32 resultados para Delay Tolerant Network


Relevância:

40.00% 40.00%

Publicador:

Resumo:

AIMS: To contrast functional connectivity on ventral and dorsal striatum networks in cocaine dependence relative to pathological gambling, via a resting-state functional connectivity approach; and to determine the association between cocaine dependence-related neuroadaptations indexed by functional connectivity and impulsivity, compulsivity and drug relapse. DESIGN: Cross-sectional study of 20 individuals with cocaine dependence (CD), 19 individuals with pathological gambling (PG) and 21 healthy controls (HC), and a prospective cohort study of 20 CD followed-up for 12 weeks to measure drug relapse. SETTING AND PARTICIPANTS: CD and PG were recruited through consecutive admissions to a public clinic specialized in substance addiction treatment (Centro Provincial de Drogodependencias) and a public clinic specialized in gambling treatment (AGRAJER), respectively; HC were recruited through community advertisement in the same area in Granada (Spain). MEASUREMENTS: Seed-based functional connectivity in the ventral striatum (ventral caudate and ventral putamen) and dorsal striatum (dorsal caudate and dorsal putamen), the Kirby delay-discounting questionnaire, the reversal-learning task and a dichotomous measure of cocaine relapse indicated with self-report and urine tests. FINDINGS: CD relative to PG exhibit enhanced connectivity between the ventral caudate seed and subgenual anterior cingulate cortex, the ventral putamen seed and dorsomedial pre-frontal cortex and the dorsal putamen seed and insula (P≤0.001, kE=108). Connectivity between the ventral caudate seed and subgenual anterior cingulate cortex is associated with steeper delay discounting (P≤0.001, kE=108) and cocaine relapse (P≤0.005, kE=34). CONCLUSIONS: Cocaine dependence-related neuroadaptations in the ventral striatum of the brain network are associated with increased impulsivity and higher rate of cocaine relapse.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A mobile ad hoc network is a kind of popular self-configuring network, in which multicast routing under the quality of service constraints, is a significant challenge. Many researchers have proved that such problem can be formulated as a NP-complete problem and proposed some swarm-based intelligent algorithms to solve the optimal solution, such as the genetic algorithm (GA), bees algorithm. However, a lower efficiency of local search ability and weak robustness still limit the computational effectiveness. Aiming to those shortcomings, a new hybrid algorithm inspired by the self-organization of Physarum, is proposed in this paper. In our algorithm, an updating scheme based on Physarum network model (PM) is used for improving the crossover operator of traditional GAs, in which the same parts of parent chromosomes are reserved and the new offspring by the PM is generated. In order to estimate the effectiveness of our proposed optimized scheme, some typical genetic algorithms and their updating algorithms (PMGAs) are compared for solving the multicast routing on four different datasets. The simulation experiments show that PMGAs are more efficient than original GAs. More importantly, the PMGAs are more robustness that is very important for solving the multicast routing problem. Moreover, a series of parameter analyses is used to find a set of better setting for realizing the maximal efficiency of our algorithm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Two main problems prevent the deployment of peer-to-peer application in a wireless sensor network: the index table, which should be distributed stored rather than uses a central server as the director; the unique node identifier, which cannot use the global addresses. This paper presents a multi-level virtual ring (MVR) structure to solve these two problems.

The index table in MVR is distributed stored by using the DHT technique. MVR is constructed decentralized and runs on mobile nodes themselves, requiring no central server or interruption. Naming system in MVR uses natural names rather than global addresses to identify sensor nodes. The MVR can route directly on the name identifiers of the sensor nodes without being aware the location. Some sensor nodes are selected as the backbone nodes by the backbone selection algorithm and are placed on the different levels of the virtual rings. MVR hashes nodes’ identifiers on the virtual ring, and stores them at the backbone nodes. Furthermore, MVR adopts cross-level routing to improve the routing efficiency.

Experiments using ns2 simulator for up to 200 nodes show that the storage and bandwidth requirements of MVR grow slowly with the size of the network. Furthermore, MVR has demonstrated as self-administrating, fault-tolerant, and resilient under the different workloads.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and organizes these identifiers together. Backbone nodes can be selected automatically or predefined to direct their associated normal nodes in a local area. The normal nodes are guided by the backbone nodes to full fill the searching and routing processes. With a virtual structure, the searching performance can be improved by using the DHT technique.

Experiments using ns2 simulator demonstrate that this virtual backbone routing architecture has the following significances: workable without being aware address in a mobile situation; scalable with the size of network; efficient in terms of the reduced hop counts and short end-to-end delay, and also resistant to the dead-end problem.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we investigate the potential of caching to improve QoS in the context of continuous media applications over wired best-effort networks. We propose the use of a flexible caching scheme, called GD-Multi in caching continuous media (CM) objects. An important novel feature of our scheme is the provision of user or system administrator inputs in determining the cost function. Based on the proposed flexible cost function, Multi, an improvised Greedy Dual (GD) replacement algorithm called GD-multi (GDM) has been developed for layered multi-resolution multimedia streams. The proposed Multi function takes receiver feedback into account. We investigate the influence of parameters such as loss rate, jitter, delay and area in determining a proxy’s cache contents so as to enhance QoS perceived by clients. Simulation studies show improvement in QoS perceived at the clients in accordance to supplied optimisation metrics. From an implementation perspective, signalling requirements for carrying QoS feedback are minimal and fully compatible with existing RTSP-based Internet applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

 Multicore network processors have been playing an increasingly important role in computational processes, which emphasize on scalability and parallelism of the systems, in distributed environments especially in Internet-based delay-sensitive applications. It is an important but unsolved issue, however, to efficiently schedule tasks in network processors with multicore and multithread for improving the system throughput as much as possible. Profiling can gather runtime environment information and guide the compiler to optimize programs through scheduling tasks based on the runtime context. This paper proposes a profiling-based task scheduling approach, targeting on improving the throughput of multicore network processor (Intel IXP) systems in the balanced pipeline way. In this work, we investigate a profiling-based task scheduling framework, a task scheduling algorithm, and a set of performance models. Our task allocation scheme maps tasks onto the pipeline architecture and multiple threads of network processors in parallel, which incorporates the profiling context and global thread refinement. We evaluate our task scheduling algorithm by implementing representative network applications on the Intel IXP network processor. Experimental results demonstrate that our algorithm is able to schedule tasks in a balanced pipeline fashion and achieve the high throughput and data transmission rate. Copyright © 2012 John Wiley & Sons, Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Two main problems prevent the deployment of content delivery in a wireless sensor network: the address, which is widely used in the Internet as the identifier, is meaningless in wireless network, and the routing efficiency is a big concern in wireless sensor network. This paper presents an embedded multi-level ring (MVR) structure to address those two problems. The MVR uses names rather than addresses to identify sensor nodes. The MVR routes packets on the name identifiers without being aware the location. Some sensor nodes are selected as the backbone nodes and are placed on the different levels of the virtual rings. MVR hashes nodes and contents identifiers, and stores them at the backbone nodes. MVR takes the cross-level routing to improve the routing efficiency. Further, MVR is constructed decentralized and runs on the mobile nodes themselves, requiring no central control. Experiments using ns2 simulator for up to 200 nodes show that the storage and bandwidth requirements of MVR grow slowly with the size of the network. Furthermore, MVR has demonstrated as self-administrating, fault-tolerant, and resilient under the different workloads. We also discuss alternative implementation options, and future work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multicast is an important mechanism in modern wireless networks and has attracted significant efforts to improve its performance with different metrics including throughput, delay, energy efficiency, etc. Traditionally, an ideal loss-free channel model is widely used to facilitate routing protocol design. However, the quality of wireless links would be affected or even jeopardized by many factors like collisions, fading or the noise of environment. In this paper, we propose a reliable multicast protocol, called CodePipe, with advanced performance in terms of energy-efficiency, throughput and fairness in lossy wireless networks. Built upon opportunistic routing and random linear network coding, CodePipe not only simplifies transmission coordination between nodes, but also improves the multicast throughput significantly by exploiting both intra-batch and inter-batch coding opportunities. In particular, four key techniques, namely, LP-based opportunistic routing structure, opportunistic feeding, fast batch moving and inter-batch coding, are proposed to offer substantial improvement in throughput, energy-efficiency and fairness. We evaluate CodePipe on ns2 simulator by comparing with other two state-of-art multicast protocols, MORE and Pacifier. Simulation results show that CodePipe significantly outperforms both of them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multicast is an important mechanism in modern wireless networks and has attracted significant efforts to improve its performance with different metrics including throughput, delay, energy efficiency, etc. Traditionally, an ideal loss-free channel model is widely used to facilitate routing protocol design. However, the quality of wireless links is affected or even jeopardized resulting in transmission failures by many factors like collisions, fading or the noise of environment. In this paper, we propose a reliable multicast protocol, called CodePipe, with energy-efficiency, high throughput and fairness in lossy wireless networks. Building upon opportunistic routing and random linear network coding, CodePipe can not only eliminate coordination between nodes, but also improve the multicast throughput significantly by exploiting both intra-batch and inter-batch coding opportunities. In particular, four key techniques, namely, LP-based opportunistic routing structure, opportunistic feeding, fast batch moving and inter-batch coding, are proposed to offer significant improvement in throughput, energy-efficiency and fairness.Moreover, we design an efficient online extension of CodePipe such that it can work in a dynamic network where nodes join and leave the network as time progresses. We evaluate CodePipe on ns2 simulator by comparing with other two state-of-art multicast protocols,MORE and Pacifier. Simulation results show that CodePipe significantly outperforms both of them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper proposes a Q-learning based controller for a network of multi intersections. According to the increasing amount of traffic congestion in modern cities, using an efficient control system is demanding. The proposed controller designed to adjust the green time for traffic signals by the aim of reducing the vehicles’ travel delay time in a multi-intersection network. The designed system is a distributed traffic timing control model, applies individual controller for each intersection. Each controller adjusts its own intersection’s congestion while attempt to reduce the travel delay time in whole traffic network. The results of experiments indicate the satisfied efficiency of the developed distributed Q-learning controller.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fog computing, characterized by extending cloud computing to the edge of the network, has recently received considerable attention. The fog is not a substitute but a powerful complement to the cloud. It is worthy of studying the interplay and cooperation between the edge (fog) and the core (cloud). To address this issue, we study the tradeoff between power consumption and delay in a cloud-fog computing system. Specifically, we first mathematically formulate the workload allocation problem. After that, we develop an approximate solution to decompose the primal problem into three subproblems of corresponding subsystems, which can be independently solved. Finally, based on extensive simulations and numerical results, we show that by sacrificing modest computation resources to save communication bandwidth and reduce transmission latency, fog computing can significantly improve the performance of cloud computing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Witnessing the wide spread of malicious information in large networks, we develop an efficient method to detect anomalous diffusion sources and thus protect networks from security and privacy attacks. To date, most existing work on diffusion sources detection are based on the assumption that network snapshots that reflect information diffusion can be obtained continuously. However, obtaining snapshots of an entire network needs to deploy detectors on all network nodes and thus is very expensive. Alternatively, in this article, we study the diffusion sources locating problem by learning from information diffusion data collected from only a small subset of network nodes. Specifically, we present a new regression learning model that can detect anomalous diffusion sources by jointly solving five challenges, that is, unknown number of source nodes, few activated detectors, unknown initial propagation time, uncertain propagation path and uncertain propagation time delay. We theoretically analyze the strength of the model and derive performance bounds. We empirically test and compare the model using both synthetic and real-world networks to demonstrate its performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is concerned with the problem of passivity analysis of neural networks with an interval time-varying delay. Unlike existing results in the literature, the time-delay considered in this paper is subjected to interval time-varying without any restriction on the rate of change. Based on novel refined Jensen inequalities and by constructing an improved Lyapunov-Krasovskii functional (LKF), which fully utilizes information of the neuron activation functions, new delay-dependent conditions that ensure the passivity of the network are derived in terms of tractable linear matrix inequalities (LMIs) which can be effectively solved by various computational tools. The effectiveness and improvement over existing results of the proposed method in this paper are illustrated through numerical examples.