Showing 321 - 340 results of 1,667 for search '"scalability"', query time: 0.06s Refine Results
  1. 321

    Research on SDN deployment practice for WAN egress traffic scheduling by Guochun LI, Rui MA, Jichun MA, Bozhong Li, Huiming LIU, Guiyu ZHANG

    Published 2020-10-01
    “…In order to solve the traffic scheduling problem of the WAN exit part,a traffic scheduling optimization method based on SR Policy/EPE was proposed,which simulated and implemented an Internet egress traffic scheduling scheme on the carrier network.The proposed method that can effectively control the flow of business traffic to achieve end-to-end traffic distribution and flexible scheduling of network-wide traffic.Under the premise of ensuring user experience,it effectively improved the utilization of backbone links,optimized the overall network structure,and greatly improved increased network scalability.Apply SR performance measurement function to various performance indicators,and choose the optimal or suboptimal link to solve the WAN exit congestion problem,which proves the feasibility of this solution.…”
    Get full text
    Article
  2. 322

    SOCIAL ENTREPRENEURSHIP: DEFINING THE CONCEPT AND KEY COMPONENTS by VĂDUVA CONSTANTIN-DANIEL

    Published 2024-12-01
    “…This paper examines the definition and essential components of social entrepreneurship, which include a social mission, innovation, financial sustainability, and scalability. To this ends, the author employed a qualitative research method. …”
    Get full text
    Article
  3. 323

    DL-assisted programmable multilayer network application awareness system for IP-over-EON by Zuqing ZHU, Jiawei KONG, Bin NIU, Shaofei TANG, Hongqiang FANG, Siqi LIU

    Published 2019-11-01
    “…In order to realize real-time and fine-granularity network monitoring and adjustment,and satisfy the specific QoS demands of various applications,a deep learning (DL) assisted programmable multilayer network application performance awareness system for IP-over-EON was proposed.The distributed network monitoring based on network application performance awareness was combined with centralized network management.The multilayer and fine-grained network monitoring was implemented by distributed network monitoring,and the data analysis through DL was performed.Experimental results indicate that by combining distributed and centralized processing seamlessly,the proposed network monitoring system can not only realize timely and automatic network control and management but also provide superior scalability.…”
    Get full text
    Article
  4. 324

    Internet design concepts and network 5.0 technologies by Lintao JIANG, Xiuying NIE, Jie ZHANG

    Published 2021-10-01
    “…The internet has been developed for more than 50 years, but its design concept has never changed.The business network is completely OTT, IP network is still “best effort”, which restricts the development of the internet.In order to continuously meet the needs of social development, the internet design idea needs to be changed, and the feasible direction is to be from “application-centered” to the “network-centered”.Network 5.0 is the fifth generation of data network, compared with the fourth generation of data network (IP network), it retains all the advantages of IP network, filling the absence of IP network in network performance and ability, with qualitative progress in performance and ability.The key technical issues on scalability, endogenous credible security, certainty and more aspects of network 5.0 were specifically discussed.…”
    Get full text
    Article
  5. 325

    A Pressure-Stabilized Lagrange-Galerkin Method in a Parallel Domain Decomposition System by Qinghe Yao, Qingyong Zhu

    Published 2013-01-01
    “…The methodology shows good parallel efficiency and high numerical scalability, and the new solver is validated by comparing with exact solutions and available benchmark results. …”
    Get full text
    Article
  6. 326

    Blockchain-based service publishing scheme with recommendation for cold start users by Xuewen DONG, Haozhe LIU, Hui QIAO, Jiawei ZHENG

    Published 2021-01-01
    “…In order to solve the problem that the existing publishing systems were vulnerable to tampering, and it was difficult to recommend service information to “cold start” users, a blockchain-based service publishing scheme that supported cold-start user recommendations was proposed.The latent feature mapping model of a single auxiliary domain was extended to two auxiliary domains to make more accurate recommendations for cold start users in the target domain.In addition, the microservice architecture and block technology were combined to ensure system scalability, reliability and security.The experimental results of three real data sets extracted from Amazon transaction data show that the proposed recommendation model is better than most other recommendation methods, and the service release information can be safely stored in the blockchain to ensure that it is not changed.…”
    Get full text
    Article
  7. 327

    Spatial channel modeling for MIMO underwater wireless optical links by Xiaoqian LIU, Xinke TANG, Yuhan DONG

    Published 2023-05-01
    “…Underwater wireless optical communication (UWOC) has been widely used in the construction of underwater communication network for the advantages of high data rates, small latency, high flexibility and scalability.However, due to the absorption and scattering effects of seawater, the spatial characteristics of UWOC links have not been studied extensively, especially in multiple-input multiple-output (MIMO) scenario.A linear array MIMO UWOC link geometry was considered and a weighted exponential function polynomial (WEFP) model was proposed to characterize the photon irradiance distribution at the receiving plane of general MIMO UWOC links with arbitrary numbers of light sources.Numerical results suggest that the proposed WEFP model fits well with the results of Monte Carlo simulations in turbid water environment.…”
    Get full text
    Article
  8. 328

    Survey on cluster-based routing protocols for cognitive radio sensor networks by Jihong WANG, Wenxiao SHI

    Published 2018-11-01
    “…Routing protocols could achieve efficient convergecast transmission of sensed data in cognitive radio sensor network (CRSN),and it is of vital importance for the whole network performance.In particular,cluster-based routing protocols could further lower routing selection complexity and improve scalability.Therefore,an overview of cluster-based routing protocols for CRSN was provided.Firstly,after a brief introduction to the concept and advantages of clustering in CRSN,the major factors concerning clustering algorithm design were pointed out.Secondly,the challenges faced by routing protocol design in CRSN and basic design principles were explored.Thirdly,the previous work of cluster-based routing protocols for CRSN was systematically analyzed and summarized.Finally,issues that require urgent solutions and future research directions were suggested.…”
    Get full text
    Article
  9. 329

    BiRch:a bidirectional search algorithm for k-step reachability queries by Jun-feng ZHOU, Wei CHEN, Chun-ping FEI, Zi-yang CHEN

    Published 2015-08-01
    “…A new bidirectional processing algorithm,namely BiRch was proposed.When checking whether a vertex u can reach v within k steps,BiRch firstly compared the out-degree of u and the in-degree of v,and processed the one with smaller degree,such that to avoid large indexes and the inefficiency due to large degree.Two pruning strategies were proposed based on bidirectional breadth-first levels and bidirectional topological levels,such that to reduce the number of visited vertexes.Experimental results on 19 real datasets verify the efficiency of the proposed method in terms of different metrics,including indexing time,index size,query processing time,the number of visited vertexes,and scalability.…”
    Get full text
    Article
  10. 330

    Ant based approach to the optimal deployment in wireless sensor networks by LIU Wei1, CUI Li1

    Published 2009-01-01
    “…Targeting to solve the scalability problem when use initial ant based approach to apply to sensor node deployment, the greedy scheme, additional pheromone evaporation methods were used. …”
    Get full text
    Article
  11. 331

    Networked Electronic Equipments Using the IEEE 1451 Standard—VisioWay: A Case Study in the ITS Area by F. Barrero, S. L. Toral, M. Vargas, J. Becerra

    Published 2012-04-01
    “…The smart transducer concept, on the other hand, has been established by the IEEE 1451 standard to simplify the scalability of networked electronic equipments. The synergy of both concepts will establish a new paradigm in the near future of the ITS area. …”
    Get full text
    Article
  12. 332

    Application oriented cross-layer multi-channel MAC protocol for VANET by Cai-xia SONG, Guo-zhen TAN, Nan DING, Jun-ling BU, Fu-xin ZHANG, Ming-jian LIU

    Published 2016-05-01
    “…An application oriented cross-layer multi-channel(AOCM)MAC protocol was proposed for VANET.The AOCM protocol could derive the optimal control channel(CCH)interval to ensure the timely and reliable transmission of safety messages on the CCH,based on real-time statistics and prediction for different types of sages coming from upper application layer.In the service channels(SCH),the proposed protocol relies on a reservation mechanism for con-tention-free transmission,so as to improve the throughput of SCH.The proposed protocol was suitable for both saturation and unsaturation conditions,and has low computational complexity and high scalability.Extensive simulation results demonstrate the superiority of the AOCM protocol compared with other existing protocols.…”
    Get full text
    Article
  13. 333

    New self-organized task scheduling topology structure in p2p computing——K+tree by CHEN Hong-wei1, WANG Ru-chuan1

    Published 2005-01-01
    “…K+ tree had high reliability and scalability, and it can lower the average running time of tasks effectively in certain conditions via analysis and simulation.…”
    Get full text
    Article
  14. 334

    Research on inter-blockchain service framework and communication mechanism based on smart service transaction by Bohan KANG, Ning ZHANG, Jianming ZHU

    Published 2021-06-01
    “…Due to the lack of communication mechanism between inter-blockchain services, it is difficult to formulate effective interconnection between different blockchain.Under the smart services ecosystem, two parties of the transaction not only execute the single transaction of data assets, but also extend the scope of their services to cover a wider range of digital assets transfer scenarios.An inter-blockchain communication(IBC) framework for smart service transaction is designed.With component-based and modular design, it makes flexible for the subject and object application of smart service transaction to access IBC framework and thus promote inter-blockchain scalability.Finally, a three-phrase inter-blockchain communication protocol for smart service transaction is proposed to ensure the atomicity and consistency of inter-blockchain ecosystem.…”
    Get full text
    Article
  15. 335

    RBFT: a new Byzantine fault-tolerant consensus mechanism based on Raft cluster by Dongyan HUANG, Lang LI, Bin CHEN, Bo WANG

    Published 2021-03-01
    “…The existing consensus mechanisms of consortium blockchain are not scalable enough to provide low latency, high throughput and security while supporting large-scale network.A new consensus mechanism called RBFT was proposed to improve scalability, which was a two-level consensus mechanism with supervised nodes based on the idea of network fragmentation.In RBFT, the nodes were firstly divided into several groups.Each group adopted the improved Raft mechanism to reach consensus and select leader.Then, the leaders of each group formed the network committee, and the network committee adopted PBFT mechanism for consensus.Comparative experiments verify that RBFT can tolerant Byzantine fault while ensuring high consensus efficiency in large-scale network compared with PBFT and Raft.…”
    Get full text
    Article
  16. 336

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…Experimental results show that this method performs good efficiency and scalability.…”
    Get full text
    Article
  17. 337

    Distributed network management system with load balancing by SUN Yan-tao1, YANG Fang-nan1, SHI Zhi-qiang3

    Published 2009-01-01
    “…Based on the latest researches on physical topology, a distributed network management system named D-CBNMS with load balancing was proposed.Firstly, the system had very good scalability to extend the management scale by dynamically increase manage nodes.Secondly, it had the ability of fine-granularity load-balancing to adjust the load of management nodes.Thirdly, it had topology-awareness ability that allocates management tasks to the nearest management node, utilizing the detailed physical topology.D-CBNMS had been applied to the management of CBISNS(community broad-band integrated services network system), which was a total solution for CPN(customer premises network).Experiments show that D-CBNMS can reduce effectively the bandwidth occupied by management data.…”
    Get full text
    Article
  18. 338

    Partition detection for large scale ad hoc networks by LI Jian-dong, TIAN Ye, SHENG Min, ZHANG Yan, YAO Jun-liang

    Published 2008-01-01
    “…As the failure of a critical node will directly partition a network,a theorem for critical node identification was proved,which indicates that node degree Ni and elementary loop degree Mi of node i are two decisive factors for the exis-tence of a critical node and shows that Ni-Mi≥ 2 is the necessary and sufficient condition for node i being critical.Based on the theorem,a distributed topology partition detection algorithm(distributed partition detection protocol,DPDP) was presented for large scale networks,which achieves the goal of partition detection efficiently by detecting critical nodes in a local area.Theoretic analysis and experiment results show that DPDP has the advantages of low complexity,high accuracy,low cost as well as good scalability,and is superior to other algorithms.…”
    Get full text
    Article
  19. 339

    Analysis of DoS attacks on Docker inter-component stdio copy by Tianyu ZHOU, Wenbo SHEN, Nanzi YANG, Jinku LI, Chenggang QIN, Wang YU

    Published 2020-12-01
    “…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
    Get full text
    Article
  20. 340

    Topology restoration algorithm for heterogeneous sensor networks based on connected dominating tree by Ting-jun SHI, Xu-ming FANG, Yun YANG

    Published 2012-10-01
    “…For currently lacking the study of the topology restoration algorithm for heterogeneous sensor networks,a topology restoration algorithm for heterogeneous sensor networks based on connected dominating tree (HSNTR) was proposed.Firstly the algorithm constructed a virtual backbone forwarding data at very low cost,and secondly when a node fails,the algorithm would dynamically locally restore the backbone to make it still connect and cover all nodes.Theoretical analysis proved the maximum number of nodes the algorithm uses during constructing and restoring the backbone.Simulation analysis showed that the algorithm is better than other algorithms in terms of energy efficiency,scalability and reliability.…”
    Get full text
    Article