Bandwidth sensing errors in network systems: A case study of video rate adaptation

Author(s):  
Kaliappa Ravindran ◽  
Xiliang Liu
2021 ◽  
Vol 13 (8) ◽  
pp. 1564
Author(s):  
Pietro Miele ◽  
Mariano Di Di Napoli ◽  
Luigi Guerriero ◽  
Massimo Ramondini ◽  
Chester Sellers ◽  
...  

In most countries, landslides have caused severe socioeconomic impacts on people, cities, industrial establishments, and lifelines, such as highways, railways, and communication network systems. Socioeconomic losses due to slope failures are very high and they have been growing as the built environment expands into unstable hillside areas under the pressures of growing populations. Human activities as the construction of buildings, transportation routes, dams, and artificial canals have often been a major factor for the increasing damage due to slope failures. When recovery actions are not durable from an economic point of view, increasing the population’s awareness is the key strategy to reduce the effects of natural and anthropogenic events. Starting from the case study of the Pan-American Highway (the Ecuadorian part), this article shows a multi-approach strategy for infrastructure monitoring. The combined use of (i) DInSAR technique for detection of slow ground deformations, (ii) field survey activities, and (iii) the QPROTO tool for analysis of slopes potentially prone to collapse allowed us to obtain a first cognitive map to better characterize 22 km of the highway between the cities of Cuenca and Azogues. This study is the primary step in the development of a landslide awareness perspective to manage risk related to landslides along infrastructure corridors, increasing user safety and providing stakeholders with a management system to plan the most urgent interventions and to ensure the correct functionality of the infrastructure.


10.5772/10692 ◽  
2011 ◽  
Vol 3 ◽  
pp. 21 ◽  
Author(s):  
Philip Chan ◽  
David Nowicki ◽  
Hong Man ◽  
Mo Mansouri
Keyword(s):  

2013 ◽  
pp. 1166-1188
Author(s):  
Qiang Yan ◽  
Yingjiu Li ◽  
Robert H. Deng

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.


Author(s):  
Jiaxin Wu ◽  
Pingfeng Wang

Abstract With the growth of complexity and extent, large scale interconnected network systems, e.g., transportation networks or infrastructure networks, become more vulnerable towards external disturbances. Hence, managing potential disruptive events during design, operating, and recovery phase of an engineered system therefore improving the system’s resilience is an important yet challenging task. In order to ensure system resilience after the occurrence of failure events, this study proposes a mixed integer linear programming (MILP) based restoration framework using heterogenous dispatchable agents. Scenario based stochastic optimization (SO) technique is adopted to deal with the inherent uncertainties imposed on the recovery process from the nature. Moreover, different from conventional SO using deterministic equivalent formulations, additional risk measure is implemented for this study because of the temporal sparsity of the decision making in applications such as the recovery from extreme events. The resulting restoration framework involves with a large-scale MILP problem and thus an adequate decompaction technique, i.e., modified Langragian Relaxation, is also proposed in order to achieve tractable time complexity. Case study results based on the IEEE 37-buses test feeder demonstrate the benefits of using the proposed framework for resilience improvement as well as the advantages of adopting SO formulations.


MethodsX ◽  
2020 ◽  
Vol 7 ◽  
pp. 100948 ◽  
Author(s):  
Saeid Khalifeh ◽  
Saeid Akbarifard ◽  
Vahid Khalifeh ◽  
Ebrahim Zallaghi

Author(s):  
Qiang Yan ◽  
Yingjiu Li ◽  
Robert H. Deng

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.


2019 ◽  
Vol 11 (1) ◽  
pp. 2-13
Author(s):  
Ramon Abilio ◽  
Cristiano Mesquita Garcia ◽  
Flavio Lopes de Morais ◽  
Antônio Elizeu da Rocha Neto

In corporate environments, we can find various information systems (IS), which need to communicate to each other to share and maintain data consistency. Academic environments (AE) are even more complex than corporate environments because they have several IS to help manage different aspects, such as restaurant and library, which need to have consistent data to work properly. Therefore, it is necessary to encounter a form to develop an integration among them and share common, trustworthy data. We present a case study on SOA-based architecture for IS integration within AE to keep data consistent through the systems, to monitor the communication, and to make the integration safe and manageable. We applied the proposal, and the results show that we can integrate, monitor, and manage different software systems and network services and permissions. The main contribution is a useful integration architecture for AE that must share trustworthy data among several, heterogeneous IS and network systems. In addition, a small team can implement and maintain this proposed architecture.


Author(s):  
Karen Louise Blackmore ◽  
Evan William Henry Allitt

The delivery of simulation training capability across the Australian Defence Force (ADF) requires a highly skilled workforce. Evolving training requirements, enabled by advances in computing power, network systems, display and peripheral technologies, and software environments, place increasing demands on the size of the workforce and the technical skills they are required to possess. In this research, we analyze existing simulation role frameworks and the various position descriptions and qualification requirements associated with these roles. To further explore the unique skillsets that translate to success in simulation roles, we also conduct a case study of a large external contract simulation workforce supplier, Cubic Defence Australia. Our findings highlight the complexity of the defense simulation workforce, including the lack of standardized position descriptions, competency frameworks, education and training pathways, and career progression options. Further complicating this is the importance of prior ADF service experience to the delivery of simulation systems that meet active training requirements, and the relationship between this service experience and career progression. From this analysis, recommendations for addressing the issues are made, including a call for a targeted and deliberate, multi-industry federal response to broaden the pool of candidates looking for careers in simulation.


2021 ◽  
Vol 13 (8) ◽  
pp. 4377
Author(s):  
Wesam Salah Alaloul ◽  
Muhammad Altaf ◽  
Muhammad Ali Musarat ◽  
Muhammad Faisal Javed ◽  
Amir Mosavi

Development of the pavement network systems, which is inevitable due to the rapid economic growth, has increasingly become a topic of significant concern because of the severe environmental impacts of road expansion. For achieving the sustainable development goals (SDGs), the policies and actions towards the pavements’ life cycle assessment (LCA) and life cycle cost analysis (LCCA) must be carefully assessed. Consequently, the purpose of this review is to present an overview of LCA and LCCA used in pavement engineering and management. Through the quality control of PRISMA, fifty-five most relevant documents were extracted for a thorough investigation. The state of the art review reveals that a limited number of the papers considered environmental impacts of the pavements. Consequently, to assess the environmental impact cost, a conceptual framework was developed to better consider the LCA and LCCA on various aspects of the pavement projects including the sustainability aspects. Besides, a case study was given to validate the literature review towards proposing a novel framework for the incorporation of environmental impact cost.


Sign in / Sign up

Export Citation Format

Share Document