2,044 research outputs found

    A parallel genetic algorithm for the Steiner Problem in Networks

    Get PDF
    This paper presents a parallel genetic algorithm to the Steiner Problem in Networks. Several previous papers have proposed the adoption of GAs and others metaheuristics to solve the SPN demonstrating the validity of their approaches. This work differs from them for two main reasons: the dimension and the characteristics of the networks adopted in the experiments and the aim from which it has been originated. The reason that aimed this work was namely to build a comparison term for validating deterministic and computationally inexpensive algorithms which can be used in practical engineering applications, such as the multicast transmission in the Internet. On the other hand, the large dimensions of our sample networks require the adoption of a parallel implementation of the Steiner GA, which is able to deal with such large problem instances

    Active networks: an evolution of the internet

    Get PDF
    Active Networks can be seen as an evolution of the classical model of packet-switched networks. The traditional and ”passive” network model is based on a static definition of the network node behaviour. Active Networks propose an “active” model where the intermediate nodes (switches and routers) can load and execute user code contained in the data units (packets). Active Networks are a programmable network model, where bandwidth and computation are both considered shared network resources. This approach opens up new interesting research fields. This paper gives a short introduction of Active Networks, discusses the advantages they introduce and presents the research advances in this field

    A fuzzy approach for the network congestion problem

    Get PDF
    In the recent years, the unpredictable growth of the Internet has moreover pointed out the congestion problem, one of the problems that historicallyha ve affected the network. This paper deals with the design and the evaluation of a congestion control algorithm which adopts a FuzzyCon troller. The analogyb etween Proportional Integral (PI) regulators and Fuzzycon trollers is discussed and a method to determine the scaling factors of the Fuzzycon troller is presented. It is shown that the Fuzzycon troller outperforms the PI under traffic conditions which are different from those related to the operating point considered in the design

    Adaptive routing in active networks

    Get PDF
    New conceptual ideas on network architectures have been proposed in the recent past. Current store-andforward routers are replaced by active intermediate systems, which are able to perform computations on transient packets, in a way that results very helpful for developing and deploying new protocols in a short time. This paper introduces a new routing algorithm, based on a congestion metric, and inspired by the behavior of ants in nature. The use of the Active Networks paradigm associated with a cooperative learning environment produces a robust, decentralized algorithm capable of adapting quickly to changing conditions

    Interference and communications among active network applications

    Get PDF
    This paper focuses on active networks applications and in particular on the possible interactions among these applications. Active networking is a very promising research field which has been developed recently, and which poses several interesting challenges to network designers. A number of proposals for e±cient active network architectures are already to be found in the literature. However, how two or more active network applications may interact has not being investigated so far. In this work, we consider a number of applications that have been designed to exploit the main features of active networks and we discuss what are the main benefits that these applications may derive from them. Then, we introduce some forms of interaction including interference and communications among applications, and identify the components of an active network architecture that are needed to support these forms of interaction. We conclude by presenting a brief example of an active network application exploiting the concept of interaction

    A genetic algorithm for the design of a fuzzy controller for active queue management

    Get PDF
    Active queue management (AQM) policies are those policies of router queue management that allow for the detection of network congestion, the notification of such occurrences to the hosts on the network borders, and the adoption of a suitable control policy. This paper proposes the adoption of a fuzzy proportional integral (FPI) controller as an active queue manager for Internet routers. The analytical design of the proposed FPI controller is carried out in analogy with a proportional integral (PI) controller, which recently has been proposed for AQM. A genetic algorithm is proposed for tuning of the FPI controller parameters with respect to optimal disturbance rejection. In the paper the FPI controller design metodology is described and the results of the comparison with random early detection (RED), tail drop, and PI controller are presented

    A management architecture for active networks

    Get PDF
    In this paper we present an architecture for network and applications management, which is based on the Active Networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify nodes connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable traps. In order to take advantage of the Active Networks technology, we introduce active SNMP-like MIBs and agents, which are dynamic and programmable. The programmable management agents make tracing distributed applications a feasible task. We propose a general framework that can inter-operate with any active execution environment. In this framework, both the manager and the monitor front-ends communicate with an active node (the Active Network Access Point) through the XML language. A gateway service performs the translation of the queries from XML to an active packet language and injects the code in the network. We demonstrate the implementation of an active network gateway for PLAN (Packet Language for Active Networks) in a forty active nodes testbed. Finally, we discuss an application of the active management architecture to detect the causes of network failures by tracing network events in time

    A Methodological Approach to Determine Sound Response Modalities to Coastal Erosion Processes in Mediterranean Andalusia (Spain)

    Get PDF
    Human occupation along coastal areas has been greatly increasing in recent decades and, in many places, human activities and infrastructures are threatened by erosion processes that can produce relevant economic and human losses. In order to reduce such impacts and design sound management strategies, which can range from the "no action" to the "protection" option, coastal managers need to know the intrinsic coastal sensitivity and the potential vulnerability and value of land uses. In this paper, in a first step, coastal sensitivity was determined by calculating the following: (i) the spatial distribution at the coast of the wave forcing obtained by using the ERA5 wave dataset and defined as the energy associated with the 50-year return period storm. Two storm conditions were considered, that is, one for the eastern and one for the western parts of the Andalusia Mediterranean coast, respectively, characterized by a height of 8.64-7.86 m and 4.85-4.68 m and (ii) the existence of a buffer zone, namely the dry beach width expressed as a multiple of the 20-year predicted shoreline position that was calculated using a dataset of aerial photographs covering a time span from 1956 to 2016. Coastal sensitivity values were divided into five classes with class 1 indicating the lowest sensitivity (i.e., the presence of a wide buffer zone associated with low wave energy flux values) and class 5 the highest sensitivity (i.e., a narrow buffer zone associated with very high wave energy flux values). In a second step, land uses were obtained from the official Land Use Map of the Andalusia Region, based on the results of the "Coordination of Information on the Environment" (CORINE) European Project. Such uses were divided into five classes from class 1 including natural areas (typologies "A" and "B" of the CORINE Project) to class 5 including very capital land uses (typologies "E1" and "E2"). In a third step, information concerning coastal sensitivity and land uses was crossed to determine the best mitigation strategies to cope with erosion processes. The "no action" option was observed at the westernmost area of Cadiz Province and at some areas from the west coast of Almeria Province, where both coastal sensitivity and land use classes show low values; the "adaptation" option was recorded along more than one half of the coast studied, essentially at natural areas with high sensitivity and at urbanized areas with low sensitivity; and the "protection" option was observed especially at some areas from the center and eastern part of Malaga Province and at the easternmost areas of Almeria Province, where both coastal sensitivity and land use classes presented high values

    Hemoperitoneum following mild blunt abdominal trauma: First presentation of Crohn's disease

    Get PDF
    Introduction: Inflammatory bowel diseases are heterogeneous in their presentation. Crohn's disease (CD) has been described as an unusual cause of massive lower gastrointestinal bleeding. We present a patient with CD whose first presentation was hemoperitoneum following mild blunt abdominal trauma Case presentation: A 54-year-old woman came to the emergency room with a blunt abdominal trauma. The patient underwent an abdominal CT scan with i.v. contrast medium injection, which showed hemoperitoneum with stenotic strictures of the small bowel and active massive bleeding from ileocolic artery. The rapid anemia onset and the CT report induced us to perform blood transfusion and an emergency exploratory laparotomy. Histological examination of the resected terminal ileum revealed a Crohn's disease. Discussion: Crohn's disease has been associated with hemoperitoneum, but to date there is no exact protocol regarding treatment of massive hemorrhagic Crohn's disease, which is rare. A conservative approach with medical therapy has been suggested for initial treatment. However, if medical treatment fails or bleeding continues even with intervention, bowel resection through surgical therapy should be performed

    SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

    Get PDF
    The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP, a Secure Mobile Crowdsensing Protocol for fog-based applications that exploit lightweight encryption techniques that are particularly suited for low-power mobile edge devices. In order to assess the performance of the proposed security mechanisms, we consider as case study a distributed human activity recognition scenario in which machine learning algorithms are performed by users’ personal smart devices at the edge and fog layers. The functionalities provided by SMCP have been directly compared with two state-of-the-art security protocols. Results show that our approach allows to achieve a higher degree of security while maintaining a low computational cost
    • …
    corecore