The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an algorithm that uses predefined weights to create broadcast routes for a WirelessHART network. The network topology is represented by a graph, and the algorithm uses information of the devices present in the network to build the broadcast graph. At each iteration of the algorithm, a device is selected and then added to the broadcast solution graph. A cost function determines...
In order to make full use of the joint sparse characteristics of sparse signals, a new distributed Subspace Pursuit algorithm based on the Subspace Pursuit (SP) algorithm is proposed in this paper. The algorithm improves the support set initialization and update processing of the traditional SP algorithm. During the initialization stage of the support set, the positions of the larger values of inner...
Telecommunication networks are designed for high reliability but, given their complexity, when problems do occur they are difficult to detect and diagnose. Anomaly detection approaches typically provide cryptic results, resulting in extensive human effort for diagnosis. Using data from a 4G network, we focus on non-parametric change detection algorithms for anomaly detection and evaluate the performance...
Consider the problem of estimating the (un)reliability of an n-vertex graph when edges fail with probability p. We show that the Recursive Contraction Algorithms for minimum cuts, essentially unchanged and running in n2+o(1) time, yields an unbiased estimator of constant relative variance (and thus an FPRAS with the same time bound) whenever pc
The challenge of failure management emerges in decentralized architectures due to the distributed nature of the layered control process. Failures in microgrid system may occur at the microgrid level or any of the control layers. A failure detection and response mechanism is required to attain a reliable, fault-tolerant microgrid operation. This paper introduces a Failure Management Unit as an essential...
Nowadays Distribution networks are growing in complex due to the increase in power demand, variation in load and different kinds of load. So these leads to degradation of quality power to the consumers. The efficient Operation of Distribution networks can be achieved by reconfiguring the network for reducing the line losses and for improving the system reliability. IHSA (Improved Harmony Search Algorithm)...
In this work, we model route updates as part of Quality of Service (QoS) Virtual Network Function (VNF) in Software-Defined Networking (SDN) architecture. In SDN, the control plane and the data plane are decoupled. This allows high flexibility by providing abstractions for network management applications and being directly programmable. However, reconfiguration and updates of a network are sometimes...
Finding suitable developers for a given task is critical and challenging for successful crowdsourcing software development. In practice, the development skills will be improved as developers accomplish more development tasks. Prior studies on crowdsourcing developer recommendation do not consider the changing of skills, which can underestimate developers' skills to fulfill a task. In this work, we...
Broadcast is one of the fundamental primitives to enable sensor networks. In this paper, we address some practical concerns regarding reliable broadcast. Particularly, we consider the following issues: • Hybrid fault model: We prove the tight necessary and sufficient condition for using Certified Propagation Algorithm (CPA) to achieve reliable broadcast in directed networks under hybrid fault model...
In multiple attribute decision analysis (MADA) problems, one often needs to deal with assessment information with uncertainty. The evidential reasoning approach is one of the most effective methods to deal with such MADA problems. As a kernel of the evidential reasoning approach, an original evidential reasoning (ER) algorithm was firstly proposed by Yang et al, and later they modified the ER algorithm...
Drastically growing trend of DC power utilities is subsequently enhancing the need of better protection techniques which are hampered by less reliable fault detection methods. This paper presents a DDL based algorithm for short circuit current detection in a DC circuit breaker (DCCB). The algorithm is based on rise rate and increment parameters of the current. Viability of the algorithm is theoretically...
We present two geometric routing algorithms that reliably deliver messages to all devices in a geocast region. One algorithm is based on flooding, the other on concurrent geometric routing. They are the fist known stateless geocasting algorithms. We formally prove the algorithms correct, evaluate their performance through abstract and concrete simulation and estimate their message complexity.
The Dempster-Shafer evidence combination method will appear inconsistent conclusions for the conflict evidence. One new universal evidence combination method was proposed. According to the concept of the Pearson correlation coefficient. Evidence distances which represent the conflict degree were calculated, and then the weight coefficient were further converted. The evidences probability were redistributed...
This paper proposes a modified bit flipping algorithm and its weighted variants based on reliability derived from intrinsic information. Compared to other existing algorithms where extrinsic information based reliability was used in the flipping function, here intrinsic information based reliability is also equally considered. This algorithm only uses additions and subtractions to modify reliability...
Characteristics of codes with summation of unit data bits are analyzed, the latter are often applied in technical diagnostics of discrete systems' problems. The contributors of the article suggest a fundamentally new method of summation code modification, based on decomposition of data vectors' digits, the formation of new vectors, weight estimation and writing down the obtained figures in corresponding...
This article describes a completely new, fully automatic line detector algorithm that takes advantage of look-up tables to recognize and fit straight line patterns. The algorithm first recognizes any possible 4×4 pixel line patterns among the binary edge pixels and then uses several small look up tables to decide whether the connected patterns form a line or not. It is designed for real time processing...
Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms the foundation of any centralised CRN. However,...
This research provides a concise answer to how to organize a strong infrastructure of information technologies for high availability based on open source software, it's necessary for large organizations to provide high availability, the work will focus on explaining the procedures to provide services for users 24 hours the 365 days. Centralization is a major weakness today because is the only source...
Fault Tree Analysis (FTA) is widely applied to evaluating failure probability related to complex engineering system. A large number of minimal cut sets (MCSs) may be involved in FTA when dealing with complex system, and searching for these MCSs may be time-consuming. Modules of fault trees have been employed to reduce the computational burden relevant to basic operations of fault trees. Based on the...
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.