6,501 research outputs found

    Energy-Efficient selective activation in Femtocell Networks

    Get PDF
    Provisioning the capacity of wireless networks is difficult when peak load is significantly higher than average load, for example, in public spaces like airports or train stations. Service providers can use femtocells and small cells to increase local capacity, but deploying enough femtocells to serve peak loads requires a large number of femtocells that will remain idle most of the time, which wastes a significant amount of power. To reduce the energy consumption of over-provisioned femtocell networks, we formulate a femtocell selective activation problem, which we formalize as an integer nonlinear optimization problem. Then we introduce GREENFEMTO, a distributed femtocell selective activation algorithm that deactivates idle femtocells to save power and activates them on-the-fly as the number of users increases. We prove that GREENFEMTO converges to a locally Pareto optimal solution and demonstrate its performance using extensive simulations of an LTE wireless system. Overall, we find that GREENFEMTO requires up to 55% fewer femtocells to serve a given user load, relative to an existing femtocell power-saving procedure, and comes within 15% of a globally optimal solution

    Fast network configuration in Software Defined Networking

    Get PDF
    Software Defined Networking (SDN) provides a framework to dynamically adjust and re-program the data plane with the use of flow rules. The realization of highly adaptive SDNs with the ability to respond to changing demands or recover after a network failure in a short period of time, hinges on efficient updates of flow rules. We model the time to deploy a set of flow rules by the update time at the bottleneck switch, and formulate the problem of selecting paths to minimize the deployment time under feasibility constraints as a mixed integer linear program (MILP). To reduce the computation time of determining flow rules, we propose efficient heuristics designed to approximate the minimum-deployment-time solution by relaxing the MILP or selecting the paths sequentially. Through extensive simulations we show that our algorithms outperform current, shortest path based solutions by reducing the total network configuration time up to 55% while having similar packet loss, in the considered scenarios. We also demonstrate that in a networked environment with a certain fraction of failed links, our algorithms are able to reduce the average time to reestablish disrupted flows by 40%

    Network recovery from massive failures under uncertain knowledge of damages

    Get PDF
    This paper addresses progressive network recovery under uncertain knowledge of damages. We formulate the problem as a mixed integer linear programming (MILP), and show that it is NP-Hard. We propose an iterative stochastic recovery algorithm (ISR) to recover the network in a progressive manner to satisfy the critical services. At each optimization step, we make a decision to repair a part of the network and gather more information iteratively, until critical services are completely restored. Three different algorithms are used to find a feasible set and determine which node to repair, namely, 1) an iterative shortest path algorithm (ISR-SRT), 2) an approximate branch and bound (ISR-BB) and 3) an iterative multi-commodity LP relaxation (ISR-MULT). Further, we have modified the state-of-the-Art iterative split and prune (ISP) algorithm to incorporate the uncertain failures. Our results show that ISR-BB and ISR- MULT outperform the state-of-the-Art 'progressive ISP' algorithm while we can configure our choice of trade-off between the execution time, number of repairs (cost) and the demand loss. We show that our recovery algorithm, on average, can reduce the total number of repairs by a factor of about 3 with respect to ISP, while satisfying all critical deman

    A truthful online mechanism for resource allocation in fog computing

    Get PDF
    Fog computing is a promising Internet of Things (IoT) paradigm in which data is processed near its source. Here, efficient resource allocation mechanisms are needed to assign limited fog resources to competing IoT tasks. To this end, we consider two challenges: (1) near-optimal resource allocation in a fog computing system; (2) incentivising self-interested fog users to report their tasks truthfully. To address these challenges, we develop a truthful online resource allocation mechanism called flexible online greedy. The key idea is that the mechanism only commits a certain amount of computational resources to a task when it arrives. However, when and where to allocate resources stays flexible until the completion of the task. We compare our mechanism to four benchmarks and show that it outperforms all of them in terms of social welfare by up to 10% and achieves a social welfare of about 90% of the offline optimal upper bound

    Fluid Particle Accelerations in Fully Developed Turbulence

    Full text link
    The motion of fluid particles as they are pushed along erratic trajectories by fluctuating pressure gradients is fundamental to transport and mixing in turbulence. It is essential in cloud formation and atmospheric transport, processes in stirred chemical reactors and combustion systems, and in the industrial production of nanoparticles. The perspective of particle trajectories has been used successfully to describe mixing and transport in turbulence, but issues of fundamental importance remain unresolved. One such issue is the Heisenberg-Yaglom prediction of fluid particle accelerations, based on the 1941 scaling theory of Kolmogorov (K41). Here we report acceleration measurements using a detector adapted from high-energy physics to track particles in a laboratory water flow at Reynolds numbers up to 63,000. We find that universal K41 scaling of the acceleration variance is attained at high Reynolds numbers. Our data show strong intermittency---particles are observed with accelerations of up to 1,500 times the acceleration of gravity (40 times the root mean square value). Finally, we find that accelerations manifest the anisotropy of the large scale flow at all Reynolds numbers studied.Comment: 7 pages, 4 figure

    Renal involvement in mushroom poisoning: The case of Orellanus syndrome

    Get PDF
    none8Although mushroom poisoning is a rare cause of acute renal injury, in some cases it may lead to the development of a severe and irreversible renal failure. Orellanus syndrome is the most important example of organic renal damage related to mushroom consumption. It is caused by the ingestion of orellanine, the main toxin of different types of Cortinarius mushrooms (Cortinarius speciosissimus, C. orellanus, C. orellanoides, etc.), and it is characterized by progressive clinical phases with a predominant kidney involvement, finally requiring renal replacement therapy in about 10% of cases. Renal damage is often late and associated with a histological picture of interstitial nephritis. Diagnosis is essentially clinical and no specific therapy has been shown to be effective in preventing and treating renal damage. Here, we describe the case of a patient with mixed wild mushroom poisoning, presenting the typical clinical signs and course of the Orellanus syndrome. This case offers us the opportunity to review the main clinical features of this severe and little-known intoxication.openEsposito, P; La Porta, E; Calatroni, M; Bianzina, S; Libetta, C; Gregorini, M; Rampino, T; Dal Canton, AEsposito, P; La Porta, E; Calatroni, M; Bianzina, S; Libetta, Carmelo; Gregorini, Marilena; Rampino, Teresa; DAL CANTON, Antoni

    Quantum tomography of mesoscopic superpositions of radiation states

    Get PDF
    We show the feasibility of a tomographic reconstruction of Schr\"{o}dinger cat states generated according to the scheme proposed by S. Song, C.M. Caves and B. Yurke [Phys. Rev. A 41, 5261 (1990)]. We present a technique that tolerates realistic values for quantum efficiency at photodetectors. The measurement can be achieved by a standard experimental setup.Comment: Submitted to Phys. Rev. Lett.; 4 pages including 6 ps figure

    Business and society on the transitional periphery: Comparative perspectives

    Get PDF
    This article looks at business and society on the transitional periphery from a starting point rooted in the international business literature. Many transitional periphery countries have rich natural resource endowments or prosperous diasporas, making it relatively easy to attract inward FDI, chronic institutional weaknesses and policy failures notwithstanding. At the same time, such windfalls may dilute incentives for institution building or reform. We review trends emerging from the most recent scholarly work in the area, and highlight potential research agendas for the future

    Do cancer cells undergo phenotypic switching? The case for imperfect cancer stem cell markers

    Get PDF
    The identification of cancer stem cells in vivo and in vitro relies on specific surface markers that should allow to sort cancer cells in phenotypically distinct subpopulations. Experiments report that sorted cancer cell populations after some time tend to express again all the original markers, leading to the hypothesis of phenotypic switching, according to which cancer cells can transform stochastically into cancer stem cells. Here we explore an alternative explanation based on the hypothesis that markers are not perfect and are thus unable to identify all cancer stem cells. Our analysis is based on a mathematical model for cancer cell proliferation that takes into account phenotypic switching, imperfect markers and error in the sorting process. Our conclusion is that the observation of reversible expression of surface markers after sorting does not provide sufficient evidence in support of phenotypic switching
    • …
    corecore