80 resultados para Court congestion and delay


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The future convergence of voice, video and data applications on the Internet requires that next generation technology provides bandwidth and delay guarantees. Current technology trends are moving towards scalable aggregate-based systems where applications are grouped together and guarantees are provided at the aggregate level only. This solution alone is not enough for interactive video applications with sub-second delay bounds. This paper introduces a novel packet marking scheme that controls the end-to-end delay of an individual flow as it traverses a network enabled to supply aggregate- granularity Quality of Service (QoS). IPv6 Hop-by-Hop extension header fields are used to track the packet delay encountered at each network node and autonomous decisions are made on the best queuing strategy to employ. The results of network simulations are presented and it is shown that when the proposed mechanism is employed the requested delay bound is met with a 20% reduction in resource reservation and no packet loss in the network.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Query processing over the Internet involving autonomous data sources is a major task in data integration. It requires the estimated costs of possible queries in order to select the best one that has the minimum cost. In this context, the cost of a query is affected by three factors: network congestion, server contention state, and complexity of the query. In this paper, we study the effects of both the network congestion and server contention state on the cost of a query. We refer to these two factors together as system contention states. We present a new approach to determining the system contention states by clustering the costs of a sample query. For each system contention state, we construct two cost formulas for unary and join queries respectively using the multiple regression process. When a new query is submitted, its system contention state is estimated first using either the time slides method or the statistical method. The cost of the query is then calculated using the corresponding cost formulas. The estimated cost of the query is further adjusted to improve its accuracy. Our experiments show that our methods can produce quite accurate cost estimates of the submitted queries to remote data sources over the Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The capability of intense ultrashort laser pulses to initiate, control and image vibrational wavepacket dynamics in the deuterium molecular ion has been simulated with a view to inform and direct future femtosecond pump-control-probe experiments. The intense-field coherent control of the vibrational superposition has been studied as a function of pulse intensity and delay time, to provide an indication of key constraints for experimental studies. For selected cases of the control mechanism, probing of the subsequent vibrational wavepacket dynamics has been simulated via the photodissociation (PD) channel. Such PD probing is shown to elucidate the modified wavepacket dynamics where the position of the quantum revival is sensitive to the control process. Through Fourier transform analysis the PD yield is also shown to provide a characterisation of the vibrational distribution. It has been shown that a simple 'critical R cut-off' approximation can be used to reproduce the effect of a probe pulse interaction, providing a convenient and efficient alternative to intensive computer simulations of the PD mechanism in the deuterium molecular ion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile ad hoc networking of dismounted combat personnel is expected to play an important role in the future of network-centric operations. High-speed, short-range, soldier-to-soldier wireless communications will be required to relay information on situational awareness, tactical instructions, and covert surveillance related data during special operations reconnaissance and other missions. This article presents some of the work commissioned by the U. K. Ministry of Defence to assess the feasibility of using 60 GHz millimeter-wave smart antenna technology to provide covert communications capable of meeting these stringent networking needs. Recent advances in RF front-end technology, alongside physical layer transmission schemes that could be employed in millimeter-wave soldier-mounted radio, are discussed. The introduction of covert communications between soldiers will require the development of a bespoke directive medium access layer. A number of adjustments to the IEEE 802.11 distribution coordination function that will enable directional communications are suggested. The successful implementation of future smart antenna technologies and direction of arrival-based protocols will be highly dependent on thorough knowledge of transmission channel characteristics prior to deployment. A novel approach to simulating dynamic soldier-to-soldier signal propagation using state-of-the-art animation-based technology developed for computer game design is described, and important channel metrics such as root mean square angle and delay spread for a team of four networked infantry soldiers over a range of indoor and outdoor environments is reported.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With China's new Enterprise Bankruptcy Law (‘EBL 2006’) having come into effect on 1 June 2007, a critical issue arises as to the extent to which Article 5, as a cross-border provision, will strengthen creditors' rights across jurisdictions. In this paper attention will be paid in particular to how the Chinese People's Court is likely to exercise its discretion to grant recognition to a foreign court ruling, and vice versa. The paper will start with a brief introduction to the circumstances under which Article 5 came into being. The evolution of China's cross-border insolvency practices will be examined through an analysis of an inbound case of B&T (2002) as well as an outbound one of GITIC (2005). In spite of the fact that China has not adopted the UNCITRAL Model Law, essential factors deemed necessary to be considered by China's court and its counterparts in US and UK are to be highlighted throughout the paper. Although the effect of Article 5 remains to be seen, it will be critically analysed focusing on some controversial issues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In multiuser diversity systems, the impact of large-scale fading on the total system performance such as link quality and system power has not been widely addressed. Considering large-scale fading, we propose an adaptive multiuser scheduling to minimize the total system power while reducing the effect of large-scale fading on the system bit error rate. The number of active users is adapted to every shadow variation, which varies slower than small-scale fading. We consider the two widely used multiuser systems (i.e., delay-tolerant, and delay-sensitive multiuser systems). Closed-form expressions for the bit error rate are derived. The selection procedure for the minimum number of users is introduced for guaranteed performance of the above multiuser systems. The impact of adaptive multiuser diversity gain on the system power and bit error rate is illustrated over large-scale fading channels by numerical results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study investigated the longitudinal relationship between alcohol consumption at age 13, and at age 16. Alcohol-specific measures were frequency of drinking, amount consumed at last use and alcohol related harms. Self-report data were gathered from 1113 high school students at T1, and 981 students at T2. Socio-demographic data were gathered, as was information on context of use, alcohol-related knowledge and attitudes, four domains of aggression and delay reward discounting. Results indicated that any consumption of alcohol, even supervised consumption, at T1 was associated with significantly poorer outcomes at T2. In other words, compared to those still abstinent at age 13, those engaging in alcohol use in any context reported significantly more frequent drinking, more alcohol-related harms and more units consumed at last use at age 16. Results also support the relationship between higher levels of physical aggression at T1 and a greater likelihood of more problematic alcohol use behaviours at T2. The findings support other evidence suggesting that abstinence in early adolescence has better longitudinal outcomes that supervised consumption of alcohol. These results suggest support for current guidance on adolescent drinking in the United Kingdom (UK).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission. The impact of large antenna arrays at the mmWave frequencies on the secrecy throughput is examined. Numerical results corroborate our analysis and show that mmWave systems can enable significant secrecy improvement. Moreover, it is indicated that with large antenna arrays, multi-gigabit per second secure link at the mmWave frequencies can be reached in the delay-tolerant transmission mode and the adverse effect of secrecy outage vanishes in the delay-limited transmission mode.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 5G network infrastructure is driven by the evolution of today's most demanding applications. Already, multimedia applications such as on-demand HD video and IPTV require gigabit- per-second throughput and low delay, while future technologies include ultra HDTV and machine-to-machine communication. Mm-Wave technologies such as IEEE 802.15.3c and IEEE 802.11ad are ideal candidates to deliver high throughput to multiple users demanding differentiated QoS. Optimization is often used as a methodology to meet throughput and delay constraints. However, traditional optimization techniques are not suited to a mixed set of multimedia applications. Particle swarm optimization (PSO) is shown as a promising technique in this context. Channel-time allocation PSO (CTA-PSO) is successfully shown here to allocate resource even in scenarios where blockage of the 60 GHz signal poses significant challenges.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The 1989 Children Act in England and Wales and the derivative 1995 Children (NI) Order in Northern Ireland provide the legislative framework within which issues pertaining to the care and supervision of children that come before the Courts are examined. Both pieces of legislation were intended to address a number of problems with the way that such issues were dealt with by the Court, particularly the tendency for proceedings to become protracted and for children to ‘drift’ in care as a consequence. The imposition of the ‘No Delay’ principle in both jurisdictions was designed specifically to address these concerns. However, since the introduction of both the 1989 Children Act (implemented in October 1991) and the 1995 Children (NI) Order (implemented in November 1996), there has been a steady increase in the average duration of proceedings and concerns remain about the impact that this may be having upon the children involved. This paper presents the findings of a research study (McSherry et al., 2004) that explored the complex relationship between the duration of care proceedings and costs to children in terms of the likelihood of achieving permanency.