scholarly journals Modelling and optimization of computer network traffic controllers

2005 ◽  
Vol 2005 (6) ◽  
pp. 617-640 ◽  
Author(s):  
N. U. Ahmed ◽  
Bo Li ◽  
Luis Orozco-Barbosa

During the past years, there has been increasing interest in the design and development of network traffic controllers capable of ensuring the QoS requirements of a wide range of applications. In this paper, we construct a dynamic model for the token-bucket algorithm: a traffic controller widely used in various QoS-aware protocol architectures. Based on our previous work, we use a system approach to develop a formal model of the traffic controller. This model serves as a basis to formally specify and evaluate the operation of the token-bucket algorithm. Then we develop an optimization algorithm based on a dynamic programming and genetic algorithm approach. We conduct an extensive campaign of numerical experiments allowing us to gain insight on the operation of the controller and evaluate the benefits of using a genetic algorithm approach to speed up the optimization process. Our results show that the use of the genetic algorithm proves particularly useful in reducing the computation time required to optimize the operation of a system consisting of multiple token-bucket-regulated sources.

Author(s):  
Ning Yang ◽  
Shiaaulir Wang ◽  
Paul Schonfeld

A Parallel Genetic Algorithm (PGA) is used for a simulation-based optimization of waterway project schedules. This PGA is designed to distribute a Genetic Algorithm application over multiple processors in order to speed up the solution search procedure for a very large combinational problem. The proposed PGA is based on a global parallel model, which is also called a master-slave model. A Message-Passing Interface (MPI) is used in developing the parallel computing program. A case study is presented, whose results show how the adaption of a simulation-based optimization algorithm to parallel computing can greatly reduce computation time. Additional techniques which are found to further improve the PGA performance include: (1) choosing an appropriate task distribution method, (2) distributing simulation replications instead of different solutions, (3) avoiding the simulation of duplicate solutions, (4) avoiding running multiple simulations simultaneously in shared-memory processors, and (5) avoiding using multiple processors which belong to different clusters (physical sub-networks).


Author(s):  
Alexander L. Von Moll ◽  
David W. Casbeer ◽  
Krishna Kalyanam ◽  
Satyanarayana G. Manyam

We employ a genetic algorithm approach to solving the persistent visitation problem for UAVs. The objective is to minimize the maximum weighted revisit time over all the sites in a cyclicly repeating walk. In general, the optimal length of the walk is not known, so this method (like the exact methods) assume some fixed length. Exact methods for solving the problem have recently been put forth, however, in the absence of additional heuristics, the exact method scales poorly for problems with more than 10 sites or so. By using a genetic algorithm, performance and computation time can be traded off depending on the application. The main contributions are a novel chromosome encoding scheme and genetic operators for cyclic walks which may visit sites more than once. Examples show that the performance is comparable to exact methods with better scalability.


2021 ◽  
Vol 11 (18) ◽  
pp. 8750
Author(s):  
Styliani Verykokou ◽  
Argyro-Maria Boutsi ◽  
Charalabos Ioannidis

Mobile Augmented Reality (MAR) is designed to keep pace with high-end mobile computing and their powerful sensors. This evolution excludes users with low-end devices and network constraints. This article presents ModAR, a hybrid Android prototype that expands the MAR experience to the aforementioned target group. It combines feature-based image matching and pose estimation with fast rendering of 3D textured models. Planar objects of the real environment are used as pattern images for overlaying users’ meshes or the app’s default ones. Since ModAR is based on the OpenCV C++ library at Android NDK and OpenGL ES 2.0 graphics API, there are no dependencies on additional software, operating system version or model-specific hardware. The developed 3D graphics engine implements optimized vertex-data rendering with a combination of data grouping, synchronization, sub-texture compression and instancing for limited CPU/GPU resources and a single-threaded approach. It achieves up to 3 × speed-up compared to standard index rendering, and AR overlay of a 50 K vertices 3D model in less than 30 s. Several deployment scenarios on pose estimation demonstrate that the oriented FAST detector with an upper threshold of features per frame combined with the ORB descriptor yield best results in terms of robustness and efficiency, achieving a 90% reduction of image matching time compared to the time required by the AGAST detector and the BRISK descriptor, corresponding to pattern recognition accuracy of above 90% for a wide range of scale changes, regardless of any in-plane rotations and partial occlusions of the pattern.


Author(s):  
Ning Yang ◽  
Shiaaulir Wang ◽  
Paul Schonfeld

A Parallel Genetic Algorithm (PGA) is used for a simulation-based optimization of waterway project schedules. This PGA is designed to distribute a Genetic Algorithm application over multiple processors in order to speed up the solution search procedure for a very large combinational problem. The proposed PGA is based on a global parallel model, which is also called a master-slave model. A Message-Passing Interface (MPI) is used in developing the parallel computing program. A case study is presented, whose results show how the adaption of a simulation-based optimization algorithm to parallel computing can greatly reduce computation time. Additional techniques which are found to further improve the PGA performance include: (1) choosing an appropriate task distribution method, (2) distributing simulation replications instead of different solutions, (3) avoiding the simulation of duplicate solutions, (4) avoiding running multiple simulations simultaneously in shared-memory processors, and (5) avoiding using multiple processors which belong to different clusters (physical sub-networks).


2020 ◽  
Vol 16 (11) ◽  
pp. e1008323
Author(s):  
Amir Bitran ◽  
William M. Jacobs ◽  
Eugene Shakhnovich

Atomistic simulations can provide valuable, experimentally-verifiable insights into protein folding mechanisms, but existing ab initio simulation methods are restricted to only the smallest proteins due to severe computational speed limits. The folding of larger proteins has been studied using native-centric potential functions, but such models omit the potentially crucial role of non-native interactions. Here, we present an algorithm, entitled DBFOLD, which can predict folding pathways for a wide range of proteins while accounting for the effects of non-native contacts. In addition, DBFOLD can predict the relative rates of different transitions within a protein’s folding pathway. To accomplish this, rather than directly simulating folding, our method combines equilibrium Monte-Carlo simulations, which deploy enhanced sampling, with unfolding simulations at high temperatures. We show that under certain conditions, trajectories from these two types of simulations can be jointly analyzed to compute unknown folding rates from detailed balance. This requires inferring free energies from the equilibrium simulations, and extrapolating transition rates from the unfolding simulations to lower, physiologically-reasonable temperatures at which the native state is marginally stable. As a proof of principle, we show that our method can accurately predict folding pathways and Monte-Carlo rates for the well-characterized Streptococcal protein G. We then show that our method significantly reduces the amount of computation time required to compute the folding pathways of large, misfolding-prone proteins that lie beyond the reach of existing direct simulation. Our algorithm, which is available online, can generate detailed atomistic models of protein folding mechanisms while shedding light on the role of non-native intermediates which may crucially affect organismal fitness and are frequently implicated in disease.


Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1637 ◽  
Author(s):  
Wenguang Song ◽  
Mykola Beshley ◽  
Krzysztof Przystupa ◽  
Halyna Beshley ◽  
Orest Kochan ◽  
...  

In this paper, to solve the problem of detecting network anomalies, a method of forming a set of informative features formalizing the normal and anomalous behavior of the system on the basis of evaluating the Hurst (H) parameter of the network traffic has been proposed. Criteria to detect and prevent various types of network anomalies using the Three Sigma Rule and Hurst parameter have been defined. A rescaled range (RS) method to evaluate the Hurst parameter has been chosen. The practical value of the proposed method is conditioned by a set of the following factors: low time spent on calculations, short time required for monitoring, the possibility of self-training, as well as the possibility of observing a wide range of traffic types. For new DPI (Deep Packet Inspection) system implementation, algorithms for analyzing and captured traffic with protocol detection and determining statistical load parameters have been developed. In addition, algorithms that are responsible for flow regulation to ensure the QoS (Quality of Services) based on the conducted static analysis of flows and the proposed method of detection of anomalies using the parameter Hurst have been developed. We compared the proposed software DPI system with the existing SolarWinds Deep Packet Inspection for the possibility of network traffic anomaly detection and prevention. The created software components of the proposed DPI system increase the efficiency of using standard intrusion detection and prevention systems by identifying and taking into account new non-standard factors and dependencies. The use of the developed system in the IoT communication infrastructure will increase the level of information security and significantly reduce the risks of its loss.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4055 ◽  
Author(s):  
Wei Yang ◽  
Wei Liu ◽  
Zhiwen Zeng ◽  
Anfeng Liu ◽  
Guosheng Huang ◽  
...  

By using Software Defined Network (SDN) technology, senor nodes can get updated program code which can provide new features, so it has received extensive attention. How to effectively spread code to each node fast is a challenge issue in wireless sensor networks (WSNs). In this paper, an Adding Active Slot joint Larger Broadcast Radius (AAS-LBR) scheme is proposed for fast code dissemination. The AAS-LBR scheme combines the energy of data collection and code dissemination, making full use of the remaining energy in the far-sink area to increase the active slot and the broadcast radius to speed up the code dissemination. The main contributions of the proposed AAS-LBR scheme are the following: (1) Make full use of the remaining energy of the far sink area to expand the broadcast radius, so that the node broadcasts a longer distance. The wide range of broadcasts makes the number of nodes receiving code more, which speeds up the spread of code dissemination. (2) AAS-LBR uses two improved methods to further reduce the number of broadcasts and speed up the code dissemination: (a) When constructing the broadcast backbone whose nodes dominate all nodes in network and are responsible for broadcasting code, the active slot is added to the next hop node in a pipeline style on the diffusion path, which enables the code dissemination process to continue without pause. Thus, the code can quickly spread to the entire broadcast backbone. (b) For the nodes in the non-broadcast backbone whose nodes are dominated by the broadcast backbone and only for receiving code, an active slot is added coincident with its broadcast backbone’ active slot, which can reduce the time required for code dissemination and reduce the number of broadcasts. A lot of performance analysis and simulation results show that compared to previous schemed, the AAS-LBR scheme can balance energy consumption, the transmission delay can be reduced 43.09–78.69%, the number of broadcasts can be reduced 44.51–86.18% and the energy efficiency is improved by about 24.5%.


Author(s):  
Anthony S-Y Leong ◽  
David W Gove

Microwaves (MW) are electromagnetic waves which are commonly generated at a frequency of 2.45 GHz. When dipolar molecules such as water, the polar side chains of proteins and other molecules with an uneven distribution of electrical charge are exposed to such non-ionizing radiation, they oscillate through 180° at a rate of 2,450 million cycles/s. This rapid kinetic movement results in accelerated chemical reactions and produces instantaneous heat. MWs have recently been applied to a wide range of procedures for light microscopy. MWs generated by domestic ovens have been used as a primary method of tissue fixation, it has been applied to the various stages of tissue processing as well as to a wide variety of staining procedures. This use of MWs has not only resulted in drastic reductions in the time required for tissue fixation, processing and staining, but have also produced better cytologic images in cryostat sections, and more importantly, have resulted in better preservation of cellular antigens.


Author(s):  
Trần Thanh Nhàn

In order to observe the end of primary consolidation (EOP) of cohesive soils with and without subjecting to cyclic loading, reconstituted specimens of clayey soils at various Atterberg’s limits were used for oedometer test at different loading increments and undrained cyclic shear test followed by drainage with various cyclic shear directions and a wide range of shear strain amplitudes. The pore water pressure and settlement of the soils were measured with time and the time to EOP was then determined by different methods. It is shown from observed results that the time to EOP determined by 3-t method agrees well with the time required for full dissipation of the pore water pressure and being considerably larger than those determined by Log Time method. These observations were then further evaluated in connection with effects of the Atterberg’s limit and the cyclic loading history.


Sign in / Sign up

Export Citation Format

Share Document