Stackelberg games-based distributed algorithm of transmission rate match in end-to-end communication

Author(s):  
Pengfei Cui ◽  
Jinhe Zhou ◽  
Jurong Wang
Author(s):  
Yahya M. Tashtoush ◽  
Mohammad A. Alsmirat ◽  
Tasneem Alghadi

Purpose The purpose of this paper is to propose, a new multi-path routing protocol that distributes packets over the available paths between a sender and a receiver in a multi-hop ad hoc network. We call this protocol Geometric Sequence Based Multipath Routing Protocol (GMRP). Design/methodology/approach GMRP distributes packets according to the geometric sequence. GMRP is evaluated using GloMoSim simulator. The authors use packet delivery ratio and end-to-end delay as the comparison performance metrics. They also vary many network configuration parameters such as number of nodes, transmission rate, mobility speed and network area. Findings The simulation results show that GMRP reduces the average end-to-end delay by up to 49 per cent and increases the delivery ratio by up to 8 per cent. Originality/value This study is the first to propose to use of geometric sequence in the multipath routing approach.


2014 ◽  
Vol 668-669 ◽  
pp. 1355-1358
Author(s):  
Feng Liu ◽  
Yu Fei Wang ◽  
Mu Lin

In order to prolong the lifetime of WSNs, low-duty-cycled scheduling is a widely used strategy. However, there exists high latency with traditional routing algorithms. In this paper, we model the data collection scheme of WSNs to be a delay optimization problem and propose a distributed algorithm based on Network Utility Maximization. The proposed algorithm can distributed find an optimal routing to achieve minimal average end-to-end delay. The simulation results show that our algorithm performs better than the traditional shortest path algorithm on end-to-end delay with less control message.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Narun Asvarujanon ◽  
Kenji Leibnitz ◽  
Naoki Wakamiya ◽  
Masayuki Murata

The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account.


Author(s):  
P. Hagemann

The use of computers in the analytical electron microscopy today shows three different trends (1) automated image analysis with dedicated computer systems, (2) instrument control by microprocessors and (3) data acquisition and processing e.g. X-ray or EEL Spectroscopy.While image analysis in the T.E.M. usually needs a television chain to get a sequential transmission suitable as computer input, the STEM system already has this necessary facility. For the EM400T-STEM system therefore an interface was developed, that allows external control of the beam deflection in TEM as well as the control of the STEM probe and video signal/beam brightness on the STEM screen.The interface sends and receives analogue signals so that the transmission rate is determined by the convertors in the actual computer periphery.


VASA ◽  
2016 ◽  
Vol 45 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Jan Paweł Skóra ◽  
Jacek Kurcz ◽  
Krzysztof Korta ◽  
Przemysław Szyber ◽  
Tadeusz Andrzej Dorobisz ◽  
...  

Abstract. Background: We present the methods and results of the surgical management of extracranial carotid artery aneurysms (ECCA). Postoperative complications including early and late neurological events were analysed. Correlation between reconstruction techniques and morphology of ECCA was assessed in this retrospective study. Patients and methods: In total, 32 reconstructions of ECCA were performed in 31 symptomatic patients with a mean age of 59.2 (range 33 - 84) years. The causes of ECCA were divided among atherosclerosis (n = 25; 78.1 %), previous carotid endarterectomy with Dacron patch (n = 4; 12.5 %), iatrogenic injury (n = 2; 6.3 %) and infection (n = 1; 3.1 %). In 23 cases, intervention consisted of carotid bypass. Aneurysmectomy with end-to-end suture was performed in 4 cases. Aneurysmal resection with patching was done in 2 cases and aneurysmorrhaphy without patching in another 2 cases. In 1 case, ligature of the internal carotid artery (ICA) was required. Results: Technical success defined as the preservation of ICA patency was achieved in 31 cases (96.9 %). There was one perioperative death due to major stroke (3.1 %). Two cases of minor stroke occurred in the 30-day observation period (6.3 %). Three patients had a transient hypoglossal nerve palsy that subsided spontaneously (9.4 %). At a mean long-term follow-up of 68 months, there were no major or minor ipsilateral strokes or surgery-related deaths reported. In all 30 surviving patients (96.9 %), long-term clinical outcomes were free from ipsilateral neurological symptoms. Conclusions: Open surgery is a relatively safe method in the therapy of ECCA. Surgical repair of ECCAs can be associated with an acceptable major stroke rate and moderate minor stroke rate. Complication-free long-term outcomes can be achieved in as many as 96.9 % of patients. Aneurysmectomy with end-to-end anastomosis or bypass surgery can be implemented during open repair of ECCA.


Author(s):  
Ahmed Mousa ◽  
Ossama M. Zakaria ◽  
Mai A. Elkalla ◽  
Lotfy A. Abdelsattar ◽  
Hamad Al-Game'a

AbstractThis study was aimed to evaluate different management modalities for peripheral vascular trauma in children, with the aid of the Mangled Extremity Severity Score (MESS). A single-center retrospective analysis took place between 2010 and 2017 at University Hospitals, having emergencies and critical care centers. Different types of vascular repair were adopted by skillful vascular experts and highly trained pediatric surgeons. Patients were divided into three different age groups. Group I included those children between 5 and 10 years; group II involved pediatrics between 11 and 15 years; while children between 16 and 21 years participated in group III. We recruited 183 children with peripheral vascular injuries. They were 87% males and 13% females, with the mean age of 14.72 ± 04. Arteriorrhaphy was performed in 32%; end-to-end anastomosis and natural vein graft were adopted in 40.5 and 49%, respectively. On the other hand, 10.5% underwent bypass surgery. The age groups I and II are highly susceptible to penetrating trauma (p = 0.001), while patients with an extreme age (i.e., group III) are more susceptible to blunt injury (p = 0.001). The MESS has a significant correlation to both age groups I and II (p = 0.001). Vein patch angioplasty and end-to-end primary repair should be adopted as the main treatment options for the repair of extremity vascular injuries in children. Moreover, other treatment modalities, such as repair with autologous vein graft/bypass surgery, may be adopted whenever possible. They are cost-effective, reliable, and simple techniques with fewer postoperative complication, especially in poor/limited resources.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


Sign in / Sign up

Export Citation Format

Share Document