首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We investigate a wireless computing architecture, where mobile terminals can execute their computation tasks either 1) locally, at the terminal's processor, or 2) remotely, assisted by the network infrastructure, or even 3) combining the former two options. Remote execution involves: 1) sending the task to a computation server via the wireless network, 2) executing the task at the server, and 3) downloading the results of the computation back to the terminal. Hence, it results to energy savings at the terminal (sparing its processor from computations) and execution speed gains due to (typically) faster server processor(s), as well as overheads due to the terminal server wireless communication. The net gains (or losses) are contingent on network connectivity and server load. These may vary in time, depending on user mobility, network, and server congestion (due to the concurrent sessions/connections from other terminals). In local execution, the wireless terminal faces the dilemma of power managing the processor, trading-off fast execution versus low energy consumption. We model the system within a Markovian dynamic control framework, allowing the computation of optimal execution policies. We study the associated energy versus delay trade-off and assess the performance gains attained in various test cases in comparison to conventional benchmark policies.  相似文献   

2.
This paper outlines the current status of the BT Group mobile joint ventures, in terms of shareholding, and goes on to highlight the key challenges BT has faced in order to increase its global reach.A new mobile operator, as a fresh entrant into an already competitive market, has to face a range of major challenges. These key to-date challenges are discussed, along with experiences from a number of major mobile ventures within Europe.With an increasing number of the mobile ventures obtaining licences to operate 3rd generation mobile networks (i.e. UMTS) there is another set of 'new challenges' to be identified and overcome. The preparations for meeting these new challenges posed by the introduction of 3rd generation mobile networks are outlined, alongside some initiatives from BT Group as part of their contribution to the new 'wireless family'.  相似文献   

3.
4.
针对如何基于有限的系统剩余资源进行任务优化卸载以增加移动终端的数字货币收益问题,该文在融合区块链与雾计算系统中提出一种基于节点剩余资源、网络时延的任务卸载方案。为了实现任务的优化卸载,首先基于任务量对移动终端的预期收益进行了分析,其次基于网络节点剩余计算资源、存储资源、功率资源、网络时延联合分析了移动终端的支出。此后以最大化移动终端的数字货币收益为优化目标建立了数学优化模型,并利用模拟退火(SA)算法对优化模型进行求解。仿真结果证明上述方案的有效性。  相似文献   

5.
This paper establishes a new layered flying ad hoc networks(FANETs) system of mobile edge computing(MEC) supported by multiple UAVs,where the first layer of user UAVs can perform tasks such as area coverage, and the second layer of MEC UAVs are deployed as flying MEC sever for user UAVs with computing-intensive tasks. In this system, we first divide the user UAVs into multiple clusters, and transmit the tasks of the cluster members(CMs) within a cluster to its cluster head(CH). Then, we need to determine whether each CH’ tasks are executed locally or offloaded to one of the MEC UAVs for remote execution(i.e., task scheduling), and how much resources should be allocated to each CH(i.e., resource allocation), as well as the trajectories of all MEC UAVs.We formulate an optimization problem with the aim of minimizing the overall energy consumption of all user UAVs, under the constraints of task completion deadline and computing resource, which is a mixed integer non-convex problem and hard to solve. We propose an iterative algorithm by applying block coordinate descent methods. To be specific, the task scheduling between CH UAVs and MEC UAVs, computing resource allocation, and MEC UAV trajectory are alternately optimized in each iteration. For the joint task scheduling and computing resource allocation subproblem and MEC UAV trajectory subproblem, we employ branch and bound method and continuous convex approximation technique to solve them,respectively. Extensive simulation results validate the superiority of our proposed approach to several benchmarks.  相似文献   

6.
为了降低移动Ad Hoc云中客户端卸载计算密集型任务过程中产生的计算能耗、传输能耗和任务时延,该文提出了一种联合优化算法。该算法首先基于计算能耗、通信能耗及任务时延进行建模;然后进行预估计,以选择更优的代理终端,并由此降低总的系统能耗与任务时延。仿真结果表明,相对于传统云算法,该算法在系统能耗和任务时延两方面均有显著提升。  相似文献   

7.
高校图书馆内网安全隐患与防范策略探讨   总被引:1,自引:0,他引:1  
基于提高内网安全重要性与迫切性的认识,更好地发挥高校图书馆网络系统在实现文献资源保障和信息服务中的作用。分析了高校图书馆内网安全隐患,指出主要原因是技术防范措施不到位和安全管理制度不严密,而内网用户的违规行为加剧了安全事件的发生。探讨了内网安全管理策略的制定,结论是图书馆内网安全体系建设应增强对内网安全重要性的认识,注重内网安全与使用效率之间的平衡,采取技术与管理并重的策略。并且介绍了内网安全管理系统的主要功能在图书馆的应用。  相似文献   

8.
冯喜强 《电信技术》2004,(12):22-24
根据中国电信集团公司南北拆分重组后的“五集中、五创新”战略规划和在全国范围推广的精神,十堰市电信分公司在湖北省通信公司的统一部署下,于2003年10月开始建设本地网络资源集中管理系统,现已完成系统软、硬件的调测并已投入运行。  相似文献   

9.
随着Web2.0的出现,互联网进入第三个高速发展阶段,互联网已经成为日常生活中的重要组成部分,同时互联网上的个人隐私泄露与保护问题也日益凸显。因此,建立以身份管理为核心的信息网络基础设施,用于规范个人信息管理,提升政府的监管能力,促进ICT网络的融合与发展。本文从互联网典型身份管理技术方案分析入手,继而分析互联网中身份管理相关问题,提出身份管理作为信息网络重要基础设施的应对策略以及下一步的研究建议。  相似文献   

10.

Software-defined networks (SDNs), as an emerging paradigm by separating the control plane from the data plane, increases flexibility and network utilization and reduces redundancy and operational cost. Traffic management of software-defined networks can be defined as network traffic monitoring and analyzing measures to improve network performance and quality of service metrics. Traffic management as an effective instrument for optimizing network traffic can offer the appropriate services according to network situation. Due to the inherent characteristics of SDN, special techniques are required to analyze, predict, and adapt the network traffic in order to achieve an efficient traffic management mechanism. This paper surveys traffic management techniques of SDN in four distinct categories including, routing, load balancing, congestion control, and flow control to cover the impressible issues. Moreover, the differences between SDN and traditional networks are analyzed in terms of traffic management necessities across the various groups to further determine the dimensions affecting research in this area. Furthermore, the available algorithms in each group and their role in traffic management are reviewed as well as the research challenges and future trends.

  相似文献   

11.
对访问控制中的访问冲突检测及控制问题进行了研究,首先分析了访问冲突的研究现状和存在的不足,在经典的基于角色的访问控制思想基础上,加入人工干预环节,提出了人机交互访问冲突控制策略,分别给出了冲突检测算法和冲突控制算法,最后用一个实验验证了算法的有效性.  相似文献   

12.
In this paper we derive two iterative joint precoding and power allocation methods for downlink MC-CDMA systems with multiple transmit antennas at the base station. The first method optimally solves the so called assigned target SINRs problem, i.e. determines the precoding coefficients and the minimum sum-power allocation under a constraint on the SINR of each user. The second method instead solves the maximum sum-rate problem, i.e. maximizes the system throughput under a constraint on the overall transmit power. The main result of this paper is that the proposed joint precoding and power control solutions provide an advantage with respect to suboptimal solutions for a fully loaded system, i.e. when the number of users is equal to the spreading factor times the number of transmit antennas. For lower loads, performance of the various schemes becomes closer.  相似文献   

13.
In modern military battlefield environments, the availability of data and information has increased exponentially. Through information and communications technology, individuals and teams can access real-time data about almost any aspect of their current conflict situation, but this instantaneous availability of information to individuals and teams in these conflict situations does not always result in better or faster decisions. Instead, the speed and volume of data made available through surveillance, monitoring, analysis, computer, and communications technology can quickly overwhelm decision makers. Worse, different decision makers that need to coordinate their actions as part of a team effort might use different filters to reduce their data to something more manageable, or what they perceive as more relevant, to their emerging situation. To better manage the information in real time, a mediator is necessary. Fuzzy cognitive maps are proposed as one possible technique for mediating the information made available to decision makers. Such maps were used as part of a research project that used novice teams to simulate an Airborne Warning and Control System (AWACS) crew managing air assets in a conflict situation. The process of constructing the maps, their role in the simulation, and preliminary results of the test runs of the AWACS simulation are presented  相似文献   

14.
We investigate efficient schemes for data communication from a server (base station and access point) to a mobile terminal over a wireless channel of randomly fluctuating quality. The terminal user generates requests for data items. If the buffer (cache) of the terminal contains the requested data, no access delay/latency is incurred. If not, the data is downloaded from the server, and until becoming available locally at the terminal, the user incurs a delay cost. Moreover, a transmission/power cost is incurred to transmit the data over the wireless link at a dynamically selected power level. To lower both the access delay and transmission costs, the system may prefetch data predictively and cache them on the terminal (especially during high-link-quality periods), anticipating future user requests. The goal is to jointly minimize the overall latency and power costs by dynamically choosing what data to (pre)fetch, what power level to use, and when to use it. We develop a modeling framework (based on dynamic programming and controlled Markov chains) that captures essential performance trade-offs. It allows for the computation of optimal decisions regarding what data to (pre)fetch and what power levels to use. To cope with emerging complexities, we then design efficient online heuristics whose simulation analysis demonstrates substantial performance gains over standard approaches.  相似文献   

15.
随着信息化的不断深化与扩大.局域网的应用越来越普及,其网络服务的种类与网络资源也越来越多。局域网的网络服务与网络资源具有有限开放的特性,也就是说.除大多数的网络服务与网络资源只对某些特定的网络人群开放外,一部分网络服务与网络资源是共用的(例如邮件服务及提供此服务的网络服务器)。1  相似文献   

16.
《无线电工程》2016,(8):1-4
为使不同的无线接入网络协同工作,实现异构无线网络的接纳控制,基于生态学种群竞争与异构无线网络资源管理的映射关系,提出了一种分布式联合无线资源管理(JRRM)算法。建立了基于Gause-Lotka-Volterra(GLV)的异构网络业务量预测模型,根据预测的业务量是否达到共存状态来调整网络参数,以使各网络的业务量达到稳定平衡状态。性能分析与仿真结果表明,该算法可以均衡各个网络的业务量,减少竞争对于网络的影响,使不同网络运营商均获得了一定收益。  相似文献   

17.
现代通信技术的发展推动了通信工程市场的繁荣,通信工程建设规模不断扩大,通信工程项目建设中必然存在多重风险,为了获取更多的经济效益,就必须强化风险管控,提高风险管控工作效率,最大程度地控制风险,从而在风险管控工作中获得良好的经济效益。  相似文献   

18.
Ventricular intramyocardial electrograms are recorded with electrodes directly from the heart either in intraventricular or epimyocardial position and may be acquired either from the spontaneously beating or from the paced heart. The morphology of these signals differs significantly from that of body surface ECG recordings. Although the morphology shows general characteristics, it additionally depends on different individual impacts. This problem of individual evaluation is briefly discussed. As an appropriate methodology for its solution, personalized referencing based on similarity averaging has been employed. A more general approach may be model-based signal interpretation, which is still under investigation. The preliminary results reveal a promising potential of intramyocardial electrograms for cardiac risk surveillance, e.g., for arrhythmia detection, recognition of rejection events in transplanted hearts, and assessment of hemodynamic performance. Employing implants with telemetric capabilities may render possible permanent and even continuous cardiac telemonitoring. Furthermore, the signals can be utilized for supporting therapy management, e.g., in patients with different kinds of cardiomyopathies. This paper shall demonstrate some preliminary results and discuss the expected potential.   相似文献   

19.
基于XML的桌面个性化任务管理软件的设计与实现   总被引:1,自引:0,他引:1  
惠燕  潘煜 《现代电子技术》2011,34(18):31-33
桌面个性化任务管理软件是一种具有形象以及互动功能的桌面工具,它不但可以调节人们操作计算机时对屏幕的枯燥感,还同时在桌面提供更多有用的信息及实用的小功能。通过分析系统需求,设计了以Delphi为开发工具,以XML为数据存储工具,从而实现了开机自动运行管理功能、闹铃功能、碰撞动画功能、记事与提醒功能、皮肤设置等实用功能的开发。  相似文献   

20.
基于移动代理和信任机制的网格作业管理   总被引:1,自引:1,他引:1  
介绍了网络计算环境下的作业管理,引入了移动代理技术和信任机制,并进行了深入分析,对所用到的关键技术进行了详细的解释,说明了基于移动代理和信任机制的网格作业管理运行步骤.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号