Saptarashmi Bandyopadhyay, Vishal Dey, M. Chatterjee, U. Bhattacharya
Nowadays, Elastic optical network (EON) provides a long term solution to handle enormous volume of data traffic that arises out of recent developments in mobile technologies, cloud computing, video-on-demand etc. In dynamic environment, setting up and tearing down the spectrums in the optical path may generate spectral fragmentation thus presenting a major obstacle for the effectiveness of elastic spectral allocation. A routing and spectrum allocation (RSA) problem in EON is constrained by three factors: spectrum continuity, sub-carrier contiguity and guard band. With Orthogonal Frequency division Multiplexing (OFDM) technologies, EON is able to make efficient use of spectrum based on distance adaptive modulation format. This paper proposes a novel spectral efficient heuristic SEMRSA for dynamic RSA problem in EON by using modulation-aware concept and satisfying those three constraints. Routing in SEMRSA may take preferably single (if possible) / multiple paths for allocating a connection request to guarantee number of sub-carrier requirement for a connection request as low as possible. Simulation results show that SEMRSA results in lower blocking and higher spectral efficiency compared to a recent approach MMRSA which uses multipath routing associated with modulation awareness concept.
{"title":"SEMRSA: Spectrum Efficient Modulation-aware Dynamic Routing & Spectrum Allocation in Elastic Optical Network","authors":"Saptarashmi Bandyopadhyay, Vishal Dey, M. Chatterjee, U. Bhattacharya","doi":"10.1145/3036331.3036338","DOIUrl":"https://doi.org/10.1145/3036331.3036338","url":null,"abstract":"Nowadays, Elastic optical network (EON) provides a long term solution to handle enormous volume of data traffic that arises out of recent developments in mobile technologies, cloud computing, video-on-demand etc. In dynamic environment, setting up and tearing down the spectrums in the optical path may generate spectral fragmentation thus presenting a major obstacle for the effectiveness of elastic spectral allocation. A routing and spectrum allocation (RSA) problem in EON is constrained by three factors: spectrum continuity, sub-carrier contiguity and guard band. With Orthogonal Frequency division Multiplexing (OFDM) technologies, EON is able to make efficient use of spectrum based on distance adaptive modulation format. This paper proposes a novel spectral efficient heuristic SEMRSA for dynamic RSA problem in EON by using modulation-aware concept and satisfying those three constraints. Routing in SEMRSA may take preferably single (if possible) / multiple paths for allocating a connection request to guarantee number of sub-carrier requirement for a connection request as low as possible. Simulation results show that SEMRSA results in lower blocking and higher spectral efficiency compared to a recent approach MMRSA which uses multipath routing associated with modulation awareness concept.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"8 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86928520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security in wireless computer networks is of great importance because wireless networks are always thought to be as more vulnerable to various types of attacks than ordinary wired networks. This vulnerability is due to the nature of wireless networks that rely on using a wireless shared medium. Video is becoming a more popular type of data being transported in contemporary networks, especially with the advent of many emergent Internet and Mobile applications. To achieve user satisfaction, the transmission of video must comply with a number of quality of service (QoS) requirements. However, network attacks affect in some way or another these requirements. In this paper, we study the benefits of a selected solution to the denial of service (DOS)attackto provide betterQoS of video, which leads to improved performance of various wireless networks.
{"title":"Mitigation of DOS Attacks on Video Trafficin Wireless Networks for better QoS","authors":"Ekbal M. Al-Hurani, Hussein R. Al-Zoubi","doi":"10.1145/3036331.3050416","DOIUrl":"https://doi.org/10.1145/3036331.3050416","url":null,"abstract":"Security in wireless computer networks is of great importance because wireless networks are always thought to be as more vulnerable to various types of attacks than ordinary wired networks. This vulnerability is due to the nature of wireless networks that rely on using a wireless shared medium. Video is becoming a more popular type of data being transported in contemporary networks, especially with the advent of many emergent Internet and Mobile applications. To achieve user satisfaction, the transmission of video must comply with a number of quality of service (QoS) requirements. However, network attacks affect in some way or another these requirements. In this paper, we study the benefits of a selected solution to the denial of service (DOS)attackto provide betterQoS of video, which leads to improved performance of various wireless networks.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"4 1","pages":"166-169"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86215148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to explore an analytical methodology to identify, quantify, and assess the interdependencies across Defence capability development projects, products and programs. To represent the service complexities of project/product interdependencies, a graph theory method is applied. With a network analysis approach, the relative importance and criticality of each project/product are computed according to the graph structure using several models, including a modified Page Ranking algorithm, a node weight balance model, and a degree based algorithm. The preliminary results have shown that the proposed modelling method has the potential to provide a structure and methodology for quantitatively evaluating Defence program interdependencies. The use of the analysis and supporting visualisation tools will enhance the awareness of program interdependencies and provide a decision-aid for identifying program/project/product development priorities, gaps, risks and issues in the interdependency context.
{"title":"Interdependency Analysis for the SUDEMIL Framework","authors":"J. Jagiello, Yue-Jin Wang, Richard Taylor","doi":"10.1145/3036331.3036337","DOIUrl":"https://doi.org/10.1145/3036331.3036337","url":null,"abstract":"This paper aims to explore an analytical methodology to identify, quantify, and assess the interdependencies across Defence capability development projects, products and programs. To represent the service complexities of project/product interdependencies, a graph theory method is applied. With a network analysis approach, the relative importance and criticality of each project/product are computed according to the graph structure using several models, including a modified Page Ranking algorithm, a node weight balance model, and a degree based algorithm. The preliminary results have shown that the proposed modelling method has the potential to provide a structure and methodology for quantitatively evaluating Defence program interdependencies. The use of the analysis and supporting visualisation tools will enhance the awareness of program interdependencies and provide a decision-aid for identifying program/project/product development priorities, gaps, risks and issues in the interdependency context.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"24 1","pages":"32-37"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86709327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiyu Chen, LongQuan Zheng, ShaoJuan Lv, Weiwei Han
Based on the analysis of the structure and function of the intelligent distribution unit, the goal of distribution network self-sealing and the processing procedure of the distribution self-healing, smart distributed self-healing control system which is based on the peer-to-peer communication nets is proposed in this paper. To solve the problem of the poor information interaction between terminals caused by the intelligent power distribution terminal and leapfrog trip when faults occurring, the system makes some references to the IEC61850's layering architecture pattern andoriented-object GOOSE model. By building the computing model intelligent distributed terminal unit and FA logic algorithm, the system could achieve the target of faultmonitoring, faultpositioning, fault isolation and the recovery of the non-fault area. Thepeer-to-peer communication model could guarantees the packets transmission's real-time and flexibility.By the use of the model and experiment of the distribution automation system,the distributed self-healing control achieves the effective control of the multi-point to multi-point connection between the smart distributed terminal unit, and also guarantees the veracity and reliability of fault location, fault isolation and fault recovery.
{"title":"Research on Smart Distributed Self-healing Control Based On the Peer-to-peer Communication Net","authors":"Zhiyu Chen, LongQuan Zheng, ShaoJuan Lv, Weiwei Han","doi":"10.1145/3036331.3036350","DOIUrl":"https://doi.org/10.1145/3036331.3036350","url":null,"abstract":"Based on the analysis of the structure and function of the intelligent distribution unit, the goal of distribution network self-sealing and the processing procedure of the distribution self-healing, smart distributed self-healing control system which is based on the peer-to-peer communication nets is proposed in this paper. To solve the problem of the poor information interaction between terminals caused by the intelligent power distribution terminal and leapfrog trip when faults occurring, the system makes some references to the IEC61850's layering architecture pattern andoriented-object GOOSE model. By building the computing model intelligent distributed terminal unit and FA logic algorithm, the system could achieve the target of faultmonitoring, faultpositioning, fault isolation and the recovery of the non-fault area. Thepeer-to-peer communication model could guarantees the packets transmission's real-time and flexibility.By the use of the model and experiment of the distribution automation system,the distributed self-healing control achieves the effective control of the multi-point to multi-point connection between the smart distributed terminal unit, and also guarantees the veracity and reliability of fault location, fault isolation and fault recovery.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"312 1","pages":"160-165"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Epidemic Spreading is a major global health problem. Modeling epidemic spreading dynamics is important for understanding and controlling epidemic spreading, providing prevention strategies. This paper points out some flaws existing in the susceptible-infected - susceptible (SIS) model proposed by Safan and Rihan, and proposes a modified susceptible-infected-recovered (SIR) model on homogenous networks. It is proved that if the basic reproduction number Rv of the model is less than one, then the infection-free equilibrium of the model is globally asymptotically stable. On the other hand, if Rv of the model is more than one, the endemic equilibrium of the model is globally asymptotically stable. This paper also numerically predicts the effect of vaccination ratio on the size of HBV infected mainland Chinese population.
{"title":"Mathematical analysis of an SIR network model with imperfect vaccination and varying size of population","authors":"Yao Hu, L. Min, Yongmei Su, Y. Kuang","doi":"10.1145/3036331.3036348","DOIUrl":"https://doi.org/10.1145/3036331.3036348","url":null,"abstract":"Epidemic Spreading is a major global health problem. Modeling epidemic spreading dynamics is important for understanding and controlling epidemic spreading, providing prevention strategies. This paper points out some flaws existing in the susceptible-infected - susceptible (SIS) model proposed by Safan and Rihan, and proposes a modified susceptible-infected-recovered (SIR) model on homogenous networks. It is proved that if the basic reproduction number Rv of the model is less than one, then the infection-free equilibrium of the model is globally asymptotically stable. On the other hand, if Rv of the model is more than one, the endemic equilibrium of the model is globally asymptotically stable. This paper also numerically predicts the effect of vaccination ratio on the size of HBV infected mainland Chinese population.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"3 1","pages":"7-13"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75969310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The case of an electric vehicle, where a motor system can be substituted for a combustion engine comprises a very fascinating power source which is environmentally sustainable. However, due to the low power performance of the motor and battery source, the weight reduction of the electric vehicle for the increase of the efficiency is necessary. In present study, the stiffness analysis was conducted to evaluate the safety of the battery mounted parts. For these, the CAE (computer aided engineering) simulation of the full vehicle (Metro by Geo Co.= base model) model was performed. The stiffness enhancing design for evaluating how satisfied the stiffness of the surrounding structure in the battery mounting after dynamic stiffness analysis. In order to improve the stiffness of the base model, the design change idea was proposed. Based on this, the new structure of the floor was suggested to mount the battery into the vehicle. The new concept model is to present a new design direction with integrated BIW (body in white) that can replace from the discharged battery to the newly charged battery easily and it can be helpful to the future design of the advanced electric vehicle. To confirm the possibility of BIW weight reduction, the structure section of overlapped portions and its thickness thinning was studied. From these results, it was confirmed that the BIW design should be possible which had high stiffness through the newly proposed concept.
{"title":"Safety Design for Electric Vehicle Battery Mounting Methods by Using Computer Simulation","authors":"K. Kim, S. Won","doi":"10.1145/3036331.3036344","DOIUrl":"https://doi.org/10.1145/3036331.3036344","url":null,"abstract":"The case of an electric vehicle, where a motor system can be substituted for a combustion engine comprises a very fascinating power source which is environmentally sustainable. However, due to the low power performance of the motor and battery source, the weight reduction of the electric vehicle for the increase of the efficiency is necessary. In present study, the stiffness analysis was conducted to evaluate the safety of the battery mounted parts. For these, the CAE (computer aided engineering) simulation of the full vehicle (Metro by Geo Co.= base model) model was performed. The stiffness enhancing design for evaluating how satisfied the stiffness of the surrounding structure in the battery mounting after dynamic stiffness analysis. In order to improve the stiffness of the base model, the design change idea was proposed. Based on this, the new structure of the floor was suggested to mount the battery into the vehicle. The new concept model is to present a new design direction with integrated BIW (body in white) that can replace from the discharged battery to the newly charged battery easily and it can be helpful to the future design of the advanced electric vehicle. To confirm the possibility of BIW weight reduction, the structure section of overlapped portions and its thickness thinning was studied. From these results, it was confirmed that the BIW design should be possible which had high stiffness through the newly proposed concept.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"28 1","pages":"63-66"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81028439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics Co-simulation of Multi-DOF Dexterous Robot Hand System Based on ADAMS and Simulink","authors":"Bohan Lv, Shan-chao Liu, Jinshu Gu, Guangshang Zeng","doi":"10.1145/3036331.3036332","DOIUrl":"https://doi.org/10.1145/3036331.3036332","url":null,"abstract":"","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"17 1","pages":"38-41"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81370333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-01-01DOI: 10.3850/978-981-09-1139-3_122
N. Pradhan, Joygopal Jena
{"title":"Expected Stresses and Deformations in Generator Barrel Foundation Concrete of a Hydropower Plant by Finite Element Method","authors":"N. Pradhan, Joygopal Jena","doi":"10.3850/978-981-09-1139-3_122","DOIUrl":"https://doi.org/10.3850/978-981-09-1139-3_122","url":null,"abstract":"","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-01-01DOI: 10.3850/978-981-09-1139-3_104
A. D. A. Rejeesh, T. Sekhar, R. Sivakumar, B. Muthukumar
{"title":"Study of High Reynolds Number MHD Flow Stabilized with Magnetic and Its Heat Transfer","authors":"A. D. A. Rejeesh, T. Sekhar, R. Sivakumar, B. Muthukumar","doi":"10.3850/978-981-09-1139-3_104","DOIUrl":"https://doi.org/10.3850/978-981-09-1139-3_104","url":null,"abstract":"","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"38 1","pages":"1501-1510"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-01-01DOI: 10.3850/978-981-09-1139-3_022
B. Bhuvaneshwari, G. Palani, N. Iyer
{"title":"Evaluation of Mechanical Properties of Cement Clinker Phases by Molecular Dynamics Simulations","authors":"B. Bhuvaneshwari, G. Palani, N. Iyer","doi":"10.3850/978-981-09-1139-3_022","DOIUrl":"https://doi.org/10.3850/978-981-09-1139-3_022","url":null,"abstract":"","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"3 1","pages":"2389-2392"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}