共查询到20条相似文献,搜索用时 15 毫秒
1.
Wireless Networks - Instability of wireless networks and high mobility of vehicles make effective and reliable delivery of packets in VANETs a challenging issue. Anypath routing is proposed to... 相似文献
2.
Jia Li Chaddha N. Gray R.M. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1999,45(4):1082-1091
Gersho's (1979) bounds on the asymptotic performance of vector quantizers are valid for vector distortions which are powers of the Euclidean norm. Yamada, Tazaki, and Gray (1980) generalized the results to distortion measures that are increasing functions of the norm of their argument. In both cases, the distortion is uniquely determined by the vector quantization error, i.e., the Euclidean difference between the original vector and the codeword into which it is quantized. We generalize these asymptotic bounds to input-weighted quadratic distortion measures and measures that are approximately output-weighted-quadratic when the distortion is small, a class of distortion measures often claimed to be perceptually meaningful. An approximation of the asymptotic distortion based on Gersho's conjecture is derived as well. We also consider the problem of source mismatch, where the quantizer is designed using a probability density different from the true source density. The resulting asymptotic performance in terms of distortion increase in decibels is shown to be linear in the relative entropy between the true and estimated probability densities 相似文献
3.
In a multihop network, packets go through a number of hops before they are absorbed at their destinations. In routing to its destination using minimum path, a packet at a node may have a preferential output link (the so-called “care” packet) or may not (the so-called “don't care” packet). Since each node in an optical multihop network may have limited buffer, when such buffer runs out, contention among packets for the same output link can be resolved by deflection. In this paper, we study packet scheduling algorithms and their performance in a buffered regular network with deflection routing. Using shufflenet as an example, we show that high performance (in terms of throughput and delay) can he achieved if “care” packets can be scheduled with higher priority than “don't care” packets. We then analyze the performance of a shufflenet with this priority scheduling given the buffer size per node. Traditionally, the deflection probability of a packet at a node is solved from a transcendental equation by numerical methods which quickly becomes very cumbersome when the buffer size is greater than one packet per node. By exploiting the special topological properties of the shufflenet, we are able to simplify the analysis greatly and obtain a simple closed-form approximation of the deflection probability. The expression allows us to extract analytically the performance trend of the shufflenet with respect to its buffer and network sizes. We show that a shufflenet indeed performs very well with only one buffer, and can achieve performance close to the store-and-forward case using a buffer size as small as four packets per node 相似文献
4.
Multiple wireless devices jointly create and maintain ad hoc networks; their employment is favored to happen in a variety
of environments with distinct topological characteristics. Diversified environmental conditions are expected to vary network
performance. In fact, obstacles, buildings and/or mountains may act as either barriers, or source of noise for the radio signals.
Nevertheless, most of the previous performance evaluation studies based on simulation, neglected this consideration; they
used simulation models that were too simplistic, and too narrow (i.e. idealistic) in their scopes. With this paper we propose
a new, complete and realistic Urban Mobility Model (UMM). It models realistically users motion, and radio signals propagation
in a city-like scenario. Our aim is to study the effects of realistic network simulation on routing performance. The results
prove that a realistic scenario with roads and buildings has a significant impact on routing. 相似文献
5.
Objective image fusion performance measure 总被引:50,自引:0,他引:50
A measure for objectively assessing the pixel level fusion performance is defined. The proposed metric reflects the quality of visual information obtained from the fusion of input images and can be used to compare the performance of different image fusion algorithms. Experimental results clearly indicate that this metric is perceptually meaningful 相似文献
6.
Harris Simaremare Abdelhafid Abouaissa Riri Fitri Sari Pascal Lorenz 《International Journal of Communication Systems》2015,28(14):2003-2019
A mobile ad hoc networks (MANET) is a decentralized, self‐organizing, infrastructure‐less network and adaptive gathering of independent mobile nodes. Because of the unique characteristics of MANET, the major issues to develop a routing protocol in MANET are the security aspect and the network performance. In this paper, we propose a new secure protocol called Trust Ad Hoc On‐demand Distance Vector (AODV) using trust mechanism. Communication packets are only sent to the trusted neighbor nodes. Trust calculation is based on the behaviors and activities information of each node. It is divided in to trust global (TG) and trust local (TL). TG is a trust calculation based on the total of received routing packets and the total of sending routing packets. TL is a comparison between total received packets and total forwarded packets by neighbor node from specific nodes. Nodes conclude the total trust level of its neighbors by accumulating the TL and TG values. The performance of Trust AODV is evaluated under denial of service/distributed denial of service (DOS/DDOS) attack using network simulator NS‐2. It is compared with the Trust Cross Layer Secure (TCLS) protocol. Simulation results show that the Trust AODV has a better performance than TCLS protocol in terms of end‐to‐end delay, packet delivery ratio, and overhead. Next, we improve the performance of Trust AODV using ant algorithm. The proposed protocol is called Trust AODV + Ant. The implementation of ant algorithm in the proposed secure protocol is by adding an ant agent to put the positive pheromone in the node if the node is trusted. Ant agent is represented as a routing packet. The pheromone value is saved in the routing table of the node. We modified the original routing table by adding the pheromone value field. The path communication is selected based on the pheromone concentration and the shortest path. Trust AODV + Ant is compared with simple ant routing algorithm (SARA), AODV, and Trust AODV under DOS/DDOS attacks in terms of performance. Simulation results show that the packet delivery ratio and throughput of the Trust AODV increase after using ant algorithm. However, in terms of end‐to‐end delay, there is no significant improvement. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
7.
了解系统总线的活动情况可帮助开发工程师显著改善嵌入式应用的性能。过去,由于嵌入式处理器缺乏复杂的软硬件结合特性,因此监测系统总线的活动情况是一项挑战性难题。在系统级了解应用程序的行为对于有效利用系统资源非常关键,这些资源包括外部存储器、DMA控制器、仲裁、系统总线互连等。 相似文献
8.
We present a framework for QoS routing computation with path caching. The framework has three phases to allow different levels of information to be processed at different timescales to effectively meet QoS requirement of a newly arrived flow. Path caching is introduced in the first phase to allow selection and filtering in subsequent phases. We describe several routing schemes that can fit into this framework. Through simulation results, we show where and how the benefit of path caching can be exploited depending on the number of paths cached, and when to invoke other controls. Our results show that QoS routing by itself cannot improve the network and/or service performance unless controls such as trunk reservation and source-based admission control are also activated. The invocation of these functions can also allow maximum benefit from the path caching framework. 相似文献
9.
Information measure for performance of image fusion 总被引:49,自引:0,他引:49
Guihong Qu Dali Zhang Pingfan Yan 《Electronics letters》2002,38(7):313-315
Mutual information is proposed as an information measure for evaluating image fusion performance. The proposed measure represents how much information is obtained from the input images. No assumption is made regarding the nature of the relation between the intensities in both input modalities. The results show that the measure is meaningful and explicit 相似文献
10.
11.
Kyriakos Vlachos Erik Van Breusegem Kostas Christodoulopoulos Didier Colle Kostas Ramantas Piet Demeester 《Photonic Network Communications》2007,13(3):227-240
In this article, we present a detailed performance evaluation of a hybrid optical switching (HOS) architecture called Overspill
Routing in Optical Networks (ORION). The ORION architecture combines (optical) wavelength and (electronic) packet switching,
so as to obtain the individual advantages of both switching paradigms. In particular, ORION exploits the possible idle periods
of established lightpaths to transmit packets destined to the next common node, or even directly to their common end-destination.
Depending on whether all lightpaths are allowed to simultaneously carry and terminate overspill traffic or overspill is restricted
to a sub-set of wavelengths, the architecture limits itself to constrained or un-constrained ORION. To evaluate both cases, we developed an extensive network simulator where the basic features of the ORION architecture
were modeled, including suitable edge/core node switches and load-varying sources to simulate overloading traffic conditions.
Further, we have assessed various aspects of the ORION architecture including two basic routing/forwarding policies and various
buffering schemes. The complete network study shows that ORION can absorb temporal traffic overloads, as intended, provided
sufficient buffering is present. We also demonstrate that the restriction of simultaneous packet insertions/extractions, to
reduce the necessary interfaces, do not deteriorate performance and thus the use of traffic concentrators assure ORION’s economic viability. 相似文献
12.
云计算平台生存性研究 总被引:3,自引:0,他引:3
本文主要研究云计算平台的生存性问题,设计并提出一种云计算平台生存性机制,利用虚拟化技术把硬件环境与运行系统进行强隔离后,通过把虚拟机迁移到稳定可靠的硬件设备上来保证虚拟机承载的服务的可用性,以提升云计算平台在大规模系统故障发生的情况下的存活能力。具体工作包括设计基于基础设施运行状况的实时监控、基于虚拟机的调度优化、云服务的自动迁移调度和服务自动恢复、以及在异常出现情况下的预警和告警的机制。本文的主要贡献包括确立了云计算平台的生存性需求,提出了基于虚拟资源迁移的生存性机制以及实现并整合生存性机制到现有的Vebula私有云基础设施平台。 相似文献
13.
A method for objectively measuring the subjective quality of speech clipped by voice activity detectors (VADs) is presented. This system is evaluated by comparing the output of a VAD to that obtained from subjective tests. The method is shown to produce an accurate prediction of the mean opinion score (MOS) determined by listening tests 相似文献
14.
Presents an analysis of band energies and evaluates the effects of aliasing in perfect reconstruction (PR) multirate systems. An objective performance measure called nonaliasing energy ratio (NER) is defined. The merit of the new measure is emphasized with performance comparisons of popular block transforms and 2-band PR-QMF based hierarchical filter banks. It is shown that the new measure complements the widely used energy compaction measure 相似文献
15.
Md. Shohrab Hossain Shaikh Shahriar Hassan Mohammed Atiquzzaman William Ivancic 《Telecommunication Systems》2018,68(2):295-318
Survivability and scalability are key terms for any network. The challenge is greater in space networks than in terrestrial networks. Satellites have various uses, some notable uses are communication, observation, meteorology, navigation etc. In future satellites will aid terrestrial users by providing Internet connectivity. With proliferation of Internet users, demand for satellite services will increase and soon we will suffer from bandwidth limitation. Hence, the scalability and survivability of space networks are very important issues to ensure smooth connectivity to all the users both mobile and immobile. Since, most of the existing works on network survivability and scalability are focused on terrestrial networks. We have categorized the existing works on survivability and scalability of terrestrial networks. In addition, we have performed a comprehensive survey on the popular products available in the market for network survivability and scalability. Finally, we have listed the major issues and challenges of space networks that needs to be considered before applying network scalability and survivability solutions on them. This work can help network engineers to select suitable solutions for space networks considering the available choices and challenges listed in this paper. 相似文献
16.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1980,68(8):1022-1024
It is shown that, under certain conditions, it is possible to have mean packet delay greater than mean message delay in single channel networks. The analysis includes overheads and transmission interference. It is shown further that for exponential message lengths, under the same assumptions, mean packet delay is always greater than mean message delay. 相似文献
17.
Qing Zhu Wayne Wei-Ming Dai 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》1996,4(2):210-226
A new concept of chip and package co-design for the clock network is presented in this paper. We propose a two level clock distribution scheme which partitions the clock network into two levels. First, the clock terminals are partitioned into a set of clusters. For each cluster, a local on-chip clock tree is used to distribute the clock signal from a locally inserted buffer to terminals inside this cluster. The clock signal is then distributed from the main clock driver to each of local buffers by means of a global clock tree, which is a planar tree with equal path lengths. With the flip chip area I/O attachment, the planar global clock tree can be put on a dedicated package layer. The interconnect on the package layer has two to four order smaller resistance than that on the chip layer. The main contribution of this paper is a novel algorithm to construct a planar clock tree with equal path lengths-the length of the path from the clock source to each destination is exactly the same. In addition, the path length from the source to destinations is minimized 相似文献
18.
Ting‐Chao Hou Ming‐Chieh Chan Chien‐Min Wu 《International Journal of Communication Systems》2014,27(11):2870-2888
Since the inception of the dynamic source routing (DSR) protocol for mobile ad hoc networks, several enhancements have been proposed, along with other competing routing protocols. All of them provide different degrees of throughput improvement under different scenarios. In this paper, we use DSR as a base, diagnose the contribution of its constituent components, and provide the reason why certain routing enhancements can increase the throughput and under what conditions. A major finding of the study is that the broadcast mechanism used in propagating route request and route error messages has a significant impact on how routing behaves. We also show that unicast route error report and preventive cache update improve throughput at different sides of the mobility spectrum. Finally, we show that aggressive buffer combined with route management provides the best performance improvement on the entire mobility and loading spectrum. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
19.
20.
To move packets among the vehicles mobility pattern of vehicles in a vehicular network performs an imperative factor for creating competent routing protocol. To reproduce the movement features of vehicles in VANET is the main purpose of the mobility model. Manhattan mobility model is conversed by a lot of researchers. Merely very limited research study is prepared on highway and freeway mobility models. In this document Cluster scheme, different routing protocols are used to the freeway mobility based vehicular architecture. The Ns2.34 simulation effect illustrates the effort of cluster scheme over different protocols and standard 802.11p. The competence of the routing protocols in the vehicular communication by means of freeway movement pattern is estimated by different network parameters. 相似文献