DIMENSIONING TOKEN BUCKET POLICERS FOR VARIOUS VOICEOVER IP APPLICATIONS USING REAL-SCENARIO MEASUREMENTS

Author(s):  
S. Sharafeddine ◽  
A. Riedl
Keyword(s):  
Smart Cities ◽  
2021 ◽  
Vol 4 (3) ◽  
pp. 1058-1086
Author(s):  
Franklin Oliveira ◽  
Daniel G. Costa ◽  
Luciana Lima ◽  
Ivanovitch Silva

The fast transformation of the urban centers, pushed by the impacts of climatic changes and the dramatic events of the COVID-19 Pandemic, will profoundly influence our daily mobility. This resulted scenario is expected to favor adopting cleaner and flexible modal solutions centered on bicycles and scooters, especially as last-mile options. However, as the use of bicycles has rapidly increased, cyclists have been subject to adverse conditions that may affect their health and safety when cycling in urban areas. Therefore, whereas cities should implement mechanisms to monitor and evaluate adverse conditions in cycling paths, cyclists should have some effective mechanism to visualize the indirect quality of cycling paths, eventually supporting choosing more appropriate routes. Therefore, this article proposes a comprehensive multi-parameter system based on multiple independent subsystems, covering all phases of data collecting, formatting, transmission, and processing related to the monitoring, evaluating, and visualizing the quality of cycling paths in the perspective of adverse conditions that affect cyclist. The formal interactions of all modules are carefully described, as well as implementation and deployment details. Additionally, a case study is considered for a large city in Brazil, demonstrating how the proposed system can be adopted in a real scenario.


Aerospace ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 113
Author(s):  
Pedro Andrade ◽  
Catarina Silva ◽  
Bernardete Ribeiro ◽  
Bruno F. Santos

This paper presents a Reinforcement Learning (RL) approach to optimize the long-term scheduling of maintenance for an aircraft fleet. The problem considers fleet status, maintenance capacity, and other maintenance constraints to schedule hangar checks for a specified time horizon. The checks are scheduled within an interval, and the goal is to, schedule them as close as possible to their due date. In doing so, the number of checks is reduced, and the fleet availability increases. A Deep Q-learning algorithm is used to optimize the scheduling policy. The model is validated in a real scenario using maintenance data from 45 aircraft. The maintenance plan that is generated with our approach is compared with a previous study, which presented a Dynamic Programming (DP) based approach and airline estimations for the same period. The results show a reduction in the number of checks scheduled, which indicates the potential of RL in solving this problem. The adaptability of RL is also tested by introducing small disturbances in the initial conditions. After training the model with these simulated scenarios, the results show the robustness of the RL approach and its ability to generate efficient maintenance plans in only a few seconds.


2002 ◽  
Vol 15 (10) ◽  
pp. 851-866 ◽  
Author(s):  
Rosario G. Garroppo ◽  
Stefano Giordano ◽  
Michele Pagano
Keyword(s):  

2011 ◽  
Vol 15 (4) ◽  
pp. 391-400 ◽  
Author(s):  
Sahar Ghazal ◽  
Jalel Ben Othman ◽  
Jean-Pierre Claudé

Author(s):  
Linjun Yu ◽  
Huali Ai ◽  
Dong-Oun Choi

Named data networking (NDN) is a typical representation and implementation of information-centric networking and serves as a basis for the next-generation Internet. However, any network architectures will face information security threats. An attack named interest flooding attack (IFA), which is evolved, has becomes a great threat for NDN in recent years. Attackers through insert numerous forged interest packets into an NDN network, making the cache memory of NDN router(s) overrun, interest packets for the intended users. To take a comprehensive understanding of recent IFA detection and mitigation approaches, in this paper, we compared nine typical approaches to resolving IFA attacks for NDN, which are interest traceback, token bucket with per interface fairness, satisfaction-based interest acceptance, satisfaction-based push back, disabling PIT exhaustion, interest flow control method based on user reputation and content name prefixes, interest flow balancing method focused on the number of requests on named data networking, cryptographic route token, Poseidon local, and Poseidon distributed techniques. In addition, we conducted a simulation using Poseidon, a commonly used IFA resolution approach. The results showed that Poseidon could resolve IFA issues effectively.


Sign in / Sign up

Export Citation Format

Share Document