Search results for: dynamic network analysis
32910 Integrating Knowledge Distillation of Multiple Strategies
Authors: Min Jindong, Wang Mingxia
Abstract:
With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.Keywords: object detection, knowledge distillation, convolutional network, model compression
Procedia PDF Downloads 27632909 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network
Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy
Abstract:
Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast
Procedia PDF Downloads 40732908 Energy Dissipation Characteristics of an Elastomer under Dynamic Condition: A Comprehensive Assessment Using High and Low Frequency Analyser
Authors: K. Anas, M. Selvakumar, Samson David, R. R. Babu, S. Chattopadhyay
Abstract:
The dynamic deformation of a visco elastic material can cause heat generation. This heat generation is aspect energy dissipation. The present work investigates the contribution of various factors like; elastomer structure, cross link type and density, filler networking, reinforcement potential and temperature at energy dissipation mechanism. The influences of these elements are investigated using very high frequency analyzer (VHF ) and dynamical mechanical analysis(DMA).VHF follows transmissibility and vibration isolation principle whereas DMA works on dynamical mechanical deformation principle. VHF analysis of different types of elastomers reveals that elastomer can act as a transmitter or damper of energy depending on the applied frequency ratio (ω/ωn). Dynamic modulus (G') of low damping rubbers like natural rubber does not varies rapidly with frequency but vice-versa for high damping rubber like butyl rubber (IIR). VHF analysis also depicts that polysulfidic linkages has high damping ratio (ζ) than mono sulfidic linkages due to its dissipative nature. At comparable cross link density, mono sulfidic linkages shows higher glass transition temperature (Tg) than poly sulfidic linkages. The intensity and location of loss modulus (G'') peak of different types of carbon black filled natural rubber compounds suggests that segmental relaxation at glass transition temperature (Tg) is seldom affected by filler particles, but the filler networks can influence the cross link density by absorbing the curatives. The filler network breaking and reformation during a dynamic strain is a thermally activated process. Thus, stronger aggregates are highly dissipative in nature. Measurements indicate that at lower temperature regimes polymeric chain friction is highly dissipative in nature.Keywords: damping ratio, natural frequency, crosslinking density, segmental motion, surface activity, dissipative, polymeric chain friction
Procedia PDF Downloads 29332907 An intelligent Troubleshooting System and Performance Evaluator for Computer Network
Authors: Iliya Musa Adamu
Abstract:
This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.Keywords: expert system, forward chaining rule based system, network, troubleshooting
Procedia PDF Downloads 64232906 Implementation and Demonstration of Software-Defined Traffic Grooming
Authors: Lei Guo, Xu Zhang, Weigang Hou
Abstract:
Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming
Procedia PDF Downloads 24932905 Collapse Performance of Steel Frame with Hysteric Energy Dissipating Devices
Authors: Hyung-Joon Kim, Jin-Young Park
Abstract:
Energy dissipating devices (EDDs) have become more popular as seismic-force-resisting systems for building structures. However, there is little information on the collapse capacities of frames employing EDDs which are an important criterion for their seismic design. This study investigates the collapse capacities of steel frames with TADAS hysteric energy dissipative devices (HEDDs) that become an alternative to steel braced frames. To do this, 5-story steel ordinary concentrically braced frame and steel frame with HEDDs are designed and modeled. Nonlinear dynamic analyses and incremental dynamic analysis with 40 ground motions scaled to maximum considered earthquake are carried out. It is shown from analysis results that the significant enhancement in terms of the collapse capacities is found due to the introduction HEDDs.Keywords: collapse capacity, incremental dynamic analysis, steel braced frame, TADAS hysteric energy dissipative device
Procedia PDF Downloads 48132904 Key Technologies and Evolution Strategies for Computing Force Bearer Network
Authors: Zhaojunfeng
Abstract:
Driven by the national policy of "East Data and Western Calculation", the computing first network will attract a new wave of development. As the foundation of the development of the computing first network, the computing force bearer network has become the key direction of technology research and development in the industry. This article will analyze typical computing force application scenarios and bearing requirements and sort out the SLA indicators of computing force applications. On this basis, this article carries out research and discussion on the key technologies of computing force bearer network in a slice packet network, and finally, gives evolution policy for SPN computing force bearer network to support the development of SPN computing force bearer network technology and network deployment.Keywords: component-computing force bearing, bearing requirements of computing force application, dual-SLA indicators for computing force applications, SRv6, evolution strategies
Procedia PDF Downloads 12932903 Asymmetric Linkages Between Global Sustainable Index (Green Bond) and Cryptocurrency Markets with Portfolio Implications
Authors: Faheem Ur Rehman, Muhammad Khalil Khan, Miao Qing
Abstract:
This study investigated the asymmetric links and portfolio strategies between green bonds and the markets of three different cryptocurrencies, i.e., green, Islamic, and conventional, using data from January 1, 2018, to April 8, 2022, and employing asymmetric TVP-VAR model to quantify risk spillovers in the network analysis. In addition, we use the minimum variance, minimum correlation, and minimum connectedness methodologies to assess the portfolio implications. The results of the asymmetric dynamic connectedness index (TCI) model show that by adopting cryptocurrencies for digital finance, risk spillovers are found to be reduced. The findings of net directional connectedness demonstrate that during the study period, green bonds consistently get return spillovers from all other network variables. Positive return spillovers are bigger in magnitude than negative ones. These results imply that the influence of the green bond market on the cryptocurrency markets is decreasing. Positive return spillovers generate higher connectedness values for (HG, BNB, and TRX) coins and persistent net recipients in the specific network. On the other hand, Cardano and ADA coins are persistent net transmitters in the system. XLM and MIOTA's responsibilities shift over time, and there is evidence of asymmetry when both positive and negative returns are considered. According to the pairwise portfolio weights, BNB vs. BTC has the largest portfolio weights in the system, followed by BNB vs. Ethereum, suggesting the best investment strategies in the network.Keywords: asymmetric TVP-VAR, global sustainable index, cryptocurrency, portfolios
Procedia PDF Downloads 7732902 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification
Authors: Abdelhadi Lotfi, Abdelkader Benyettou
Abstract:
In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.Keywords: classification, probabilistic neural networks, network optimization, pattern recognition
Procedia PDF Downloads 26032901 Analysis of the Influence of Support Failure on the Dynamic Effect of Bridge Structure
Authors: Sun Fan, Wu Xiaoguang, Fang Miaomiao, Wei Chi
Abstract:
The degree of damage to the support is simulated by finite element software, and its influence on the static and dynamic effects of the bridge structure is analyzed. Four working conditions are selected for the study of bearing damage impact: the bearing is intact (condition 1), the bearing damage coefficient is 0.8 (condition 2), the bearing damage coefficient is 0.6 (condition 3), and the bearing damage coefficient is 0.4 (Working Condition 4). The effect value of the bridge structure under each working condition is calculated, and the simple-supported girder bridge and continuous girder bridge with typical spans are taken as examples to analyze the overall change of the bridge structure after the bearing completely fails.Keywords: bridge bearing damage, dynamic response, finite element analysis, load conditions
Procedia PDF Downloads 22832900 Numerical Evaluation of the Degradation of Shear Modulus and Damping Evolution of Soils in the Eastern Region of Algiers Using Geophysical and Geotechnical Tests
Authors: Mohamed Khiatine, Ramdane Bahar
Abstract:
The research performed during the last years has revealed that the seismic response of the soilis significantly non linear and hysteresis to the deformationsitundergoes during earthquakes and notably during violent shaking. This nonlinear behavior of soils can be characterized by curves showing the evolution of shearmodulus and damping versus distortion. Also, in this context, geotechnical seismic engineering problems often require the characterization of dynamic soil properties over a wide range of deformation. This determination of dynamic soil properties is key to predict the seismic response of soils for important civil engineering structures. This communication discusses a numerical analysis method for evaluating the nonlinear dynamic properties of soils in Algeriausing the FLAC2D software and the database resulting from geophysical and geotechnical studies when laboratory dynamic tests are not available. The nonlinear model proposed by Ramberg-Osgood and limited by the Mohr-coulomb criterion is used.Keywords: degradation, shear modulus, damping, ramberg-osgood, numerical analysis.
Procedia PDF Downloads 10432899 Peak Frequencies in the Collective Membrane Potential of a Hindmarsh-Rose Small-World Neural Network
Authors: Sun Zhe, Ruggero Micheletto
Abstract:
As discussed extensively in many studies, noise in neural networks have an important role in the functioning and time evolution of the system. The mechanism by which noise induce stochastic resonance enhancing and influencing certain operations is not clarified nor is the mechanism of information storage and coding. With the present research we want to study the role of noise, especially focusing on the frequency peaks in a three variable Hindmarsh−Rose Small−World network. We investigated the behaviour of the network to external noises. We demonstrate that a variation of signal to noise ratio of about 10 dB induces an increase in membrane potential signal of about 15%, averaged over the whole network. We also considered the integral of the whole membrane potential as a paradigm of internal noise, the one generated by the brain network. We showed that this internal noise is attenuated with the size of the network or with the number of random connections. By means of Fourier analysis we found that it has distinct peaks of frequencies, moreover, we showed that increasing the size of the network introducing more neurons, reduced the maximum frequencies generated by the network, whereas the increase in the number of random connections (determined by the small-world probability p) led to a trend toward higher frequencies. This study may give clues on how networks utilize noise to alter the collective behaviour of the system in their operations.Keywords: neural networks, stochastic processes, small-world networks, discrete Fourier analysis
Procedia PDF Downloads 29032898 Hybrid Heat Pump for Micro Heat Network
Authors: J. M. Counsell, Y. Khalid, M. J. Stewart
Abstract:
Achieving nearly zero carbon heating continues to be identified by UK government analysis as an important feature of any lowest cost pathway to reducing greenhouse gas emissions. Heat currently accounts for 48% of UK energy consumption and approximately one third of UK’s greenhouse gas emissions. Heat Networks are being promoted by UK investment policies as one means of supporting hybrid heat pump based solutions. To this effect the RISE (Renewable Integrated and Sustainable Electric) heating system project is investigating how an all-electric heating sourceshybrid configuration could play a key role in long-term decarbonisation of heat. For the purposes of this study, hybrid systems are defined as systems combining the technologies of an electric driven air source heat pump, electric powered thermal storage, a thermal vessel and micro-heat network as an integrated system. This hybrid strategy allows for the system to store up energy during periods of low electricity demand from the national grid, turning it into a dynamic supply of low cost heat which is utilized only when required. Currently a prototype of such a system is being tested in a modern house integrated with advanced controls and sensors. This paper presents the virtual performance analysis of the system and its design for a micro heat network with multiple dwelling units. The results show that the RISE system is controllable and can reduce carbon emissions whilst being competitive in running costs with a conventional gas boiler heating system.Keywords: gas boilers, heat pumps, hybrid heating and thermal storage, renewable integrated and sustainable electric
Procedia PDF Downloads 41732897 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 20032896 Identification of Bayesian Network with Convolutional Neural Network
Authors: Mohamed Raouf Benmakrelouf, Wafa Karouche, Joseph Rynkiewicz
Abstract:
In this paper, we propose an alternative method to construct a Bayesian Network (BN). This method relies on a convolutional neural network (CNN classifier), which determinates the edges of the network skeleton. We train a CNN on a normalized empirical probability density distribution (NEPDF) for predicting causal interactions and relationships. We have to find the optimal Bayesian network structure for causal inference. Indeed, we are undertaking a search for pair-wise causality, depending on considered causal assumptions. In order to avoid unreasonable causal structure, we consider a blacklist and a whitelist of causality senses. We tested the method on real data to assess the influence of education on the voting intention for the extreme right-wing party. We show that, with this method, we get a safer causal structure of variables (Bayesian Network) and make to identify a variable that satisfies the backdoor criterion.Keywords: Bayesian network, structure learning, optimal search, convolutional neural network, causal inference
Procedia PDF Downloads 17532895 Damping Function and Dynamic Simulation of GUPFC Using IC-HS Algorithm
Authors: Galu Papy Yuma
Abstract:
This paper presents a new dynamic simulation of a power system consisting of four machines equipped with the Generalized Unified Power Flow Controller (GUPFC) to improve power system stability. The dynamic simulation of the GUPFC consists of one shunt converter and two series converters based on voltage source converter, and DC link capacitor installed in the power system. MATLAB/Simulink is used to arrange the dynamic simulation of the GUPFC, where the power system is simulated in order to investigate the impact of the controller on power system oscillation damping and to show the simulation program reliability. The Improved Chaotic- Harmony Search (IC-HS) Algorithm is used to provide the parameter controller in order to lead-lag compensation design. The results obtained by simulation show that the power system with four machines is suitable for stability analysis. The use of GUPFC and IC-HS Algorithm provides the excellent capability in fast damping of power system oscillations and improve greatly the dynamic stability of the power system.Keywords: GUPFC, IC-HS algorithm, Matlab/Simulink, damping oscillation
Procedia PDF Downloads 44632894 On the Inequality between Queue Length and Virtual Waiting Time in Open Queueing Networks under Conditions of Heavy Traffic
Authors: Saulius Minkevicius, Edvinas Greicius
Abstract:
The paper is devoted to the analysis of queueing systems in the context of the network and communications theory. We investigate the inequality in an open queueing network and its applications to the theorems in heavy traffic conditions (fluid approximation, functional limit theorem, and law of the iterated logarithm) for a queue of customers in an open queueing network.Keywords: fluid approximation, heavy traffic, models of information systems, open queueing network, queue length of customers, queueing theory
Procedia PDF Downloads 28632893 An Adjusted Network Information Criterion for Model Selection in Statistical Neural Network Models
Authors: Christopher Godwin Udomboso, Angela Unna Chukwu, Isaac Kwame Dontwi
Abstract:
In selecting a Statistical Neural Network model, the Network Information Criterion (NIC) has been observed to be sample biased, because it does not account for sample sizes. The selection of a model from a set of fitted candidate models requires objective data-driven criteria. In this paper, we derived and investigated the Adjusted Network Information Criterion (ANIC), based on Kullback’s symmetric divergence, which has been designed to be an asymptotically unbiased estimator of the expected Kullback-Leibler information of a fitted model. The analyses show that on a general note, the ANIC improves model selection in more sample sizes than does the NIC.Keywords: statistical neural network, network information criterion, adjusted network, information criterion, transfer function
Procedia PDF Downloads 56532892 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis
Procedia PDF Downloads 17532891 EHD Effect on the Dynamic Characteristics of a Journal Bearing Lubricated with Couple Stress Fluids
Authors: B. Chetti, W. A. Crosby
Abstract:
This paper presents a numerical analysis for the dynamic performance of a finite journal bearing lubricated with couple stress fluid taking into account the effect of the deformation of the bearing liner. The modified Reynolds equation has been solved by using finite difference technique. The dynamic characteristics in terms of stiffness coefficients, damping coefficients, critical mass and whirl ratio are evaluated for different values of eccentricity ratio and elastic coefficient for a journal bearing lubricated with a couple stress fluids and a Newtonian fluid. The results show that the dynamic characteristics of journal bearings lubricated with couple stress fluids are improved compared to journal bearings lubricated with Newtonian fluids.Keywords: journal bearing, elastohydrodynamic, stability, couple stress
Procedia PDF Downloads 36032890 Dynamic Modeling of Wind Farms in the Jeju Power System
Authors: Dae-Hee Son, Sang-Hee Kang, Soon-Ryul Nam
Abstract:
In this paper, we develop a dynamic modeling of wind farms in the Jeju power system. The dynamic model of wind farms is developed to study their dynamic effects on the Jeju power system. PSS/E is used to develop the dynamic model of a wind farm composed of 1.5-MW doubly fed induction generators. The output of a wind farm is regulated based on pitch angle control, in which the two controllable parameters are speed and power references. The simulation results confirm that the pitch angle is successfully controlled, regardless of the variation in wind speed and output regulation.Keywords: dynamic model, Jeju power system, online limitation, pitch angle control, wind farm
Procedia PDF Downloads 32532889 Comparative Study of Static and Dynamic Bending Forces during 3-Roller Cone Frustum Bending Process
Authors: Mahesh K. Chudasama, Harit K. Raval
Abstract:
3-roller conical bending process is widely used in the industries for manufacturing of conical sections and shells. It involves static as well dynamic bending stages. Analytical models for prediction of bending force during static as well as dynamic bending stage are available in the literature. In this paper, bending forces required for static bending stage and dynamic bending stages have been compared using the analytical models. It is concluded that force required for dynamic bending is very less as compared to the bending force required during the static bending stage.Keywords: analytical modeling, cone frustum, dynamic bending, static bending
Procedia PDF Downloads 30532888 Tail-Binding Effect of Kinesin-1 Auto Inhibition Using Elastic Network Model
Authors: Hyun Joon Chang, Jae In Kim, Sungsoo Na
Abstract:
Kinesin-1 (hereafter called kinesin) is a molecular motor protein that moves cargos toward the end of microtubules using the energy of adenosine triphosphate (ATP) hydrolysis. When kinesin is inactive, its tail autoinhibits the motor chain in order to prevent from reacting with the ATP by cross-linking of the tail domain to the motor domains at two positions. However, the morphological study of kinesin during autoinhibition is yet remained obscured. In this study, we report the effect of the binding site of the tail domain using the normal mode analysis of the elastic network model on kinesin in the tail-free form and tail-bind form. Considering the relationship between the connectivity of conventional network model with respect to the cutoff length and the functionality of the binding site of the tail, we revaluated the network model to observe the key role of the tail domain in its structural aspect. Contingent on the existence of the tail domain, the results suggest the morphological stability of the motor domain. Furthermore, employing the results from normal mode analysis, we have determined the strain energy of the neck linker, an essential portion of the motor domain for ATP hydrolysis. The results of the neck linker also converge to the same indication, i.e. the morphological analysis of the motor domain.Keywords: elastic network model, Kinesin-1, autoinhibition
Procedia PDF Downloads 45232887 Fog Computing- Network Based Computing
Authors: Navaneeth Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat
Abstract:
Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.Keywords: cloud computing, fog computing, network devices, appstore
Procedia PDF Downloads 38532886 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network
Abstract:
In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay
Procedia PDF Downloads 35932885 Value Co-Creation Model for Relationships Management
Authors: Kolesnik Nadezda A.
Abstract:
The research aims to elaborate inter-organizational network relationships management model to maximize value co-creation. We propose a network management framework that requires evaluation of network partners with respect to their position and role in network; and elaboration of appropriate relationship development strategy with partners in network. Empirical research and approval is based on the case study method, including structured in-depth interviews with the companies from b2b market.Keywords: inter-organizational networks, value co-creation, model, B2B market
Procedia PDF Downloads 45632884 Cloud-Based Dynamic Routing with Feedback in Formal Methods
Authors: Jawid Ahmad Baktash, Mursal Dawodi, Tomokazu Nagata
Abstract:
With the rapid growth of Cloud Computing, Formal Methods became a good choice for the refinement of message specification and verification for Dynamic Routing in Cloud Computing. Cloud-based Dynamic Routing is becoming increasingly popular. We propose feedback in Formal Methods for Dynamic Routing and Cloud Computing; the model and topologies show how to send messages from index zero to all others formally. The responsibility of proper verification becomes crucial with Dynamic Routing in the cloud. Formal Methods can play an essential role in the routing and development of Networks, and the testing of distributed systems. Event-B is a formal technique that consists of describing the problem rigorously and introduces solutions or details in the refinement steps. Event-B is a variant of B, designed for developing distributed systems and message passing of the dynamic routing. In Event-B and formal methods, the events consist of guarded actions occurring spontaneously rather than being invoked.Keywords: cloud, dynamic routing, formal method, Pro-B, event-B
Procedia PDF Downloads 42232883 Medical Image Augmentation Using Spatial Transformations for Convolutional Neural Network
Authors: Trupti Chavan, Ramachandra Guda, Kameshwar Rao
Abstract:
The lack of data is a pain problem in medical image analysis using a convolutional neural network (CNN). This work uses various spatial transformation techniques to address the medical image augmentation issue for knee detection and localization using an enhanced single shot detector (SSD) network. The spatial transforms like a negative, histogram equalization, power law, sharpening, averaging, gaussian blurring, etc. help to generate more samples, serve as pre-processing methods, and highlight the features of interest. The experimentation is done on the OpenKnee dataset which is a collection of knee images from the openly available online sources. The CNN called enhanced single shot detector (SSD) is utilized for the detection and localization of the knee joint from a given X-ray image. It is an enhanced version of the famous SSD network and is modified in such a way that it will reduce the number of prediction boxes at the output side. It consists of a classification network (VGGNET) and an auxiliary detection network. The performance is measured in mean average precision (mAP), and 99.96% mAP is achieved using the proposed enhanced SSD with spatial transformations. It is also seen that the localization boundary is comparatively more refined and closer to the ground truth in spatial augmentation and gives better detection and localization of knee joints.Keywords: data augmentation, enhanced SSD, knee detection and localization, medical image analysis, openKnee, Spatial transformations
Procedia PDF Downloads 15232882 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 832881 An Experimental Study of Dynamic Compressive Strength of Bushveld Complex Brittle Rocks under Impact Loadingsa Chemicals and Fibre Corporation, Changhua Branch
Authors: A. Mudau, T. R. Stacey, R. A. Govender
Abstract:
This paper reports for the first time the findings on the dynamic compressive strength data of Bushveld Complex brittle rock materials. These rocks were subjected to both quasi-static and impact loading tests to help understand their behaviour both under quasi-static and dynamic loading conditions. Unlike quasi-static tests, characterization of dynamic behaviour of materials is challenging, in particularly brittle rock materials. The split Hopkinson pressure bar (SHPB) results reported for anorthosite and norite showed relatively low values for dynamic compressive strength compared to the quasi-static uniaxial compressive strength data. It was noticed that the dynamic stress conditions were not fully attained during testing, as well as constant strain rate.Keywords: Bushveld Complex, dynamic comperession, rock brittleness, stress equilibrium
Procedia PDF Downloads 497