Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap...Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature.展开更多
Drawing upon a characteristic analysis of the latency period in emergencies,this paper proposes an emergency plan selection method based on interval language variables and information entropy to address the challenge ...Drawing upon a characteristic analysis of the latency period in emergencies,this paper proposes an emergency plan selection method based on interval language variables and information entropy to address the challenge of acquiring critical information during this crucial stage.Initially,decision-makers employ interval language variables to express the preference information regarding emergency plans,while also introducing an enhanced information entropy theory to derive the weight coefficients of key indicators.Subsequently,the weighted arithmetic average operator of interval language is applied twice to aggregate the preference information alongside the relative importance of decision-makers and the weight coefficients of key indicators.Finally,the ranking coefficients of each emergency plan are sorted to determine the optimal scheme.The feasibility and effectiveness of this method are demonstrated through a case study involving the selection of an emergency plan for a flood disaster in a specific location.展开更多
Through enabling the IT and cloud computation capacities at Radio Access Network(RAN),Mobile Edge Computing(MEC) makes it possible to deploy and provide services locally.Therefore,MEC becomes the potential technology ...Through enabling the IT and cloud computation capacities at Radio Access Network(RAN),Mobile Edge Computing(MEC) makes it possible to deploy and provide services locally.Therefore,MEC becomes the potential technology to satisfy the requirements of 5G network to a certain extent,due to its functions of services localization,local breakout,caching,computation offloading,network context information exposure,etc.Especially,MEC can decrease the end-to-end latency dramatically through service localization and caching,which is key requirement of 5G low latency scenario.However,the performance of MEC still needs to be evaluated and verified for future deployment.Thus,the concept of MEC is introduced into5 G architecture and analyzed for different 5G scenarios in this paper.Secondly,the evaluation of MEC performance is conducted and analyzed in detail,especially for network end-to-end latency.In addition,some challenges of the MEC are also discussed for future deployment.展开更多
In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific clu...In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific cluster of remote radio heads is formed through a common centralized cloud at the baseband unit pool, while the local content is directly delivered at fog access points with edge cache and distributed radio signal processing capability. Focusing on a downlink F-RAN, the explicit expressions of ergodic rate for the hierarchical paradigm is derived. Meanwhile, both the waiting delay and latency ratio for users requiring a single content are exploited. According to the evaluation results of ergodic rate on waiting delay, the transmit latency can be effectively reduced through improving the capacity of both fronthaul and radio access links. Moreover, to fully explore the potential of hierarchical content caching, the transmit latency for users requiring multiple content objects is optimized as well in three content transmission cases with different radio access links. The simulation results verify the accuracy of the analysis, further show the latency decreases significantly due to the hierarchical paradigm.展开更多
Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of lat...Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks.展开更多
Visual evoked potentials (VEPs) are a series of signals about visual occipital cortex in response to visual stimuli and can be used as one of ob-jective non-invasive neuro-physiological pa-rameters to reflect the visu...Visual evoked potentials (VEPs) are a series of signals about visual occipital cortex in response to visual stimuli and can be used as one of ob-jective non-invasive neuro-physiological pa-rameters to reflect the visual organs and central visual pathway’s functional integrity. Previous studies have shown that acute and chronic ex-ercise could affect VEPs independent from body temperature and other physiological parameters. VEPs may well be used as neuro-physiological criteria in defining the performances of the ath-letes. Different sports training have different effects on VEPs, but the results are not consis-tent. P100 latency is the representative compo-nent of VEPs and it is of high, steady amplitude and of slight intra- and inter-individual variabil-ity so that the index is most commonly used. The purpose of this study was to investigate the specificity and sensitivity of P100 latency to dif-ferent physical activities. The neural electricity device of NDI-200 was used to measure the pattern reversal VEPs of all subjects, including the values of the resting state before and after different events exercise. Different events exer-cise contained an aerobic cycloergometric ex-ercise (7 subjects were conducted to a Bruce Graded Exercise Test on the Monark Ergomedic 839E cycloergometer, THR (target heart rate) = 85% HRmax, 3 times/week, about 10 minutes once time, 6 weeks), tennis training (16 volun-teers, 2 hours/day, 3 days/week, 8 weeks), aerobic Latin exercise (7 subjects, 1 hour/day, 3 days/week, 6 weeks) and the Baduanjin of Health Qigong training (6 subjects, 1 hour/day, 3 days/week, 6 weeks). The VEPs recordings of the control groups obtained synchronized with the experimental groups. SPSS 11.5 for win-dows was used for statistical analysis. A level of P﹤0.05 was accepted as statistically significant. The VEPs P100 latency of post-exercise of all experimental groups except Baduanjin group became shorter significantly compared with those of pre-exercise (P﹤0.05). No significant difference was found between pre-and post- exercise for the control groups. This study showed that exercise could shorten the P100 la-tency significantly. Moreover, it also indicated that VEPs were sensitive to exercise to a certain extent. We concluded that VEPs might well be used as neuro-physiological criteria in defining the performances of the athletes. It was found that the VEPs P100 latency became shorter after most training programs;furthermore, it demon-strated that P100 latency of VEPs had little specificity to different events.展开更多
It has been postulated that the persistent short intravaginal ejaculation latency time (IELT) of men with lifelong premature ejaculation (LPE) is related to 5-hydroxytryptamine (HT)2c receptor functioning. The a...It has been postulated that the persistent short intravaginal ejaculation latency time (IELT) of men with lifelong premature ejaculation (LPE) is related to 5-hydroxytryptamine (HT)2c receptor functioning. The aim of this study was to investigate the relationship of Cys23Ser 5-HT2c receptor gene polymorphism and the duration of IELT in men with LPE. Therefore, a prospective study was conducted in 64 Dutch Caucasian men with LPE. Baseline IELT during coitus was assessed by stopwatch over a 1-month period. All men were genotyped for Cys23Ser 5-HT2c receptor gene polymorphism. Allele frequencies and genotypes of Cys and Ser variants of 5-HT2c receptor gene polymorphism were determined. Association between Cys/Cys and Ser/Ser genotypes and the natural logarithm of the IELT in men with LPE were.investigated. As a result, the geometric mean, median and natural mean IELT were 25.2, 27.0, 33.9s, respectively. Of all men, 20.0%, 10.8%, 23.1% and 41.5% ejaculated within 10, 10-20, 20-30 and 30-60s after vaginal penetration. Of the 64 men, the Cys/Cys and Ser/Ser genotype frequency for the Cys23Ser polymorphism of the 5-HT2c receptor gene was 81% and 19%, respectively. The geometric mean IELT of the wildtypes (Cys/Cys) is significantly lower (22.6s; 95% CI 18.3-27.8s) than in male homozygous mutants (Ser/Ser) (40.4s; 95% CI 20.3-80.4s) (P = 0.03). It is concluded that Cys23Ser 5-HT2c receptor gene polymorphism is associated with the IELT in men with LPE. Men with Cys/Cys genotype have shorter IELTs than men with Ser/Ser genotypes.展开更多
Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- ...Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- gation is a fundamental yet time-consuming task in WSNs. We present an improved algorithm to reduce data aggregation latency. Our algorithm has a latency bound of 16R + Δ – 11, where Δ is the maximum degree and R is the network radius. We prove that our algorithm has smaller latency than the algorithm in [1]. The simulation results show that our algorithm has much better performance in practice than previous works.展开更多
In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggrega...In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaran- teed lifetime and efficient latency in WSNs. We first Construct a Guaranteed Lifetime Mininmm Ra- dius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while pro- viding a guaranteed network lifetime, and then de-sign a Greedy Scheduling algorithM (GSM) based on finding the nmzximum independent set in conflict graph to schedule he transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperfonm the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetilre.展开更多
Ethernet fundamental and its data transmission model are introduced in brief and end-to-end network latency was analyzed in this paper. On the premise of not considering transmission quality and transmission cost, lat...Ethernet fundamental and its data transmission model are introduced in brief and end-to-end network latency was analyzed in this paper. On the premise of not considering transmission quality and transmission cost, latency was the function of the rest of network resource parameter (NRP). The relation between the number of nodes and that of end-to-end links was presented. In ethernet architecture, the algorithm to determine the link with the smallest latency is a polynomial issue when the number of network nodes is limited, so it can be solved by way of polynomial equations. Latency measuring is the key issue to determine the link with the smallest network latency. 3-node brigade (regiment) level network centric warfare (NCW) demonstration platform was studied and the latency between the detectors and weapon control stations was taken as an example. The algorithm of end-to-end network latency and link information in NCW was presented. The algorithm program based on Server/Client architecture was developed. The data transmission optimal link is one whose end-to-end latency is the smallest. This paper solves the key issue to determine the link whose end-to-end latency is the smallest in ethernet architecture. The study can be widely applied to determine the optimal link which is in the complex network environment of multiple service provision points.展开更多
To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations ...To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations of input and output events through image-processing technology. This method used a black bar to keep pace with the measured joint rotating at a number of speeds. During tests,an external camera was placed in front of the apparatus with a proper visual field,so that it can simultaneously view orientations of both bars fixed on the corresponding joints. After quantitatively analyzing the accuracy of the proposed measurement method,the method was applied to a visual feedback-based master–slave robotic system with two-degrees-of-freedom. Experimental results show that the latency of the overall system was approximately 250 ms,and the opposite clearance of the measured joint was in the range of 1.7°–1.9°.展开更多
Modulating both the clock frequency and supply voltage of the network-on-chip (NoC) during runtime can reduce the power consumption and heat flux, but will lead to the increase of the latency of NoC. It is necessary...Modulating both the clock frequency and supply voltage of the network-on-chip (NoC) during runtime can reduce the power consumption and heat flux, but will lead to the increase of the latency of NoC. It is necessary to find a tradeoff between power consumption and communication latency. So we propose an analytical latency model which can show us the relationship of them. The proposed model to analyze latency is based on the M/G/1 queuing model, which is suitable for dynamic frequency scaling. The experiment results show that the accuracy of this model is more than 90%.展开更多
Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a l...Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latency-sensitive service.To this end,we build a tandem model considering the connection relationship between the various components in Sat5G network architecture,and give an end-to-end latency calculation function based on this model.By introducing stochastic network calculus,we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics of multimedia.Numerical results demonstrate the impact of different burst states and different service rates on this relationship,which means the higher the burst of arrival traffic and the higher the average rate of arrival traffic,the greater the probability of end-to-end latency violation.The results will provide valuable guidelines for the traffic control and cache management in Sat5G network.展开更多
The modern paradigm of the Internet of Things(IoT)has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing.However,such applications cannot meet strict quality of ser...The modern paradigm of the Internet of Things(IoT)has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing.However,such applications cannot meet strict quality of service(QoS)requirements.The large-scale deployment of IoT requires more effective use of network infrastructure to ensure QoS when processing big data.Generally,cloud-centric IoT application deployment involves different modules running on terminal devices and cloud servers.Fog devices with different computing capabilities must process the data generated by the end device,so deploying latency-sensitive applications in a heterogeneous fog computing environment is a difficult task.In addition,when there is an inconsistent connection delay between the fog and the terminal device,the deployment of such applications becomes more complicated.In this article,we propose an algorithm that can effectively place application modules on network nodes while considering connection delay,processing power,and sensing data volume.Compared with traditional cloud computing deployment,we conducted simulations in iFogSim to confirm the effectiveness of the algorithm.The simulation results verify the effectiveness of the proposed algorithm in terms of end-to-end delay and network consumption.Therein,latency and execution time is insensitive to the number of sensors.展开更多
Objective: Optimization of combining electroencephalography (EEG), short latency somatosensory evoked potentials (SLSEP) and transcranial Doppler (TCD) techniques to diagnose brain death. Methods: One hundred and elev...Objective: Optimization of combining electroencephalography (EEG), short latency somatosensory evoked potentials (SLSEP) and transcranial Doppler (TCD) techniques to diagnose brain death. Methods: One hundred and eleven patients (69 males, 42 females) from the major hospitals of Zhejiang Province were examined with portable EEG, SLSEP and TCD devices. Re-examinations occurred ≤12 h later. Results: The first examination revealed that the combination of SLSEP and EEG led to more sensitive diagnoses than the combination of SLSEP and TCD. Re-examination confirmed this and also revealed that the combination of TCD and EEG was the most sensitive. Conclusion: The results show that using multiple techniques to diagnose brain death is superior to using single method, and that the combination of SLSEP and EEG is better than other combinations.展开更多
Search-based software engineering has mainly dealt with automated test data generation by metaheuristic search techniques. Similarly, we try to generate the test data (i.e., problem instances) which show the worst cas...Search-based software engineering has mainly dealt with automated test data generation by metaheuristic search techniques. Similarly, we try to generate the test data (i.e., problem instances) which show the worst case of algorithms by such a technique. In this paper, in terms of non-functional testing, we re-define the worst case of some algorithms, respectively. By using genetic algorithms (GAs), we illustrate the strategies corresponding to each type of instances. We here adopt three problems for examples;the sorting problem, the 0/1 knapsack problem (0/1KP), and the travelling salesperson problem (TSP). In some algorithms solving these problems, we could find the worst-case instances successfully;the successfulness of the result is based on a statistical approach and comparison to the results by using the random testing. Our tried examples introduce informative guidelines to the use of genetic algorithms in generating the worst-case instance, which is defined in the aspect of algorithm performance.展开更多
Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computa...Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing.However,different service architecture and offloading strategies have a different impact on the service time performance of IoT applications.Therefore,this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network.Also,it introduces the offloading latency models to investigate the delay of different offloading scenarios/schemes and explores the effect of computational and communication demand on each one.A series of experiments conducted on an EdgeCloudSim show that different offloading decisions within the Edge-Cloud system can lead to various service times due to the computational resources and communications types.Finally,this paper presents a comprehensive review of the current state-of-the-art research on task offloading issues in the Edge-Cloud environment.展开更多
Latency sensitive services have attracted much attention lately and imposedstringent requirements on the access network design. Passive optical networks (PONs) providea potential long-term solution for the underlying ...Latency sensitive services have attracted much attention lately and imposedstringent requirements on the access network design. Passive optical networks (PONs) providea potential long-term solution for the underlying transport network supporting theseservices. This paper discusses latency limitations in PON and recent progress in PONstandardization to improve latency. Experimental results of a low latency PON system arepresented as a proof of concept.展开更多
Gamma Ray Array Detector(GRAD) is one of external target facility subsystems in the Cooling Storage Ring on the Heavy Ion Research Facility at Lanzhou(HIRFL-CSR).The trigger subsystem of GRAD is required to make a fas...Gamma Ray Array Detector(GRAD) is one of external target facility subsystems in the Cooling Storage Ring on the Heavy Ion Research Facility at Lanzhou(HIRFL-CSR).The trigger subsystem of GRAD is required to make a fast L1 trigger decision with a fixed latency for the data acquisition.Because the hit signals from the detector are asynchronous with the local clock of the trigger system,a nondeterministic latency(the value changes between zero and one clock period) is generated when the synchronous receivers of the conventional trigger system process the hit signals.In this paper,an improved trigger logic based on a field-programmable gate array is developed,and comprised of zero-delay broadening circuits as receivers and an improved adding circuit designed for the new receivers.Software simulation and experimental measurement have been conducted.Comparison with the conventional trigger logic,the improved trigger logic has the advantage of eliminating the nondeterministic latency and reducing the total processing latency.展开更多
基金supported in part by the National Natural Science Foundation of China(NSFC)under Grant 62371082 and 62001076in part by the National Key R&D Program of China under Grant 2021YFB1714100in part by the Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-MSX0726 and cstc2020jcyjmsxmX0878.
文摘Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature.
文摘Drawing upon a characteristic analysis of the latency period in emergencies,this paper proposes an emergency plan selection method based on interval language variables and information entropy to address the challenge of acquiring critical information during this crucial stage.Initially,decision-makers employ interval language variables to express the preference information regarding emergency plans,while also introducing an enhanced information entropy theory to derive the weight coefficients of key indicators.Subsequently,the weighted arithmetic average operator of interval language is applied twice to aggregate the preference information alongside the relative importance of decision-makers and the weight coefficients of key indicators.Finally,the ranking coefficients of each emergency plan are sorted to determine the optimal scheme.The feasibility and effectiveness of this method are demonstrated through a case study involving the selection of an emergency plan for a flood disaster in a specific location.
基金supported by the National High Technology Research and Development Program(863) of China(No.2015AA01A701)
文摘Through enabling the IT and cloud computation capacities at Radio Access Network(RAN),Mobile Edge Computing(MEC) makes it possible to deploy and provide services locally.Therefore,MEC becomes the potential technology to satisfy the requirements of 5G network to a certain extent,due to its functions of services localization,local breakout,caching,computation offloading,network context information exposure,etc.Especially,MEC can decrease the end-to-end latency dramatically through service localization and caching,which is key requirement of 5G low latency scenario.However,the performance of MEC still needs to be evaluated and verified for future deployment.Thus,the concept of MEC is introduced into5 G architecture and analyzed for different 5G scenarios in this paper.Secondly,the evaluation of MEC performance is conducted and analyzed in detail,especially for network end-to-end latency.In addition,some challenges of the MEC are also discussed for future deployment.
基金supported in part by the National Natural Science Foundation of China (Grant No.61361166005)the State Major Science and Technology Special Projects (Grant No.2016ZX03001020006)the National Program for Support of Top-notch Young Professionals
文摘In order to alleviate capacity constraints on the fronthaul and decrease the transmit latency, a hierarchical content caching paradigm is applied in the fog radio access networks(F-RANs). In particular, a specific cluster of remote radio heads is formed through a common centralized cloud at the baseband unit pool, while the local content is directly delivered at fog access points with edge cache and distributed radio signal processing capability. Focusing on a downlink F-RAN, the explicit expressions of ergodic rate for the hierarchical paradigm is derived. Meanwhile, both the waiting delay and latency ratio for users requiring a single content are exploited. According to the evaluation results of ergodic rate on waiting delay, the transmit latency can be effectively reduced through improving the capacity of both fronthaul and radio access links. Moreover, to fully explore the potential of hierarchical content caching, the transmit latency for users requiring multiple content objects is optimized as well in three content transmission cases with different radio access links. The simulation results verify the accuracy of the analysis, further show the latency decreases significantly due to the hierarchical paradigm.
基金supported by the National Natural Science Foundation of China(Grant Nos.61401015 and 61271308)the Fundamental Research Funds for the Central Universities,China(Grant No.2014JBM018)the Talent Fund of Beijing Jiaotong University,China(Grant No.2015RC013)
文摘Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks.
文摘Visual evoked potentials (VEPs) are a series of signals about visual occipital cortex in response to visual stimuli and can be used as one of ob-jective non-invasive neuro-physiological pa-rameters to reflect the visual organs and central visual pathway’s functional integrity. Previous studies have shown that acute and chronic ex-ercise could affect VEPs independent from body temperature and other physiological parameters. VEPs may well be used as neuro-physiological criteria in defining the performances of the ath-letes. Different sports training have different effects on VEPs, but the results are not consis-tent. P100 latency is the representative compo-nent of VEPs and it is of high, steady amplitude and of slight intra- and inter-individual variabil-ity so that the index is most commonly used. The purpose of this study was to investigate the specificity and sensitivity of P100 latency to dif-ferent physical activities. The neural electricity device of NDI-200 was used to measure the pattern reversal VEPs of all subjects, including the values of the resting state before and after different events exercise. Different events exer-cise contained an aerobic cycloergometric ex-ercise (7 subjects were conducted to a Bruce Graded Exercise Test on the Monark Ergomedic 839E cycloergometer, THR (target heart rate) = 85% HRmax, 3 times/week, about 10 minutes once time, 6 weeks), tennis training (16 volun-teers, 2 hours/day, 3 days/week, 8 weeks), aerobic Latin exercise (7 subjects, 1 hour/day, 3 days/week, 6 weeks) and the Baduanjin of Health Qigong training (6 subjects, 1 hour/day, 3 days/week, 6 weeks). The VEPs recordings of the control groups obtained synchronized with the experimental groups. SPSS 11.5 for win-dows was used for statistical analysis. A level of P﹤0.05 was accepted as statistically significant. The VEPs P100 latency of post-exercise of all experimental groups except Baduanjin group became shorter significantly compared with those of pre-exercise (P﹤0.05). No significant difference was found between pre-and post- exercise for the control groups. This study showed that exercise could shorten the P100 la-tency significantly. Moreover, it also indicated that VEPs were sensitive to exercise to a certain extent. We concluded that VEPs might well be used as neuro-physiological criteria in defining the performances of the athletes. It was found that the VEPs P100 latency became shorter after most training programs;furthermore, it demon-strated that P100 latency of VEPs had little specificity to different events.
文摘It has been postulated that the persistent short intravaginal ejaculation latency time (IELT) of men with lifelong premature ejaculation (LPE) is related to 5-hydroxytryptamine (HT)2c receptor functioning. The aim of this study was to investigate the relationship of Cys23Ser 5-HT2c receptor gene polymorphism and the duration of IELT in men with LPE. Therefore, a prospective study was conducted in 64 Dutch Caucasian men with LPE. Baseline IELT during coitus was assessed by stopwatch over a 1-month period. All men were genotyped for Cys23Ser 5-HT2c receptor gene polymorphism. Allele frequencies and genotypes of Cys and Ser variants of 5-HT2c receptor gene polymorphism were determined. Association between Cys/Cys and Ser/Ser genotypes and the natural logarithm of the IELT in men with LPE were.investigated. As a result, the geometric mean, median and natural mean IELT were 25.2, 27.0, 33.9s, respectively. Of all men, 20.0%, 10.8%, 23.1% and 41.5% ejaculated within 10, 10-20, 20-30 and 30-60s after vaginal penetration. Of the 64 men, the Cys/Cys and Ser/Ser genotype frequency for the Cys23Ser polymorphism of the 5-HT2c receptor gene was 81% and 19%, respectively. The geometric mean IELT of the wildtypes (Cys/Cys) is significantly lower (22.6s; 95% CI 18.3-27.8s) than in male homozygous mutants (Ser/Ser) (40.4s; 95% CI 20.3-80.4s) (P = 0.03). It is concluded that Cys23Ser 5-HT2c receptor gene polymorphism is associated with the IELT in men with LPE. Men with Cys/Cys genotype have shorter IELTs than men with Ser/Ser genotypes.
文摘Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- gation is a fundamental yet time-consuming task in WSNs. We present an improved algorithm to reduce data aggregation latency. Our algorithm has a latency bound of 16R + Δ – 11, where Δ is the maximum degree and R is the network radius. We prove that our algorithm has smaller latency than the algorithm in [1]. The simulation results show that our algorithm has much better performance in practice than previous works.
基金This paper was supported by the National Basic Research Pro- gram of China (973 Program) under Crant No. 2011CB302903 the National Natural Science Foundation of China under Crants No. 60873231, No.61272084+3 种基金 the Natural Science Foundation of Jiangsu Province under Ca-ant No. BK2009426 the Innovation Project for Postgraduate Cultivation of Jiangsu Province under Crants No. CXZZ11_0402, No. CX10B195Z, No. CXLX11_0415, No. CXLXll 0416 the Natural Science Research Project of Jiangsu Education Department under Grant No. 09KJD510008 the Natural Science Foundation of the Jiangsu Higher Educa-tion Institutions of China under Grant No. 11KJA520002.
文摘In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaran- teed lifetime and efficient latency in WSNs. We first Construct a Guaranteed Lifetime Mininmm Ra- dius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while pro- viding a guaranteed network lifetime, and then de-sign a Greedy Scheduling algorithM (GSM) based on finding the nmzximum independent set in conflict graph to schedule he transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperfonm the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetilre.
基金Sponsored by Grand Preresearch Project Foundation of General Armament Department of the CPLAin the Tenth Five-year Plan (Grant No41306020202)the National Natural Science Foundation of China(Grant No60672150)
文摘Ethernet fundamental and its data transmission model are introduced in brief and end-to-end network latency was analyzed in this paper. On the premise of not considering transmission quality and transmission cost, latency was the function of the rest of network resource parameter (NRP). The relation between the number of nodes and that of end-to-end links was presented. In ethernet architecture, the algorithm to determine the link with the smallest latency is a polynomial issue when the number of network nodes is limited, so it can be solved by way of polynomial equations. Latency measuring is the key issue to determine the link with the smallest network latency. 3-node brigade (regiment) level network centric warfare (NCW) demonstration platform was studied and the latency between the detectors and weapon control stations was taken as an example. The algorithm of end-to-end network latency and link information in NCW was presented. The algorithm program based on Server/Client architecture was developed. The data transmission optimal link is one whose end-to-end latency is the smallest. This paper solves the key issue to determine the link whose end-to-end latency is the smallest in ethernet architecture. The study can be widely applied to determine the optimal link which is in the complex network environment of multiple service provision points.
基金supported by the International S&T Cooperation Program of China (No. 2014DFA70710) the National Natural Science Foundation of China (No. 51475323)
文摘To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations of input and output events through image-processing technology. This method used a black bar to keep pace with the measured joint rotating at a number of speeds. During tests,an external camera was placed in front of the apparatus with a proper visual field,so that it can simultaneously view orientations of both bars fixed on the corresponding joints. After quantitatively analyzing the accuracy of the proposed measurement method,the method was applied to a visual feedback-based master–slave robotic system with two-degrees-of-freedom. Experimental results show that the latency of the overall system was approximately 250 ms,and the opposite clearance of the measured joint was in the range of 1.7°–1.9°.
基金supported by the National Natural Science Foundation of China under Grant No.61376024 and No.61306024Natural Science Foundation of Guangdong Province under Grant No.S2013040014366Basic Research Programme of Shenzhen No.JCYJ20140417113430642 and JCYJ20140901003939020
文摘Modulating both the clock frequency and supply voltage of the network-on-chip (NoC) during runtime can reduce the power consumption and heat flux, but will lead to the increase of the latency of NoC. It is necessary to find a tradeoff between power consumption and communication latency. So we propose an analytical latency model which can show us the relationship of them. The proposed model to analyze latency is based on the M/G/1 queuing model, which is suitable for dynamic frequency scaling. The experiment results show that the accuracy of this model is more than 90%.
基金This work was supported by the National Natural Science Foundation of China under Grants 61801073,61722105,61931004the Natural Science Foundation of Liaoning Province under Grant 20170540034.
文摘Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latency-sensitive service.To this end,we build a tandem model considering the connection relationship between the various components in Sat5G network architecture,and give an end-to-end latency calculation function based on this model.By introducing stochastic network calculus,we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics of multimedia.Numerical results demonstrate the impact of different burst states and different service rates on this relationship,which means the higher the burst of arrival traffic and the higher the average rate of arrival traffic,the greater the probability of end-to-end latency violation.The results will provide valuable guidelines for the traffic control and cache management in Sat5G network.
基金This research was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2021-2016-0-00313)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
文摘The modern paradigm of the Internet of Things(IoT)has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing.However,such applications cannot meet strict quality of service(QoS)requirements.The large-scale deployment of IoT requires more effective use of network infrastructure to ensure QoS when processing big data.Generally,cloud-centric IoT application deployment involves different modules running on terminal devices and cloud servers.Fog devices with different computing capabilities must process the data generated by the end device,so deploying latency-sensitive applications in a heterogeneous fog computing environment is a difficult task.In addition,when there is an inconsistent connection delay between the fog and the terminal device,the deployment of such applications becomes more complicated.In this article,we propose an algorithm that can effectively place application modules on network nodes while considering connection delay,processing power,and sensing data volume.Compared with traditional cloud computing deployment,we conducted simulations in iFogSim to confirm the effectiveness of the algorithm.The simulation results verify the effectiveness of the proposed algorithm in terms of end-to-end delay and network consumption.Therein,latency and execution time is insensitive to the number of sensors.
文摘Objective: Optimization of combining electroencephalography (EEG), short latency somatosensory evoked potentials (SLSEP) and transcranial Doppler (TCD) techniques to diagnose brain death. Methods: One hundred and eleven patients (69 males, 42 females) from the major hospitals of Zhejiang Province were examined with portable EEG, SLSEP and TCD devices. Re-examinations occurred ≤12 h later. Results: The first examination revealed that the combination of SLSEP and EEG led to more sensitive diagnoses than the combination of SLSEP and TCD. Re-examination confirmed this and also revealed that the combination of TCD and EEG was the most sensitive. Conclusion: The results show that using multiple techniques to diagnose brain death is superior to using single method, and that the combination of SLSEP and EEG is better than other combinations.
文摘Search-based software engineering has mainly dealt with automated test data generation by metaheuristic search techniques. Similarly, we try to generate the test data (i.e., problem instances) which show the worst case of algorithms by such a technique. In this paper, in terms of non-functional testing, we re-define the worst case of some algorithms, respectively. By using genetic algorithms (GAs), we illustrate the strategies corresponding to each type of instances. We here adopt three problems for examples;the sorting problem, the 0/1 knapsack problem (0/1KP), and the travelling salesperson problem (TSP). In some algorithms solving these problems, we could find the worst-case instances successfully;the successfulness of the result is based on a statistical approach and comparison to the results by using the random testing. Our tried examples introduce informative guidelines to the use of genetic algorithms in generating the worst-case instance, which is defined in the aspect of algorithm performance.
基金In addition,the authors would like to thank the Deanship of Scientific Research,Prince Sattam bin Abdulaziz University,Al-Kharj,Saudi Arabia,for supporting this work.
文摘Recently,the number of Internet of Things(IoT)devices connected to the Internet has increased dramatically as well as the data produced by these devices.This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing.However,different service architecture and offloading strategies have a different impact on the service time performance of IoT applications.Therefore,this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network.Also,it introduces the offloading latency models to investigate the delay of different offloading scenarios/schemes and explores the effect of computational and communication demand on each one.A series of experiments conducted on an EdgeCloudSim show that different offloading decisions within the Edge-Cloud system can lead to various service times due to the computational resources and communications types.Finally,this paper presents a comprehensive review of the current state-of-the-art research on task offloading issues in the Edge-Cloud environment.
文摘Latency sensitive services have attracted much attention lately and imposedstringent requirements on the access network design. Passive optical networks (PONs) providea potential long-term solution for the underlying transport network supporting theseservices. This paper discusses latency limitations in PON and recent progress in PONstandardization to improve latency. Experimental results of a low latency PON system arepresented as a proof of concept.
基金Supported by the Important Direction Project of the CAS Knowledge Innovation Program(No.KJCX2-YW-N27)the National Natural Science Foundation of China(No.11079045)
文摘Gamma Ray Array Detector(GRAD) is one of external target facility subsystems in the Cooling Storage Ring on the Heavy Ion Research Facility at Lanzhou(HIRFL-CSR).The trigger subsystem of GRAD is required to make a fast L1 trigger decision with a fixed latency for the data acquisition.Because the hit signals from the detector are asynchronous with the local clock of the trigger system,a nondeterministic latency(the value changes between zero and one clock period) is generated when the synchronous receivers of the conventional trigger system process the hit signals.In this paper,an improved trigger logic based on a field-programmable gate array is developed,and comprised of zero-delay broadening circuits as receivers and an improved adding circuit designed for the new receivers.Software simulation and experimental measurement have been conducted.Comparison with the conventional trigger logic,the improved trigger logic has the advantage of eliminating the nondeterministic latency and reducing the total processing latency.