3,457 research outputs found

    Evaluating Automatic Pools Distribution Techniques for Self-Configured Networks

    Get PDF
    NextGeneration of Networks (NGN) is one of the most important research topics of the last decade. Current Internet is not capable of supporting new users and operators’ demands and a new structure will be necessary to them. In this context many solutions might be necessary: from architectural definitions to new protocols. Addressing protocols are a specific example of protocols which should be defined to support NGN requirements. One special required characteristic is automation of addresses assignment to facilitate networks operation and design. Many addressing levels can be considered, however, proposed solutions are usually restricted to local networks addresses distribution. In this paper we present an analysis over automatic address distribution to networks, allowing a correct local addresses’ assignment. Two allocation techniques are presented and evaluated to present the benefits of this kind of mechanisms. Finally, conclusions about the proposed methodologies and the protocols applicability are discussed

    Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures

    Get PDF
    The progress of technology on energy and IoT fields has led to an increasingly complicated electric environment in low-voltage local microgrid, along with the extensions of electric vehicle, micro-generation, and local storage. It is required to establish a home energy management system (HEMS) to efficiently integrate and manage household energy micro-generation, consumption and storage, in order to realize decentralized local energy systems at the community level. Domestic power demand prediction is of great importance for establishing HEMS on realizing load balancing as well as other smart energy solutions with the support of IoT techniques. Artificial neural networks with various network types (e.g., DNN, LSTM/GRU based RNN) and other configurations are widely utilized on energy predictions. However, the selection of network configuration for each research is generally a case by case study achieved through empirical or enumerative approaches. Moreover, the commonly utilized network initialization methods assign parameter values based on random numbers, which cause diversity on model performance, including learning efficiency, forecast accuracy, etc. In this paper, an evolutionary ensemble neural network pool (EENNP) method is proposed to achieve a population of well-performing networks with proper combinations of configuration and initialization automatically. In the experimental study, power demand predictions of multiple households are explored in three application scenarios: optimizing potential network configuration set, forecasting single household power demand, and refilling missing data. The impacts of evolutionary parameters on model performance are investigated. The experimental results illustrate that the proposed method achieves better solutions on the considered scenarios. The optimized potential network configuration set using EENNP achieves a similar result to manual optimization. The results of household demand prediction and missing data refilling perform better than the naĂŻve and simple predictors.publishedVersio

    Deliverable JRA1.1: Evaluation of current network control and management planes for multi-domain network infrastructure

    Get PDF
    This deliverable includes a compilation and evaluation of available control and management architectures and protocols applicable to a multilayer infrastructure in a multi-domain Virtual Network environment.The scope of this deliverable is mainly focused on the virtualisation of the resources within a network and at processing nodes. The virtualization of the FEDERICA infrastructure allows the provisioning of its available resources to users by means of FEDERICA slices. A slice is seen by the user as a real physical network under his/her domain, however it maps to a logical partition (a virtual instance) of the physical FEDERICA resources. A slice is built to exhibit to the highest degree all the principles applicable to a physical network (isolation, reproducibility, manageability, ...). Currently, there are no standard definitions available for network virtualization or its associated architectures. Therefore, this deliverable proposes the Virtual Network layer architecture and evaluates a set of Management- and Control Planes that can be used for the partitioning and virtualization of the FEDERICA network resources. This evaluation has been performed taking into account an initial set of FEDERICA requirements; a possible extension of the selected tools will be evaluated in future deliverables. The studies described in this deliverable define the virtual architecture of the FEDERICA infrastructure. During this activity, the need has been recognised to establish a new set of basic definitions (taxonomy) for the building blocks that compose the so-called slice, i.e. the virtual network instantiation (which is virtual with regard to the abstracted view made of the building blocks of the FEDERICA infrastructure) and its architectural plane representation. These definitions will be established as a common nomenclature for the FEDERICA project. Other important aspects when defining a new architecture are the user requirements. It is crucial that the resulting architecture fits the demands that users may have. Since this deliverable has been produced at the same time as the contact process with users, made by the project activities related to the Use Case definitions, JRA1 has proposed a set of basic Use Cases to be considered as starting point for its internal studies. When researchers want to experiment with their developments, they need not only network resources on their slices, but also a slice of the processing resources. These processing slice resources are understood as virtual machine instances that users can use to make them behave as software routers or end nodes, on which to download the software protocols or applications they have produced and want to assess in a realistic environment. Hence, this deliverable also studies the APIs of several virtual machine management software products in order to identify which best suits FEDERICA’s needs.Postprint (published version

    Evaluation of Storage Systems for Big Data Analytics

    Get PDF
    abstract: Recent trends in big data storage systems show a shift from disk centric models to memory centric models. The primary challenges faced by these systems are speed, scalability, and fault tolerance. It is interesting to investigate the performance of these two models with respect to some big data applications. This thesis studies the performance of Ceph (a disk centric model) and Alluxio (a memory centric model) and evaluates whether a hybrid model provides any performance benefits with respect to big data applications. To this end, an application TechTalk is created that uses Ceph to store data and Alluxio to perform data analytics. The functionalities of the application include offline lecture storage, live recording of classes, content analysis and reference generation. The knowledge base of videos is constructed by analyzing the offline data using machine learning techniques. This training dataset provides knowledge to construct the index of an online stream. The indexed metadata enables the students to search, view and access the relevant content. The performance of the application is benchmarked in different use cases to demonstrate the benefits of the hybrid model.Dissertation/ThesisMasters Thesis Computer Science 201

    A Smart Contract Blockchain Penetration Testing Framework

    Get PDF
    Likened to old-style contracts smart agreements motorized by blockchain ensure that deal processes are real safe then well-organized Without the need aimed at third-party mediators like lawyers smart contracts enable transparent processes cost-effectiveness time efficiency and trust lessness While old-style cybersecurity attacks on keen agreement requests can be thwarted by blockchain new threats and attack vectors are constantly emerging which affect blockchain in a manner alike toward additional web and application-based systems Organizations can develop and use the technology securely with connected infrastructure by using effective blockchain testing However the authors discovered throughout the sequence of their investigate that Blockchain technology has security issues like permanent dealings insufficient access and ineffective plans Web portals and other applications do not contain attack vectors like these This study introduces a brand new penetration testing framework for decentralized apps and clever contracts Results from the suggested penetration-testing methodology were com-pared by those from automatic diffusion examination scanners by the authors The findings revealed gaps in vulnerabilities that were not disclosed during routine pen testin

    Bridges Structural Health Monitoring and Deterioration Detection Synthesis of Knowledge and Technology

    Get PDF
    INE/AUTC 10.0
    • …
    corecore