network transmission
Recently Published Documents


TOTAL DOCUMENTS

324
(FIVE YEARS 82)

H-INDEX

11
(FIVE YEARS 5)

Author(s):  
Jingyu Ding ◽  
Yu Liu ◽  
Xuebo Yang

This paper investigates the problem of polynomial fault detection filter design under an adaptive event-triggered scheme for continuous-time networked polynomial fuzzy model–based (PFMB) systems considering network transmission delays. The proposed adaptive polynomial event-triggered scheme is checked only at the sampling instant to eliminate the Zeno behavior as well as save the network bandwidth. With the consideration of the mismatched membership functions (MFs), the asynchronous problem between the physical plant and the polynomial fault detection filter (PFDF) is examined. A Lyapunov–Krasovskii (L-K) function is introduced to deal with the time delays caused by the network transmission and the zero-order holder (ZOH), and a proper line-integral Lyapunov function is also introduced to reduce the conservation of the design constraints, whose analytical procedure is rule-dependent. The design constraints are given in the form of sum of squares (SOS) to keep the PFMB fault detection system asymptotically stable with [Formula: see text] performance [Formula: see text]. Finally, an inverted pendulum example together with a numerical example is given to verify the effectiveness and superiority of the proposed scheme in terms of transfer rate and conservatism.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Shiping Zhu

For the purpose of resolving the phenomenon of network congestion in the process of many-to-one communication in multimedia networks at present, the optimal fitting method of nonlinear simultaneous equations (OFMNSEs) is applied to the multimedia transmission congestion control system in this paper. The rate control and resource scheduling are effectively combined, and a clustering network structure is used to activate the congestion control method in turn based on the cluster header and intracluster-related indexes. Finally, it can be known through the analysis of the simulation results that the OFMNSE algorithm put forward in this paper can improve the congestion issue of the multimedia network transmission process and reduce the packet loss rate of data during the transmission effectively under the condition of different relative cache sizes compared with the conventional algorithm.


2021 ◽  
Vol 26 (6) ◽  
pp. 473-480
Author(s):  
Gangqiang LI ◽  
Yu LIU ◽  
Lili ZHANG ◽  
Chunhong LI ◽  
Wei ZHANG

The traditional distributed tactical training simulation system is limited by the availability and bandwidth of military network transmission channel and does not have the feasibility of remote interconnection and spatial sub-regional deployment. In this paper, a new communication method of distributed tactical training simulation system is proposed to solve the problem of strong business coupling between nodes and system availability under the condition of low bandwidth. The operator of federated exchange, federated queue and their concepts and design requirements are firstly proposed, and the inverted tree, triangle, ring exchange topology and circular queue structure are further constructed. Theoretically, the expected goal of high-speed interworking between nodes in the cluster and high reliable transmission between clusters is realized. The example also shows that this method can significantly improve the throughput of single switching node and federated node after using reliability confirmation mechanism.


2021 ◽  
Author(s):  
Ligia V Barrozo ◽  
Christopher Small

Background: Describing and understanding the process of diffusion can allow local managers better plan emergence scenarios. Thus, the main aim of this study was to describe and unveil the spatiotemporal patterns of diffusion of the COVID-19 in Brazil from February 2020 until April 2021. Methods: This is a retrospective purely observational ecologic study including all notified cases and deaths. We used satellite-derived night light imagery and spatiotemporal Empirical Orthogonal Function analysis to quantify the spatial network structure of lighted development and the spatiotemporal transmission of the pathogen through the network. Results: The more populous state capitals within the largest network components presented higher frequency of deaths and earlier onset compared to the increasing numbers of smaller, less populous municipalities trending toward lower frequency of deaths and later onset. By week 48 2020, the full network was almost completely affected. Cases and deaths showed a distinct second wave of wider geographic expansion beginning in early November 2020. Conclusions: The spatiotemporal diffusion in Brazil was characterized by an intertwined process of overseas relocation, hierarchical network transmission and contagious effects. A rapid response as the immediate control of all ports, airports and borders combined with mandatory quarantine are critical to retard disease diffusion.


Author(s):  
Nahla Aljojo

<p>This paper examined the impact of a network attack on a congested transmission session. The research is motivated by the fact that the previous research community has neglected to evaluate security issues related to network congestion environments, and has instead concentrated on resolving congestion issues only. At any point in time, attackers can take advantage of the congestion problem, exploit the attack surface, and inject attack vectors. In order to circumvent this issue, a machine learning algorithm is trained to correlate attack vectors from the attack surface in a network congestion signals environment with the value of decisions over time in order to maximise expected attack vectors from the attack surface. Experimental scenario that dwell on transmission rate overwhelming transmission session, resulting in a standing queue was used. The experiment produced a dataset in which a TCP transmission through bursting transmission were capture. The data was acquired using a variety of experimental scenarios. Nave Bayes, and K-Nearest Neighbours prediction analyses demonstrate strong prediction performance. As a result, this study re-establishes the association between attack surface and vectors with network attack prediction.    </p>


2021 ◽  
Vol 2083 (4) ◽  
pp. 042045
Author(s):  
Shichuang Zheng ◽  
Jiajun Li ◽  
Shuai Chen ◽  
Yujia Liang ◽  
Jiangtao Lin

Abstract Traditional detection method of data breakpoint in computer communication network has some disadvantages, such as time consuming, etc. Firstly, the data of computer transmission breakpoints are stored based on cloud framework, and the density distribution characteristics of the region are extracted according to the breakpoint data. Then the optimal data breakpoint detection path is selected. Finally, the similarity of each data breakpoint is detected by the computer, so that the detection of data breakpoints is realized by computer. After experiments, the data breakpoint detection is realized, the results show that the designed method can detect data breakpoints accurately, which is time-saving and has a certain significance of popularization.


2021 ◽  
Vol 2074 (1) ◽  
pp. 012031
Author(s):  
Hong Lv ◽  
Weina Huang

Abstract The use of wireless network for remote data collection can provide a fast and reliable wireless data transmission channel for those monitoring points involving a wide area and scattered equipment layout with the help of its large coverage and high communication quality. This article analyzes the characteristics and advantages of wireless networks, and then discusses the networking scheme for remote data collection using wireless networks, and analyzes the reliability of network transmission. Finally, some program fragments on the server side are given.


2021 ◽  
Vol 2093 (1) ◽  
pp. 012036
Author(s):  
Zhuomao Zhao ◽  
Yujie Yang ◽  
Xue Long ◽  
Hongwei Cui

Abstract This paper discusses the setting of transceiver based on functional programming, and decouples the differences between communication protocol and network transmission protocol from the specific business implementation. In the actual application, the service implementation is set up. When the communication protocol changes, the function can be realized only by modifying the communication protocol, which improves the readability of the program and reduces its maintenance overhead


2021 ◽  
Author(s):  
Cheng Huang ◽  
Yanwei Wang ◽  
Jiaheng Fan ◽  
Le Yang ◽  
Junkai Liu ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document