In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme. 相似文献
We study the problem of stabilizing a distributed linear system on a subregion of its geometrical domain. We are concerned with two methods: the first approach enables us to characterize a stabilizing control via the steady state Riccati equation, and the second one is based on decomposing the state space into two suitable subspaces and studying the projections of the initial system onto such subspaces. The obtained results are performed through various examples. 相似文献
Wireless Personal Communications - This paper proposes a new energy management function intended to be integrated in the Hierarchical Smart Routing Protocol (HSRP) mainly proposed for Wireless... 相似文献
Background removal of an identity (ID) picture consists in separating the foreground (face, body, hair and clothes) from the background of the image. It is a necessary groundwork for all modern identity documents that also has many benefits for improving ID security. State of the art image processing techniques encountered several segmentation issues and offer only partial solutions. It is due to the presence of erratic components like hairs, poor contrast, luminosity variation, shadow, color overlap between clothes and background. In this paper, a knowledge infused approach is proposed that hybridizes smart image processing tasks and prior knowledge. The research is based on a divide and conquer strategy aiming at simulating the sequential attention of human when performing a manual segmentation. Knowledge is infused by considering the spatial relation between anatomic elements of the ID image (face feature, forehead, body and hair) as well as their “signal properties”. The process consists in first determining a convex hull around the person’s body including all the foreground while keeping very close to the contour between the background and the foreground. Then, a body map generated from biometric analysis associated to an automatic grab cut process is applied to reach a finer segmentation. Finally, a heuristic-based post-processing step consisting in correcting potential hair and fine boundary issues leads to the final segmentation. Experimental results show that the newly proposed architecture achieves better performances than tested current state-of-the-art methodologies including active contours, generalist popular deep learning techniques, and also two other ones considered as the smartest for portrait segmentation. This new technology has been adopted by an international company as its industrial ID foreground solution.
Context: Prompt injection of epinephrine (adrenaline) from epinephrine auto-injectors (EAIs) is the primary treatment for anaphylaxis in out-of-hospital settings. Storage of EAIs at room temperature (25?°C) is advised; however, storage at excessively high temperatures sometimes occurs. To our knowledge, there are no previous publications on the doses of epinephrine ejected from EAIs after storage at such temperatures.Objective: We examined the epinephrine doses delivered from activated EAIs stored constantly or cyclically at 70?°C.Methods: Twenty-five in-date EAIs were stored constantly or cyclically at 70?°C (excessive heat) or 25?°C (controls) for 5?d or 10?d. EAIs were activated and the epinephrine doses in the ejected solutions were measured using HPLC-UV. The enantiomeric purity of epinephrine was also measured by HPLC-UV.Results: Control EAIs ejected a volume of 0.300?±?0.006?mL containing 103.7?±?3.3% of labeled dose (LD). After 5?d or 10?d of constant storage at 70?°C and activation at 70?°C, EAIs ejected a volume of 0.367?±?0.008?mL containing 96.8?±?3.8% LD and 0.373?±?0.007?mL containing 77.7?±?3.3% LD, respectively. After 5?d of cyclic storage at 70?°C and cooling to 25?°C before activation, EAIs ejected a volume of 0.311?±?0.008?mL containing 87.2?±?1.9% LD. Under the experimental conditions of this study, the resultant chromatographic peaks of epinephrine solutions from all EAIs represented only the pure l-enantiomer of epinephrine.Conclusion: EAIs should be stored under recommended conditions of the manufacturer. EAIs stored at excessively high temperatures cannot be used to treat humans while still hot, and when cooled, cannot be relied on to deliver the labeled epinephrine dose in anaphylaxis. 相似文献
A distributed storage service lets clients abstract a single reliable shared storage device using a collection of possibly unreliable computing units. Algorithms that implement this abstraction offer certain tradeoffs and vary according to dimensions such as complexity, the consistency semantics provided, and the types of failures tolerated. 相似文献
In this article we develop a new method to segment high angular resolution diffusion imaging (HARDI) data. We first estimate
the orientation distribution function (ODF) using a fast and robust spherical harmonic (SH) method. Then, we use a region-based
statistical surface evolution on this image of ODFs to efficiently find coherent white matter fiber bundles. We show that
our method is appropriate to propagate through regions of fiber crossings and we show that our results outperform state-of-the-art
diffusion tensor (DT) imaging segmentation methods, inherently limited by the DT model. Results obtained on synthetic data,
on a biological phantom, on real datasets and on all 13 subjects of a public NMR database show that our method is reproducible,
automatic and brings a strong added value to diffusion MRI segmentation.
In this paper, a fractional order control law is proposed and implemented for the evaluation of trajectory tracking performance of a rotary flexible-joint system. A state feedback based fractional integral control scheme is used in this proposed method. In this scheme, state feedback is responsible for stabilizing the system. The compensator, in series with the fractional integrator leads to obtain a similar closed-loop transient response like Bode’s ideal transfer function. The effectiveness of the proposed controller in tracking and being robust against parameter uncertainties is demonstrated through simulation. In addition, to show the usefulness of the proposed control scheme, the fractional controller is compared to an integer state feedback control by simulation and through experimentation on the Quanser’s rotary flexible-joint system. 相似文献