42 resultados para Traffic Conflict.
Resumo:
We analyze the performance of an SIR based admission control strategy in cellular CDMA systems with both voice and data traffic. Most studies In the current literature to estimate CDMA system capacity with both voice and data traf-Bc do not take signal-tlFlnterference ratio (SIR) based admission control into account In this paper, we present an analytical approach to evaluate the outage probability for voice trafllc, the average system throughput and the mean delay for data traffic for a volce/data CDMA system which employs an SIR based admission controL We show that for a dataaniy system, an improvement of about 25% In both the Erlang capacity as well as the mean delay performance is achieved with an SIR based admission control as compared to code availability based admission control. For a mixed voice/data srtem with 10 Erlangs of voice traffic, the Lmprovement in the mean delay performance for data Is about 40%.Ah, for a mean delay of 50 ms with 10 Erlangs voice traffic, the data Erlang capacity improves by about 9%.
Resumo:
Given a set of points P ⊆ R2, a conflict-free coloring of P w.r.t. rectangle ranges is an assignment of colors to points of P, such that each nonempty axisparallel rectangle T in the plane contains a point whose color is distinct from all other points in P ∩ T . This notion has been the subject of recent interest and is motivated by frequency assignment in wireless cellular networks: one naturally would like to minimize the number of frequencies (colors) assigned to base stations (points) such that within any range (for instance, rectangle), there is no interference. We show that any set of n points in R2 can be conflict-free colored with O(nβ∗+o(1)) colors in expected polynomial time, where β∗ = 3−√5 2 < 0.382.
Resumo:
Colonies of the primitively eusocial wasp Ropalidia marginata consist of a single egg layer (queen) and a number of non-egg-laying workers. Although the queen is a docile individual, not at the top of the behavioral dominance hierarchy of the colony, she maintains complete reproductive monopoly. If the queen is lost or removed, one and only one of the workers potential queen (PQ)] becomes hyperaggressive and will become the next queen of the colony. The PQ is almost never challenged because she first becomes hyperaggressive and then gradually loses her aggression, develops her ovaries, and starts laying eggs. Although we are unable to identify the PQ when the queen is present, she appears to be a ``cryptic heir designate.'' Here, we show that there is not just one heir designate but a long reproductive queue and that PQs take over the role of egg-laying, successively, without overt conflict, as the queen or previous PQs are removed. The dominance rank of an individual is not a significant predictor of its position in the succession hierarchy. The age of an individual is a significant predictor, but it is not a perfect predictor because PQs often bypass older individuals to become successors. We suggest that such a predesignated reproductive queue that is implemented without overt conflict is adaptive in the tropics, where conspecific usurpers from outside the colony, which can take advantage of the anarchy prevailing in a queenless colony and invade it, are likely to be present throughout the year.
Resumo:
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.
Resumo:
Streaming applications demand hard bandwidth and throughput guarantees in a multiprocessor environment amidst resource competing processes. We present a Label Switching based Network-on-Chip (LS-NoC) motivated by throughput guarantees offered by bandwidth reservation. Label switching is a packet relaying technique in which individual packets carry route information in the form of labels. A centralized LS-NoC Management framework engineers traffic into Quality of Service (QoS) guaranteed routes. LS-NoC caters to the requirements of streaming applications where communication channels are fixed over the lifetime of the application. The proposed NoC framework inherently supports heterogeneous and ad hoc system-on-chips. The LS-NoC can be used in conjunction with conventional best effort NoC as a QoS guaranteed communication network or as a replacement to the conventional NoC. A multicast, broadcast capable label switched router for the LS-NoC has been designed. A 5 port, 256 bit data bus, 4 bit label router occupies 0.431 mm(2) in 130 nm and delivers peak bandwidth of 80 Gbits/s per link at 312.5 MHz. Bandwidth and latency guarantees of LS-NoC have been demonstrated on traffic from example streaming applications and on constant and variable bit rate traffic patterns. LS-NoC was found to have a competitive AreaxPower/Throughput figure of merit with state-of-the-art NoCs providing QoS. Circuit switching with link sharing abilities and support for asynchronous operation make LS-NoC a desirable choice for QoS servicing in chip multiprocessors. (C) 2013 Elsevier B.V. All rights reserved.
Resumo:
Spatial information at the landscape scale is extremely important for conservation planning, especially in the case of long-ranging vertebrates. The biodiversity-rich Anamalai hill ranges in the Western Ghats of southern India hold a viable population for the long-term conservation of the Asian elephant. Through rapid but extensive field surveys we mapped elephant habitat, corridors, vegetation and land-use patterns, estimated the elephant population density and structure, and assessed elephant-human conflict across this landscape. GIS and remote sensing analyses indicate that elephants are distributed among three blocks over a total area of about 4600 km(2). Approximately 92% remains contiguous because of four corridors; however, under 4000 km2 of this area may be effectively used by elephants. Nine landscape elements were identified, including five natural vegetation types, of which tropical moist deciduous forest is dominant. Population density assessed through the dung count method using line transects covering 275 km of walk across the effective elephant habitat of the landscape yielded a mean density of 1.1 (95% Cl = 0.99-1.2) elephant/km(2). Population structure from direct sighting of elephants showed that adult male elephants constitute just 2.9% and adult females 42.3% of the population with the rest being subadults (27.4%), juveniles (16%) and calves (11.4%). Sex ratios show an increasing skew toward females from juvenile (1:1.8) to sub-adult (1:2.4) and adult (1:14.7) indicating higher mortality of sub-adult and adult males that is most likely due to historical poaching for ivory. A rapid questionnaire survey and secondary data on elephant-human conflict from forest department records reveals that villages in and around the forest divisions on the eastern side of landscape experience higher levels of elephant-human conflict than those on the western side; this seems to relate to a greater degree of habitat fragmentation and percentage farmers cultivating annual crops in the east. We provide several recommendations that could help maintain population viability and reduce elephant-human conflict of the Anamalai elephant landscape. (C) 2013 Deutsche Gesellschaft far Saugetierkunde. Published by Elsevier GmbH. All rights reserved.
Resumo:
We propose a framework for developing and reasoning about hybrid systems that are comprised of a plant with multiple controllers, each of which controls the plant intermittently. The framework is based on the notion of a ``conflict tolerant'' specification for a controller, and provides a modular way of developing and reasoning about such systems. We propose a novel mechanism of defining conflict-tolerant specifications for general hybrid systems, using ``acceptor'' and ``advisor'' components. We also give a decision procedure for verifying whether a controller satisfies its conflict-tolerant specification, in the special case when the components are modeled using initialized rectangular hybrid automata.
Resumo:
Electronic monitoring of perimeters plays vital roles in homeland security, management of traffic and of humanwildlife conflict. This paper reports the design and development of an optical beam-interruption-based ranging and profiling sensor for monitoring perimeters. The developed sensor system can determine the distance of the object from the sensing units and its temporal height profile as the object crosses the system. Together, these quantities can also be used to classify the object and to determine its speed. The sensor is designed, fabricated, and evaluated. The design enables compact construction, high sensitivity, and low measurement crosstalk. The evaluation demonstrates accuracy better than 98.5% in the determination of height and over 94% in determination of the distance of an object from the sensing units. Finally, a strategy is proposed to classify the objects based on the obtained height profiles. The strategy is demonstrated to correctly classify the objects despite differences in their speed and the location at which they cross the system.
Resumo:
Optimal control of traffic lights at junctions or traffic signal control (TSC) is essential for reducing the average delay experienced by the road users amidst the rapid increase in the usage of vehicles. In this paper, we formulate the TSC problem as a discounted cost Markov decision process (MDP) and apply multi-agent reinforcement learning (MARL) algorithms to obtain dynamic TSC policies. We model each traffic signal junction as an independent agent. An agent decides the signal duration of its phases in a round-robin (RR) manner using multi-agent Q-learning with either is an element of-greedy or UCB 3] based exploration strategies. It updates its Q-factors based on the cost feedback signal received from its neighbouring agents. This feedback signal can be easily constructed and is shown to be effective in minimizing the average delay of the vehicles in the network. We show through simulations over VISSIM that our algorithms perform significantly better than both the standard fixed signal timing (FST) algorithm and the saturation balancing (SAT) algorithm 15] over two real road networks.
Resumo:
This paper proposes a probabilistic prediction based approach for providing Quality of Service (QoS) to delay sensitive traffic for Internet of Things (IoT). A joint packet scheduling and dynamic bandwidth allocation scheme is proposed to provide service differentiation and preferential treatment to delay sensitive traffic. The scheduler focuses on reducing the waiting time of high priority delay sensitive services in the queue and simultaneously keeping the waiting time of other services within tolerable limits. The scheme uses the difference in probability of average queue length of high priority packets at previous cycle and current cycle to determine the probability of average weight required in the current cycle. This offers optimized bandwidth allocation to all the services by avoiding distribution of excess resources for high priority services and yet guaranteeing the services for it. The performance of the algorithm is investigated using MPEG-4 traffic traces under different system loading. The results show the improved performance with respect to waiting time for scheduling high priority packets and simultaneously keeping tolerable limits for waiting time and packet loss for other services. Crown Copyright (C) 2015 Published by Elsevier B.V.