Showing 4,301 - 4,320 results of 4,508 for search '"The Forward"', query time: 0.08s Refine Results
  1. 4301

    Power Control Algorithm Based on Normalized Utility Function Research by Xiang Yu, Xiaoyin Zhang, Lei Liu

    Published 2014-12-01
    “…Combining with the characteristics of cognitive radio, a new type S utility function was put forwarded, the normalized form was applied, and the existence and uniqueness of the Nash equilibrium were proved. …”
    Get full text
    Article
  2. 4302

    Study of remote routing strategy in parallel network simulation by Yu CUI, Zhao-xin ZHANG, Hong-li ZHANG, Zhi-hong TIAN

    Published 2012-05-01
    “…The advantages and disadvantages of several remote routing strategies for parallel network simulation were studied,and a new method based on optimize-edge routers was presented.Through converting the original forwarding style of routing IP to routing ID of edge router,the mechanism increased the speed of routing lookup.Also the exploitations of the tree contraction,edge router reduction and assnode reduction in the proposed mechanism effectively decreased the memory cost.Experimental results show 85% reduction in memory use and 75% decrease in time cost for the new routing strategy,comparing with the border-based remote routing strategy in PDNS.…”
    Get full text
    Article
  3. 4303

    Remote Interoperability Testing Client for Wireless Personal Area Network Protocol by Xinyu Zhang, Xiaohong Huang, Pei Zhang

    Published 2015-11-01
    “…When the entities in one interoperability testing case were not suitable to be placed in the same physical location,the remote testing method was needed to complete the testing.In order to guarantee the success of the remote testing,a platform based on the Internet environment was built.A system structure was designed for assure the platform was suitable for wireless personal area network protocol.The framework mainly contained the device connection module and the data forwarding module.To illustrate the application of proposed approach,a real case study was proposed:the 6LoWPANs protocol.The results of the experimentation performed on this protocol were also presented.…”
    Get full text
    Article
  4. 4304

    Design and Experimental Research on Staggered Straw Cleaning Device for No-Till Seeding in Drip Irrigation Area by Panpan Yuan, Xingliang Zhu, Xuejun Zhang, Jia You, Jinshan Yan, Shilong Qiu

    Published 2024-12-01
    “…The optimal solutions were obtained: the forwarding speed was 9 km/h, the disc rake angle was 33.7°, and the lateral distance of the middle tine discs was 529 mm. …”
    Get full text
    Article
  5. 4305

    Topology restoration algorithm for heterogeneous sensor networks based on connected dominating tree by Ting-jun SHI, Xu-ming FANG, Yun YANG

    Published 2012-10-01
    “…For currently lacking the study of the topology restoration algorithm for heterogeneous sensor networks,a topology restoration algorithm for heterogeneous sensor networks based on connected dominating tree (HSNTR) was proposed.Firstly the algorithm constructed a virtual backbone forwarding data at very low cost,and secondly when a node fails,the algorithm would dynamically locally restore the backbone to make it still connect and cover all nodes.Theoretical analysis proved the maximum number of nodes the algorithm uses during constructing and restoring the backbone.Simulation analysis showed that the algorithm is better than other algorithms in terms of energy efficiency,scalability and reliability.…”
    Get full text
    Article
  6. 4306

    Network slicing architecture based on SDN and NFV by Qi AN, Yanping LIU, Qian SUN, Lin TIAN

    Published 2016-11-01
    “…The traditional network architecture has some problems such as closed rigid structure,highly restricted data forwarding performance,and low utilization rate of resources,which can't meet the diverse services' requirements.In order to solve these problems,the concept of network slice was introduced.A novel network architecture for future mobile communication was proposed,which is based on network function virtualization(NFV)and software defined networking(SDN).This new network architecture can provide personalized network services to users based on third-party needs,share and isolate of network resources,the cost of a large number of operators was saved in terms of infrastructure.…”
    Get full text
    Article
  7. 4307

    Henry James’s Spectral Archaeology by Stefano Evangelista

    Published 2016-06-01
    “…Looking, at the same time, back to Prosper Merimée’s use of the fantastic in “La Venus d’Ille” (1837) and forwards to Sigmund Freud’s parallel between archaeology and psychoanalysis in “The Aetiology of Hysteria” (1896), James sets up an intricate set of relations and metaphorical correspondences between stone and language, sculpture and literature, antiquity and modernity, aesthetics and psychology. …”
    Get full text
    Article
  8. 4308

    Source-controlled OpenFlow data plane by Zhe WANG, Man-gui LIANG, Xiao-meng JI, MateusAbisai Fillipus

    Published 2015-03-01
    “…It can accomplish the data forwarding process relying only on VA, instead of flow table matching. …”
    Get full text
    Article
  9. 4309

    Verification on policies for network functions in SDN/NFV-based environment by Haoyu CHEN, Deqing ZOU, Hai JIN

    Published 2021-06-01
    “…Although the newly introduced SDN and NFV technologies bring flexibility and convenience in network management, the dynamic forwarding policies introduced by SDN may cause invalidation in the network function policies, and the policies in different network functions may also cause conflicts due to their own behaviors.In order to verify the policies in SDN/NFV-based cloud network, the verification on policies between the network function and the SDN device, as well as across the network functions were considered.A unified policy expression for analysis was summarized, and policy verification scheme, framework and prototype implementation were proposed to verify the correctness of polices in different scenarios, then experiments were conducted to justify the effectiveness and performance…”
    Get full text
    Article
  10. 4310

    Geographical information based false report filtering scheme in wireless sensor networks by Zhi-xiong LIU, Jian-xin WANG

    Published 2012-02-01
    “…A geographical information based false reports filtering scheme(GFFS)in sensor networks was presented.In GFFS,each node distributes its location information to some other nodes after deployment.When a report was generated for an observed event,it must carry not only MACs from t detecting nodes with distinct key partitions,but also locations of these nodes.Each forwarding node checks not only the correctness of the MAC and the locations carried in the report,but also the legitimacy of the locations.Analysis and simulation results demonstrate that GFFS can resist collaborative false data injection attacks and thus can tolerate much more compromised nodes than existing schemes.…”
    Get full text
    Article
  11. 4311

    Development Prospects of Software Defined Optical Networks by Yuefeng Ji, Jie Zhang, Yongli Zhao

    Published 2014-08-01
    “…All these show that SDON will play an important role in the development process of next-generation intelligent optical networks forwards to high efficiency, flexible scheduling, and virtual reconstruction.…”
    Get full text
    Article
  12. 4312

    Research on routing protocol of vehicular delay-tolerant networks by Hai-tao JIANG, Hong ZHANG, Qian-mu LI

    Published 2013-03-01
    “…Based on the movement model similarity evaluation scheme (MMSE), a movement range oriented forwarding and dynamic multi-copies routing protocol (MROFDM) was proposed in vehicular delay-tolerant networks. …”
    Get full text
    Article
  13. 4313

    Design and implementation of CoLoR architecture control plane based on P4 by Ruohan LIU, Hongbin LUO, Xingbeng WEN

    Published 2018-05-01
    “…P4 (programming protocol-independent packet processor) can redefine the fields recognized by the forwarding device and its processing logic through software programming.Aiming at the problems that the new architecture CoLoR faces in actual deployment and improvement,the CoLoR architecture was implemented based on P4,and focused on the implementation of its control plane.The way to use the P4 language to define the header recognition and processing logic of CoLoR architecture-related devices,and to use ONOS (open network operating system) to implement the control mechanism was introduced,and it was deployed in practice to perform functional verification and performance testing.…”
    Get full text
    Article
  14. 4314

    Survey of controller placement problem in software defined network by Xian-ming GAO, Bao-sheng WANG, Wen-ping DENG, Jing TAO

    Published 2017-07-01
    “…In order to change situation of high management complexity in current Internet,software defined network (SDN) was proposed,which mainly aimed to directly control forwarding behaviors of data-flow by using flow strategies generated by controllers.With the deployment and applications of SDN,research communities found that the controller placement in SDN network could directly affect network performance.In recent years,controller placement problem (CPP) has become a hot topic,where performance metric and searching algorithms are important research areas.Based on current researches,the existing controller placement problem was systematically analyzed and summarized,which was expected to be helpful for the follow-up research.…”
    Get full text
    Article
  15. 4315

    Research on extended access control mechanism in online social network by Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI

    Published 2021-10-01
    “…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
    Get full text
    Article
  16. 4316

    (ε,δ)-approximate counting algorithm for large scale wireless sensor networks by Jing-hua ZHU, Xue-min GUAN

    Published 2013-06-01
    “…The problem of approximate counting for large scale wireless sensor networks was studied.Two approximate counting algorithms,DBT-ACA and DBT-BACA,based on DBT (digital binary tree) protocol were also proposed.The algorithms presented could attain the counting result in O(log logn)time while meeting the(ε,δ)accuracy requirement.DBT-BACA exploits binary search,level-by-level forwarding and delay response technique to effectively reduce the query delay and transmission cost.Theoretical analysis and experimental results show that the proposed algorithms out-perform existing approaches in terms of estimation accuracy,time efficiency and energy cost.…”
    Get full text
    Article
  17. 4317

    Modeling and Analyzing CSMA/CA Protocol for Energy-Harvesting Wireless Sensor Networks by Zhi Chen, Ya Peng, Wenjing Yue

    Published 2015-09-01
    “…Well-designed wireless sensor networks (WSNs) usually provide vital support for collecting, processing, and forwarding the real-time information in mission-critical applications where medium access control (MAC) protocols determine the channel access control capabilities and the energy consumption properties of these networks. …”
    Get full text
    Article
  18. 4318

    Routing in multi-sink sensor networks based on gravitation field

    Published 2008-01-01
    “…The process of data forwarding in sensor networks was analogy to electric charge moving in electrostatic field. …”
    Get full text
    Article
  19. 4319

    Programming extention technology of open vSwitch by Fan YANG, Siyu YAN, Tao HUANG

    Published 2017-05-01
    “…As an open source SDN software switch,open vSwitch (OVS) has been widespread concerned.But in complex and changeable network environment,data layer loses control of controller and flow table entry learning aging appears easily and the performance of SDN is seriously hampered.To solve the problems,the programming extension technology architecture of OVS was designed,including link state processing,fault perception,two three-tier self-learning forwarding and other expansion of core functions,so that OVS could recover automatic and rapidly,flow table entries could update in time,throughput of SDN was guaranteed,thereby the influence of control-ler loss control for communication was reduced,SDN stability and reliability was enhanced.…”
    Get full text
    Article
  20. 4320

    Time and commitment: the grammaticalization of uúch in Lakandon Maya by Henrik Bergqvist

    Published 2017-12-01
    “…The paper proposes an analysis of uúch and the contrasting kuúch/ka’ch as operators of second-order stance, using a Jakobsonian model for analyzing verbal categories forwarded by Paul Kockelman (2004) to operationalize the notion of stance, as visible in Q’eqchi’ modals. …”
    Get full text
    Article