We investigate the approximating capability of Markov modulated Poisson processes (MMPP) for modeling multifractal Internet traffic. The choice of MMPP is motivated by its ability to capture the variability and correl...We investigate the approximating capability of Markov modulated Poisson processes (MMPP) for modeling multifractal Internet traffic. The choice of MMPP is motivated by its ability to capture the variability and correlation in moderate time scales while being analytically tractable. Important statistics of traffic burstiness are described and a customized moment-based fitting procedure of MMPP to traffic traces is presented. Our methodology of doing this is to examine whether the MMPP can be used to predict the performance of a queue to which MMPP sample paths and measured traffic traces are fed for comparison respectively, in addition to the goodness-of-fit test of MMPP. Numerical results and simulations show that the fitted MMPP can approximate multifractal traffic quite well, i.e. accurately predict the queueing performance.展开更多
The basic mobile IP protocol is simple but only suitable for wide area and low speed networks. In this paper, we propose a novel micro-mobile IP handoff scheme, that is the packet loss avoidance handoff scheme. By usi...The basic mobile IP protocol is simple but only suitable for wide area and low speed networks. In this paper, we propose a novel micro-mobile IP handoff scheme, that is the packet loss avoidance handoff scheme. By using an additional cache at the base station and distinguishing packets with packet IDs, the proposed scheme minimizes the number of lost packets during handoff. Network architecture and detailed handoff procedures are given. We also analyze the cache size at the base station, the associated network load with the handoff procedure, and the handoff delay. The scheme is investigated by computer simulations. Simulation results show that the proposed scheme is suitable for environments with fast mobility and frequent handoff.展开更多
Aim To Put forward an improve algorithm for real-time connection admission control (CAC) decision. Methods converted equations of Cell loss ratio (CLR) upper bound were derived based on typical approaches to reduce co...Aim To Put forward an improve algorithm for real-time connection admission control (CAC) decision. Methods converted equations of Cell loss ratio (CLR) upper bound were derived based on typical approaches to reduce computing load. Moreover, the effects of usage parameter control (UPC) policing and bandwidth allocation functions were combined to deduce improver equations. computing load and admission region of the new algorithm were analyzed, while numerical examples and comparisons with classical non-parametic method were also included. Results Computing burden was reduced. More accurate estimation of CLR was obtained. The admission region of new algorithm was larger than typical non-parametric approach and was variable according to the burst length.Conclusion The calculation burden of new algorithm for CLR estimation is lighter than classical non-parametric approach. In addition to that, just as many information as what we can get in connection setup process are used for CAC decision. So it is not only a practicable but also an effective method that can be used in real-time processing.展开更多
Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittan...Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion.展开更多
A robust sliding mode control algorithm is developed for a class of networked control system with packet dropouts in both sensor-controller channel and controller-actuator channel,and at the same time mismatched param...A robust sliding mode control algorithm is developed for a class of networked control system with packet dropouts in both sensor-controller channel and controller-actuator channel,and at the same time mismatched parametric uncertainty and external disturbance are also taken into consideration.A two-level Bernoulli process has been used to describe the packet dropouts existing in both channels.A novel integral sliding surface is proposed,based on which the H∞performance of system sliding mode motion is analyzed.Then the sufficient condition for system stability and robustness is derived in the form of linear matrix inequality(LMI).A sliding mode controller is designed which can guarantee a relatively ideal system dynamic performance and has certain robustness against unknown parameter perturbations and external disturbances.The results from numerical simulations are presented to corroborate the validity of the proposed controller.展开更多
For a class of linear discrete-time systems that is subject to randomly occurred networked packet loss in industrial cyber physical systems, a novel robust model predictive control method with active compensation mech...For a class of linear discrete-time systems that is subject to randomly occurred networked packet loss in industrial cyber physical systems, a novel robust model predictive control method with active compensation mechanism was proposed. The probability distribution of packet loss is described as the Bernoulli distributed white sequences. By using the Lyapunov stability theory, the existing sufficient conditions of the controller are derived from solving a group of linear matrix inequalities. Moreover, dropout-rate with uncertainty and unknown dropout-rate are also considered, which can greatly reduce the conservativeness of the controller. The designed robust model predictive control method not only efficiently eliminates the negative effects of the networked data loss in industrial cyber physical systems but also ensures the stability of closed-loop system. Two examples were provided to illustrate the superiority and effectiveness of the proposed method.展开更多
The model of energy cost in a wireless sensor network (WSN)environment is built, and the energy awareness and the wireless interference mainly due to different path loss models are studied. A special case of a clust...The model of energy cost in a wireless sensor network (WSN)environment is built, and the energy awareness and the wireless interference mainly due to different path loss models are studied. A special case of a clustering scheme, a twodimensional grid clustering mechanism, is adopted. Clusterheads are rotated evenly among all sensor nodes in an efficient and decentralized manner, based on the residual energy in the battery and the random backoff time. In addition to transmitting and receiving packets within the sensors' electrical and amplification circuits, extra energy is needed in the retransmission of packets due to packet collisions caused by severe interference. By analysis and mathematical derivation, which are based on planar geometry, it is shown that the total energy consumed in the network is directly related to the gridstructure in the proposed grid based clustering mechanism. The transmission range is determined by cluster size, and the path loss exponent is determined by nodal separation. The summation of overall interference is caused by all the sensors that are transmitting concurrently. By analysis and simulation, an optimal grid structure with the corresponding grid size is presented, which balances between maximizing energy conservation and minimizing overall interference in wireless sensor networks.展开更多
In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management str...In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost.展开更多
In this paper,we have proved that if one of the following conditions is satisfed,then the equations in title has no positive integer solution:①D=∏si=1P i or D=2∏si=1P i and \{ P i≡3 (mod 4)\} (1≤i≤s) or P i≡5 (...In this paper,we have proved that if one of the following conditions is satisfed,then the equations in title has no positive integer solution:①D=∏si=1P i or D=2∏si=1P i and \{ P i≡3 (mod 4)\} (1≤i≤s) or P i≡5 (mod 8) (i≤i≤s); ② D=∏si=1P i-1 (mod 12), 1≤s≤7 and \{D≠3·5·7·11·17·577,7·19·29·41·59·577;\} ③ D=2∏si=1P i,1≤s≤6 and \{D ≠2·17,2·3·5·7·11·17,2·17·113·239·337·577·665857;\} ④ D=∏si=1P i≡-1 (mod 12), 1≤s≤3 and D≠ 5·7,29·41·239.展开更多
In this paper, it is shown that: if λ1 ,……λs axe nonzero real numbers, not all of the same sign, such that A1/A2 is irrational, then for any real number η and ε 〉 0 the inequality |λ1x1^2 + λ2x2^2+ λ3x3^...In this paper, it is shown that: if λ1 ,……λs axe nonzero real numbers, not all of the same sign, such that A1/A2 is irrational, then for any real number η and ε 〉 0 the inequality |λ1x1^2 + λ2x2^2+ λ3x3^4+ λsx3^4+……λsx8^4 +η〈 ε has infinitely many solutions in positive integers x1,... ,xs.展开更多
文摘We investigate the approximating capability of Markov modulated Poisson processes (MMPP) for modeling multifractal Internet traffic. The choice of MMPP is motivated by its ability to capture the variability and correlation in moderate time scales while being analytically tractable. Important statistics of traffic burstiness are described and a customized moment-based fitting procedure of MMPP to traffic traces is presented. Our methodology of doing this is to examine whether the MMPP can be used to predict the performance of a queue to which MMPP sample paths and measured traffic traces are fed for comparison respectively, in addition to the goodness-of-fit test of MMPP. Numerical results and simulations show that the fitted MMPP can approximate multifractal traffic quite well, i.e. accurately predict the queueing performance.
文摘The basic mobile IP protocol is simple but only suitable for wide area and low speed networks. In this paper, we propose a novel micro-mobile IP handoff scheme, that is the packet loss avoidance handoff scheme. By using an additional cache at the base station and distinguishing packets with packet IDs, the proposed scheme minimizes the number of lost packets during handoff. Network architecture and detailed handoff procedures are given. We also analyze the cache size at the base station, the associated network load with the handoff procedure, and the handoff delay. The scheme is investigated by computer simulations. Simulation results show that the proposed scheme is suitable for environments with fast mobility and frequent handoff.
文摘Aim To Put forward an improve algorithm for real-time connection admission control (CAC) decision. Methods converted equations of Cell loss ratio (CLR) upper bound were derived based on typical approaches to reduce computing load. Moreover, the effects of usage parameter control (UPC) policing and bandwidth allocation functions were combined to deduce improver equations. computing load and admission region of the new algorithm were analyzed, while numerical examples and comparisons with classical non-parametic method were also included. Results Computing burden was reduced. More accurate estimation of CLR was obtained. The admission region of new algorithm was larger than typical non-parametric approach and was variable according to the burst length.Conclusion The calculation burden of new algorithm for CLR estimation is lighter than classical non-parametric approach. In addition to that, just as many information as what we can get in connection setup process are used for CAC decision. So it is not only a practicable but also an effective method that can be used in real-time processing.
基金The Science Foundation of Southeast University(No.XJ0704268)the Natural Science Foundation of the Education Department of Anhui Province(No.KJ2007B088)
文摘Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion.
基金Projects(51476187,51506221,51606219) supported by the National Natural Science Foundation of China
文摘A robust sliding mode control algorithm is developed for a class of networked control system with packet dropouts in both sensor-controller channel and controller-actuator channel,and at the same time mismatched parametric uncertainty and external disturbance are also taken into consideration.A two-level Bernoulli process has been used to describe the packet dropouts existing in both channels.A novel integral sliding surface is proposed,based on which the H∞performance of system sliding mode motion is analyzed.Then the sufficient condition for system stability and robustness is derived in the form of linear matrix inequality(LMI).A sliding mode controller is designed which can guarantee a relatively ideal system dynamic performance and has certain robustness against unknown parameter perturbations and external disturbances.The results from numerical simulations are presented to corroborate the validity of the proposed controller.
基金Project(61673199)supported by the National Natural Science Foundation of ChinaProject(ICT1800400)supported by the Open Research Project of the State Key Laboratory of Industrial Control Technology,Zhejiang University,China
文摘For a class of linear discrete-time systems that is subject to randomly occurred networked packet loss in industrial cyber physical systems, a novel robust model predictive control method with active compensation mechanism was proposed. The probability distribution of packet loss is described as the Bernoulli distributed white sequences. By using the Lyapunov stability theory, the existing sufficient conditions of the controller are derived from solving a group of linear matrix inequalities. Moreover, dropout-rate with uncertainty and unknown dropout-rate are also considered, which can greatly reduce the conservativeness of the controller. The designed robust model predictive control method not only efficiently eliminates the negative effects of the networked data loss in industrial cyber physical systems but also ensures the stability of closed-loop system. Two examples were provided to illustrate the superiority and effectiveness of the proposed method.
文摘The model of energy cost in a wireless sensor network (WSN)environment is built, and the energy awareness and the wireless interference mainly due to different path loss models are studied. A special case of a clustering scheme, a twodimensional grid clustering mechanism, is adopted. Clusterheads are rotated evenly among all sensor nodes in an efficient and decentralized manner, based on the residual energy in the battery and the random backoff time. In addition to transmitting and receiving packets within the sensors' electrical and amplification circuits, extra energy is needed in the retransmission of packets due to packet collisions caused by severe interference. By analysis and mathematical derivation, which are based on planar geometry, it is shown that the total energy consumed in the network is directly related to the gridstructure in the proposed grid based clustering mechanism. The transmission range is determined by cluster size, and the path loss exponent is determined by nodal separation. The summation of overall interference is caused by all the sensors that are transmitting concurrently. By analysis and simulation, an optimal grid structure with the corresponding grid size is presented, which balances between maximizing energy conservation and minimizing overall interference in wireless sensor networks.
基金supported by the National Natural Science Fund of China under Grant No. 61472097the Education Ministry Doctoral Research Foundation of China (20132304110017)the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation
文摘In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost.
文摘In this paper,we have proved that if one of the following conditions is satisfed,then the equations in title has no positive integer solution:①D=∏si=1P i or D=2∏si=1P i and \{ P i≡3 (mod 4)\} (1≤i≤s) or P i≡5 (mod 8) (i≤i≤s); ② D=∏si=1P i-1 (mod 12), 1≤s≤7 and \{D≠3·5·7·11·17·577,7·19·29·41·59·577;\} ③ D=2∏si=1P i,1≤s≤6 and \{D ≠2·17,2·3·5·7·11·17,2·17·113·239·337·577·665857;\} ④ D=∏si=1P i≡-1 (mod 12), 1≤s≤3 and D≠ 5·7,29·41·239.
基金the National Natural Science Foundation of China(10671056)
文摘In this paper, it is shown that: if λ1 ,……λs axe nonzero real numbers, not all of the same sign, such that A1/A2 is irrational, then for any real number η and ε 〉 0 the inequality |λ1x1^2 + λ2x2^2+ λ3x3^4+ λsx3^4+……λsx8^4 +η〈 ε has infinitely many solutions in positive integers x1,... ,xs.