applications require efficien... With the number of connected devices increasing rapidly,the access latency issue increases drastically in the edge cloud environment.Massive low time-constrained and data-intensive mobile applications require efficient replication strategies to decrease retrieval time.However,the determination of replicas is not reasonable in many previous works,which incurs high response delay.To this end,a correlation-aware replica prefetching(CRP)strategy based on the file correlation principle is proposed,which can prefetch the files with high access probability.The key is to determine and obtain the implicit high-value files effectively,which has a significant impact on the performance of CRP.To achieve the goal of accelerating the acquisition of implicit highvalue files,an access rule management method based on consistent hashing is proposed,and then the storage and query mechanisms for access rules based on adjacency list storage structure are further presented.The theoretical analysis and simulation results corroborate that CRP shortens average response time over 4.8%,improves average hit ratio over 4.2%,reduces transmitting data amount over 8.3%,and maintains replication frequency at a reasonable level when compared to other schemes. 展开更多
关键词 edge cloud access latency replica prefetching correlation-aware access rule
下载PDF
The Auditory Brainstem and Middle Latency Responses in Healthy Mice
18
作者 郭梦和 林顺涨 +1 位作者 王锦玲 朱德生 《Journal of Medical Colleges of PLA(China)》 CAS 1990年第3期278-281,共4页
The auditory brainstern responses(ABR)and middle latency responses(MLR)were recorded in 24 normal mice with a 7S11A processor,and the normalparameters of ABR and MLR obtained.The results showed that the ABR of mice we... The auditory brainstern responses(ABR)and middle latency responses(MLR)were recorded in 24 normal mice with a 7S11A processor,and the normalparameters of ABR and MLR obtained.The results showed that the ABR of mice werecomposed of 6 waves,waves Ⅰ to Ⅵ.The mean threshold was 35.12±8.03 dB ,whichwas significantly different from the 22.63 dB of ABR found in guinea pigs.Thelatency of ABR waves Ⅰ to Ⅵizn the mice was found to be 1.30±8.03 ms ;2.02±0.24ms ;2.90±0.27 ms ;3.80±0.24 ms ;4.87±0.42 ms and 5.83±0.40 ms respectively.Nosex or strain differences were found.The MLR waveform of the mice were similar tothose of human and the latency was found to be P0 3.94±1.76 ms;P8.38±1.57ms;Na 14.98±2.54 ms;Pa 24.56±3.15 ms rcspectively.It is suggested that mice can beused for hearing research.Since the Na and Pa waves of MLR were unstable under anes-thesia,testing conditions for determining MLR in mice need further study. 展开更多
关键词 MICE AUDITORY BRAINSTEM RESPONSE (ABR) middle latency RESPONSE (MLR)
下载PDF
Investigating and Modelling of Task Offloading Latency in Edge-Cloud Environment
19
作者 Jaber Almutairi Mohammad Aldossary 《Computers, Materials & Continua》 SCIE EI 2021年第9期4143-4160,共18页
Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computa... Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing.However,different service architecture and offloading strategies have a different impact on the service time performance of IoT applications.Therefore,this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network.Also,it introduces the offloading latency models to investigate the delay of different offloading scenarios/schemes and explores the effect of computational and communication demand on each one.A series of experiments conducted on an EdgeCloudSim show that different offloading decisions within the Edge-Cloud system can lead to various service times due to the computational resources and communications types.Finally,this paper presents a comprehensive review of the current state-of-the-art research on task offloading issues in the Edge-Cloud environment. 展开更多
关键词 Edge-cloud computing resource management latency models scheduling task offloading internet of things
下载PDF
Modeling and Simulation for Transient Thermal Analyses Using a Voltage-in-Current Latency Insertion Method
20
作者 Wei Chun Chin Boon Chun New +1 位作者 Nur Syazreen Ahmad Patrick Goh 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第4期383-395,共13页
This article presents a modeling and simulation method for transient thermal analyses of integrated circuits(ICs)using the original and voltage-in-current(VinC)latency insertion method(LIM).LIM-based algorithms are a ... This article presents a modeling and simulation method for transient thermal analyses of integrated circuits(ICs)using the original and voltage-in-current(VinC)latency insertion method(LIM).LIM-based algorithms are a set of fast transient simulation methods that solve electrical circuits in a leapfrog updating manner without relying on large matrix operations used in conventional Simulation Program with Integrated Circuit Emphasis(SPICE)-based methods which can significantly slow down the solution process.The conversion from the thermal to electrical model is performed first by using the analogy between heat and electrical conduction.Since electrical inductance has no thermal equivalence,a modified VinC LIM formulation is presented which removes the requirement of the insertion of fictitious inductors.Numerical examples are presented,which show that the modified VinC LIM formulation outperforms the basic LIM formulation,in terms of both stability and accuracy in the transient thermal simulation of ICs. 展开更多
关键词 latency insertion method(LIM) numerical simulation thermal analysis transient simulation
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部