期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Position-aware packet loss optimization on service function chain placement
1
作者 Wenjie Liang Chengxiang Li +1 位作者 Lin Cui Fung Po Tso 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1057-1067,共11页
The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network... The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term.However,the study shows with a set of test-bed experiments that packet loss at certain positions(i.e.,different VNFs)in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.To overcome this challenge,this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions.This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming(MILP)and proved that it is NP-hard.In this study,Palos is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost.Extensive experiment results show that Palos can achieve up to 42.73%improvement on packet dropping cost and up to 33.03%reduction on average SFC latency when compared with two other state-of-the-art schemes. 展开更多
关键词 Network function virtualization Resource scheduling SFC deployment Packet loss
下载PDF
Formal Reduction of Interfaces to Large-scale Process Control Systems
2
作者 Walter Hussak 《International Journal of Automation and computing》 EI 2007年第4期413-421,共9页
A formal methodology is proposed to reduce the amount of information displayed to remote human operators at interfaces to large-scale process control plants of a certain type. The reduction proceeds in two stages. In ... A formal methodology is proposed to reduce the amount of information displayed to remote human operators at interfaces to large-scale process control plants of a certain type. The reduction proceeds in two stages. In the first stage, minimal reduced subsets of components, which give full information about the state of the whole system, are generated by determining functional dependencies between components. This is achieved by using a temporal logic proof obligation to check whether the state of all components can be inferred from the state of components in a subset in specified situations that the human operator needs to detect, with respect to a finite state machine model of the system and other human operator behavior. Generation of reduced subsets is automated with the help of a temporal logic model checker. The second stage determines the interconnections between components to be displayed in the reduced system so that the natural overall graphical structure of the system is maintained. A formal definition of an aesthetic for the required subgraph of a graph representation of the full system, containing the reduced subset of components, is given for this purpose. The methodology is demonstrated by a case study. 展开更多
关键词 Finite state machines process control temporal logic user interfaces user modeling.
下载PDF
Sensitivity Analysis of Radial Basis Function Networks for River Stage Forecasting
3
作者 Christian Walker Dawson 《Journal of Software Engineering and Applications》 2020年第12期327-347,共21页
<div style="text-align:justify;"> <span style="font-family:Verdana;">Sensitivity analysis of neural networks to input variation is an important research area as it goes some way to addr... <div style="text-align:justify;"> <span style="font-family:Verdana;">Sensitivity analysis of neural networks to input variation is an important research area as it goes some way to addressing the criticisms of their black-box behaviour. Such analysis of RBFNs for hydrological modelling has previously been limited to exploring perturbations to both inputs and connecting weights. In this paper, the backward chaining rule that has been used for sensitivity analysis of MLPs, is applied to RBFNs and it is shown how such analysis can provide insight into physical relationships. A trigonometric example is first presented to show the effectiveness and accuracy of this approach for first order derivatives alongside a comparison of the results with an equivalent MLP. The paper presents a real-world application in the modelling of river stage shows the importance of such approaches helping to justify and select such models.</span> </div> 展开更多
关键词 Artificial Neural Networks Backward Chaining Multi-Layer Perceptron Partial Derivative Radial Basis Function Sensitivity Analysis River Stage Forecasting
下载PDF
基于Internet的远程过程控制系统设计 被引量:9
4
作者 尹敏 谭连生 +1 位作者 杨双华 赵甫哲 《计算机工程与应用》 CSCD 北大核心 2002年第21期254-256,共3页
分析了基于Internet的过程控制与传统的计算机控制的区别,给出了一种如何在现有计算机控制系统的基础上,通过添加特殊的网络控制层的方法,设计基于Internet的远程过程控制系统的推荐方案。
关键词 INTERNET 远程过程控制系统 设计 计算机控制系统
下载PDF
Dynamic Cluster Head for Lifetime Efficiency in WSN 被引量:10
5
作者 Hesham Abusaimeh 《International Journal of Automation and computing》 EI 2009年第1期48-54,共7页
Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless... Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless sensor nodes in the same cluster based on the ZigBee standard, which is the latest WSN standard. ZigBee supports ad hoc on-demand vector (AODV) and cluster-tree routing protocols in its routing layer. However, none of these protocols considers the energy level of the nodes in the network establishing process or in the data routing process. The cluster-tree routing protocol supports single or multi-cluster networks. However, each single cluster in the multi-cluster network has only one node acting as a cluster head. These cluster-heads are fixed in each cluster during the network lifetime. Consequently, using these cluster-heads will cause them to die quickly, and the entire linked nodes to these cluster-heads will be disconnected from the main network. Therefore, the proposed technique to distribute the role of the cluster head among the wireless sensor nodes in the same cluster is vital to increase the lifetime of the network. Our proposed technique is better in terms of performance than the original structure of these protocols. It has increased the lifetime of the wireless sensor nodes, and increased the lifetime of the WSN by around 50% of the original network lifetime. 展开更多
关键词 Cluster-tree routing protocol cluster head energy consumption ad hoc on-demand distance vector (AODV) networklifetime wireless sensor networks (WSNs).
下载PDF
Balancing the Power Consumption Speed in Flat and Hierarchical WSN 被引量:3
6
作者 Hesham Abusaimeh 《International Journal of Automation and computing》 EI 2008年第4期366-375,共10页
A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protoco... A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protocol has no means by which to take into consideration the power consumption of the nodes during the routing process.Therefore,a new approach is proposed in this paper to balance the power consumption speed and to distribute the responsibilities of routing among flat wireless sensor nodes and the three levels of hierarchical wireless sensor nodes.These three levels are based on the three types of devices,which are used in the ZigBee standard:the coordinator,the routers,and the end devices.In this paper,we have compared the original AODV routing protocol with our extension approach for the distribution of power consumption.Based on the simulation results,our new approach has achieved better performance in terms of increasing the lifetime of the flat wireless sensor network,the personal area network (PAN) coordinator,the routers,and the whole network of the hierarchical wireless sensor network.Additionally,it has better performance in terms of distributing the power consumption among the key nodes of the wireless sensor network. 展开更多
关键词 Routing protocols energy consumption Ad hoc on-demand distance vector (AODV) network lifetime wireless sensor networks (WSNs).
下载PDF
Data Transfer Over the Internet for Real Time Applications 被引量:3
7
作者 Roger Knott 《International Journal of Automation and computing》 EI 2006年第4期414-424,共11页
Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web bas... Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism. 展开更多
关键词 eXtensible Markup Language (XML) Hierarchical Data Format (HDF) Remote Method Invocation (RMI) data transfer web based application and real time
下载PDF
Cyber-physical System Security for Networked Industrial Processes 被引量:5
8
作者 Shuang Huang Chun-Jie Zhou +1 位作者 Shuang-Hua Yang Yuan-Qing Qin 《International Journal of Automation and computing》 EI CSCD 2015年第6期567-578,共12页
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke... Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach. 展开更多
关键词 Critical infrastructures cyber-physical systems(CP
原文传递
Joint throughput and transmission range optimization for triple-hop networks with cognitive relay
9
作者 Cheng ZHAO Wan-liang WANG +1 位作者 Xin-wei YAO Shuang-hua YANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第2期253-261,共9页
The optimization of the network throughput and transmission range is one of the most important issues in cognitive relay networks (CRNs). Existing research has focused on the dual-hop network, which cannot be extend... The optimization of the network throughput and transmission range is one of the most important issues in cognitive relay networks (CRNs). Existing research has focused on the dual-hop network, which cannot be extended to a triple-hop network due to its shortcomings, including the limited transmission range and one-way communication. In this paper, a novel, triple-hop relay scheme is proposed to implement time-division duplex (TDD) transmission among secondary users (SUs) in a three-phase transmission. Moreover, a superposition coding (SC) method is adopted for handling two-receiver cases in triple-hop networks with a cognitive relay. We studied a joint optimization of time and power allocation in all three phases, which is formulated as a nonlinear and concave problem. Both analytical and numerical results show that the proposed scheme is able to improve the throughput of SUs, and enlarge the transmission range of primary users (PUs) without increasing the number of hops. 展开更多
关键词 Decode-and-forward (DF) Triple-hop Cognitive relay networks (CRNs) Time and power allocation Superpositioncoding
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部