This paper investigates the design of fault-tolerant TDMA-based data aggregation scheduling (DAS) protocols for wireless sensor networks (WSNs). DAS is a fundamental pattern of communication in wireless sensor networks where sensor nodes aggregate and relay data to a sink node. However, any such DAS protocol needs to be cognisant of the fact that crash failures can occur. We make the following contributions: (i) we identify a necessary condition to solve the DAS problem, (ii) we introduce a strong and weak version of the DAS problem, (iii) we show several impossibility results due to the crash failures, (iv) we develop a modular local algorithm that solves stabilising weak DAS and (v) we show, through simulations and an actual deployment on a small testbed, how specific instantiations of parameters can lead to the algorithm achieving very efficient stabilisation. 相似文献
Infrared spectroscopy is suggested as a diagnostic method for the characterisation and qualitative estimation of the two classes of tannins. Gallic acid, tannic acid and chebulinic acid have been taken as model compounds for the hydrolysable and catechin for the condensed tannins. The former class is marked by the presence of strong absorption maxima at 1710 – 35 cm?1. The two classes have characteristic pattern of absorption, from which it is possible to characterise the particular type of tannin. 相似文献
Magnetic Resonance Materials in Physics, Biology and Medicine - The success of parallel Magnetic Resonance Imaging algorithms like SENSitivity Encoding (SENSE) depends on an accurate estimation of... 相似文献
The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.
In this article, we have examined the performance of some useful capability indices using normal and non-normal distributions. The confidence intervals are calculated and mean coverage rates are observed for different capability indices. The effects of symmetry and kurtosis of parent distributions are examined on the mean coverage rates of different capability indices. Moreover, we have investigated the robustness (of confidence interval) using the median and percentile-based indices. We have considered the well-known distributions including normal, gamma, t, Weibull, and chi-squared. For these process scenarios, we have observed that some indices resist disturbance only in symmetry of the parent distribution, some resist the disturbance in symmetry and kurtosis of the distribution, and some indices don’t resist against either type of disturbance. 相似文献
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment
of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization
technologies is presented. Related to this, recent developments in Grid authentication and authorization infrastructures suggest
adoption of the Shibboleth technology which offers advantages in terms of usability, confidentiality, scalability and manageability.
When combined with advanced authorization technologies, Shibboleth-based authentication and authorization infrastructures
provide role-based, fine-grained authorization. We share our experience in constructing a Shibboleth-based authentication
and authorization infrastructure and believe that such infrastructure provides a promising solution for the security of many
application domains. 相似文献