329 research outputs found

    On IP over WDM burst-switched long haul and metropolitan area networks

    Get PDF
    The IP over Wavelength Division Multiplexing (WDM) network is a natural evolution ushered in by the phenomenal advances in networking technologies and technical breakthroughs in optical communications, fueled by the increasing demand in the reduction of operation costs and the network management complexity. The unprecedented bandwidth provisioning capability and the multi-service supportability of the WDM technology, in synergy with the data-oriented internetworking mechanisms, facilitates a common shared infrastructure for the Next Generation Internet (NGJ). While NGI targets to perform packet processing directly on the optical transport layer, a smooth evolution is critical to success. Intense research has been conducted to design the new generation optical networks that retain the advantages of packet-oriented transport prototypes while rendering elastic network resource utilization and graded levels of service. This dissertation is focused on the control architecture, enabling technologies, and performance analysis of the WDM burst-switched long haul and Metropolitan Area Networks (MANs). Theoretical analysis and simulation results are reported to demonstrate the system performance and efficiency of proposed algorithms. A novel transmission mechanism, namely, the Forward Resource Reservation (ERR) mechanism, is proposed to reduce the end-to-end delay for an Optical Burst Switching (OBS)-based IP over WDM system. The ERR scheme adopts a Linear Predictive Filter and an aggressive reservation strategy for data burst length prediction and resource reservation, respectively, and is extended to facilitate Quality of Service (QoS) differentiation at network edges. The ERR scheme improves the real-time communication services for applications with time constraints without deleterious system costs. The aggressive strategy for channel holding time reservations is proposed. Specifically, two algorithms, the success probability-driven (SPD) and the bandwidth usage-driven (BUD) ones, are proposed for resource reservations in the FRRenabled scheme. These algorithms render explicit control on the latency reduction improvement and bandwidth usage efficiency, respectively, both of which are important figures of performance metrics. The optimization issue for the FRR-enabled system is studied based on two disciplines - addressing the static and dynamic models targeting different desired objectives (in terms of algorithm efficiency and system performance), and developing a \u27\u27crank back\u27\u27 based signaling mechanism to provide bandwidth usage efficiency. The proposed mechanisms enable the network nodes to make intelligent usage of the bandwidth resources. In addition, a new control architecture with enhanced address resolution protocol (E-ARP), burst-based transmission, and hop-based wavelength allocation is proposed for Ethernet-supported IP over WDM MANs. It is verified, via theoretical analysis and simulation results, that the E-ARP significantly reduces the call setup latency and the transmission requirements associated with the address probing procedures; the burst-based transport mechanism improves the network throughput and resource utilization; and the hop-based wavelength allocation algorithm provides bandwidth multiplexing with fairness and high scalability. The enhancement of the Ethernet services, in tandem with the innovative mechanisms in the WDM domain, facilitates a flexible and efficient integration, thus making the new generation optical MAN optimized for the scalable, survivable, and IP-dominated network at gigabit speed possible

    An HMM-based Comparative Genomic Framework for Detecting Introgression in Eukaryotes

    Full text link
    One outcome of interspecific hybridization and subsequent effects of evolutionary forces is introgression, which is the integration of genetic material from one species into the genome of an individual in another species. The evolution of several groups of eukaryotic species has involved hybridization, and cases of adaptation through introgression have been already established. In this work, we report on a new comparative genomic framework for detecting introgression in genomes, called PhyloNet-HMM, which combines phylogenetic networks, that capture reticulate evolutionary relationships among genomes, with hidden Markov models (HMMs), that capture dependencies within genomes. A novel aspect of our work is that it also accounts for incomplete lineage sorting and dependence across loci. Application of our model to variation data from chromosome 7 in the mouse (Mus musculus domesticus) genome detects a recently reported adaptive introgression event involving the rodent poison resistance gene Vkorc1, in addition to other newly detected introgression regions. Based on our analysis, it is estimated that about 12% of all sites withinchromosome 7 are of introgressive origin (these cover about 18 Mbp of chromosome 7, and over 300 genes). Further, our model detects no introgression in two negative control data sets. Our work provides a powerful framework for systematic analysis of introgression while simultaneously accounting for dependence across sites, point mutations, recombination, and ancestral polymorphism

    Research on China's Population Structure in the New Situation

    Get PDF
    To analyze the impact of the “two-child policy” on the population size and structure, first of all, the birth rate, the ratio of men and women, and the ratio of urban and rural population are used as indicators. Before and after the dispersion, then establish a PDE model, and compare it with the population predicted by the gray forecast to analyze the mitigation of the ageing of the second child policy; continue to analyze the impact of changes in the population structure on the national economy, and select the male and female ratio and the labor population The urban-rural population ratio is used as an index to establish a multiple regression equation for analysis, and a related regression equation is obtained. Finally, the future marriage problem is analyzed, considering only the difference in the number of men and women entering the marriageable period at the same time. The difference in the number of marriageable populations is analyzed through the difference in the number of men and women born at birth, focusing on a dynamic perspective

    Angiolymphoid hyperplasia involving large arteries

    Get PDF
    Angiolymphoid hyperplasia with eosinophilia (ALHE) is a rare vascular proliferative disorder, which most commonly involves the skin of the head and neck regions. Noncutaneous localization of this pathology is unusual, and its primary localization in large arteries presenting as a pulsatile mass is extremely rare. We report here two cases of ALHE manifested as masses of the occipital and brachial artery. ALHE should be considered in the differential diagnosis of localized peripheral arterial masses in young patients

    Decentralized Multi-Armed Bandit Can Outperform Classic Upper Confidence Bound

    Full text link
    This paper studies a decentralized multi-armed bandit problem in a multi-agent network. The problem is simultaneously solved by N agents assuming they face a common set of M arms and share the same mean of each arm's reward. Each agent can receive information only from its neighbors, where the neighbor relations among the agents are described by a directed graph whose vertices represent agents and whose directed edges depict neighbor relations. A fully decentralized multi-armed bandit algorithm is proposed for each agent, which twists the classic consensus algorithm and upper confidence bound (UCB) algorithm. It is shown that the algorithm guarantees each agent to achieve a better logarithmic asymptotic regret than the classic UCB provided the neighbor graph is strongly connected. The regret can be further improved if the neighbor graph is undirected

    Adaptive Testing for Connected and Automated Vehicles with Sparse Control Variates in Overtaking Scenarios

    Full text link
    Testing and evaluation is a critical step in the development and deployment of connected and automated vehicles (CAVs). Due to the black-box property and various types of CAVs, how to test and evaluate CAVs adaptively remains a major challenge. Many approaches have been proposed to adaptively generate testing scenarios during the testing process. However, most existing approaches cannot be applied to complex scenarios, where the variables needed to define such scenarios are high dimensional. Towards filling this gap, the adaptive testing with sparse control variates method is proposed in this paper. Instead of adaptively generating testing scenarios, our approach evaluates CAVs' performances by adaptively utilizing the testing results. Specifically, each testing result is adjusted using multiple linear regression techniques based on control variates. As the regression coefficients can be adaptively optimized for the CAV under test, using the adjusted results can reduce the estimation variance, compared with using the testing results directly. To overcome the high dimensionality challenge, sparse control variates are utilized only for the critical variables of testing scenarios. To validate the proposed method, the high-dimensional overtaking scenarios are investigated, and the results demonstrate that our approach can further accelerate the evaluation process by about 30 times

    Robot Motion Planning Method Based on Incremental High-Dimensional Mixture Probabilistic Model

    Get PDF
    The sampling-based motion planner is the mainstream method to solve the motion planning problem in high-dimensional space. In the process of exploring robot configuration space, this type of algorithm needs to perform collision query on a large number of samples, which greatly limits their planning efficiency. Therefore, this paper uses machine learning methods to establish a probabilistic model of the obstacle region in configuration space by learning a large number of labeled samples. Based on this, the high-dimensional samples' rapid collision query is realized. The influence of number of Gaussian components on the fitting accuracy is analyzed in detail, and a self-adaptive model training method based on Greedy expectation-maximization (EM) algorithm is proposed. At the same time, this method has the capability of online updating and can eliminate model fitting errors due to environmental changes. Finally, the model is combined with a variety of sampling-based motion planners and is validated in multiple sets of simulations and real world experiments. The results show that, compared with traditional methods, the proposed method has significantly improved the planning efficiency

    Fault slippage and its permeability evolution during supercritical CO2 fracturing in layered formation

    Get PDF
    International audienceUnderstanding the hydromechanical responses of faults during supercritical CO2 fracturing is important for reservoir management and the design of energy extraction systems. As small faults are widespread in Chang 7 member of the Yanchang Formation, Ordos Basin, China, supercritical CO2 fracturing operation has the potential to reactive these undetected small faults and leads to unfavorable fracking fluid migrate. In this work, we examined the role of fault slippage and permeability evolution along a small fault connecting the pay zone and the confining formation during the whole process of fracturing and production. A coupled hydromechanical model conceptualized from actual engineering results was introduced to address the main concerns of this work, including, (1) whether the existence of a undetected small fault would effectively constrain the hydraulic fracture height evolution, (2) what the magnitude of the induced microseismic events would be and (3) whether the permeability change along the fault plane would affect the vertical conductivity of the confining formation and thus increase the risk for the fracturing fluid to leak. Our results have shown that the initial hydrofracture formed at the perforation and propagated upward, once it merged with the fault surface, the existence of an undetected small fault would effectively constrain the hydraulic fracture height evolution. As fracturing continued, further slippage spread from the permeability increase zone of high permeability to shallower levels, and the extent of this zone was dependent on the magnitude of the fault slippage. At the end of extraction, the slip velocity decreases gradually to zero and the fault slippage finally reaches stabilization. In general, undetected small faults in targeted reservoir may not be the source of large earthquakes. The induced microseismic events could be considered as the sources of acoustic emission events detected while monitoring the fracturing fluid front. Due to the limited fault slippage and lower initial permeability, the CO2 fracturing operation near undetected small faults could not conduct preferential pathway for upward CO2 leakage or contaminate overlying shallower potable aquifers

    Integrated Sensing and Communication for Network-Assisted Full-Duplex Cell-Free Distributed Massive MIMO Systems

    Full text link
    In this paper, we combine the network-assisted full-duplex (NAFD) technology and distributed radar sensing to implement integrated sensing and communication (ISAC). The ISAC system features both uplink and downlink remote radio units (RRUs) equipped with communication and sensing capabilities. We evaluate the communication and sensing performance of the system using the sum communication rates and the Cramer-Rao lower bound (CRLB), respectively. We compare the performance of the proposed scheme with other ISAC schemes, the result shows that the proposed scheme can provide more stable sensing and better communication performance. Furthermore, we propose two power allocation algorithms to optimize the communication and sensing performance jointly. One algorithm is based on the deep Q-network (DQN) and the other one is based on the non-dominated sorting genetic algorithm II (NSGA-II). The proposed algorithms provide more feasible solutions and achieve better system performance than the equal power allocation algorithm.Comment: 14 pages, 7 figures,submit to China Communication February 28, 2023, date of major revision July 09, 202
    corecore