{"title":"ACKNOWLEDGMENTS","authors":"K. Dunnavant","doi":"10.2307/j.ctv1jk0k1d.15","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.15","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"68 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87837430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kelly’s Masterpiece","authors":"","doi":"10.2307/j.ctv1jk0k1d.12","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.12","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"91 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85657523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anchors Away","authors":"","doi":"10.2307/j.ctv1jk0k1d.7","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.7","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"33 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85140560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Out of the Shadows","authors":"M. Casey","doi":"10.2307/j.ctv1jk0k1d.14","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.14","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"5 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82746190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The first inter-imperial war amongst the Great Powers since the end of the Napoleonic Wars in 1815, the Crimean War (1853–1856) shook the world and devastated peoples, economies, and finances. Some historians argue that it symbolized the destruction of the Concert of Europe. This chapter offers an alternative assessment. It shows that the Concert continued to exist after 1856 even though the peace established on the heels of the Crimean War was delicate and repeatedly tested peace in Europe and the Levant. Like the aftershocks of a disastrous earthquake, its aftermath witnessed further Great Power wars, civil strifes, and rebellions. The precarious climate that emerged at the time dovetailed with the existing and newly emerging tensions in Mount Lebanon. These snowballed into further fighting in the mountain during the summer of 1860—a much more devastating conflict, with a death toll around three to five times greater than the civil wars of 1841 and 1845 combined.
{"title":"Two Wars","authors":"O. Ozavci","doi":"10.2307/j.ctv1jk0k1d.6","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.6","url":null,"abstract":"The first inter-imperial war amongst the Great Powers since the end of the Napoleonic Wars in 1815, the Crimean War (1853–1856) shook the world and devastated peoples, economies, and finances. Some historians argue that it symbolized the destruction of the Concert of Europe. This chapter offers an alternative assessment. It shows that the Concert continued to exist after 1856 even though the peace established on the heels of the Crimean War was delicate and repeatedly tested peace in Europe and the Levant. Like the aftershocks of a disastrous earthquake, its aftermath witnessed further Great Power wars, civil strifes, and rebellions. The precarious climate that emerged at the time dovetailed with the existing and newly emerging tensions in Mount Lebanon. These snowballed into further fighting in the mountain during the summer of 1860—a much more devastating conflict, with a death toll around three to five times greater than the civil wars of 1841 and 1845 combined.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"75 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83286420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the need of power supply is tremendously increasing in modern society, the stableness and reliability of the power delivery system are the two essential factors that ensure the power supply safety. With the quick expansion of electricity infrastructures, the failures of power transmission system are becoming more frequent, leading to economic loss and high risk of maintenance work under hazardous conditions. The existing automatic power line inspection utilizes advanced convolutional neural network (CNN) to improve the inspection efficiency, emerging as one promising solution. But the needed computational complexity is high since CNN inference demands large amount of multiplication-and-accumulation operations. In this paper, we alleviate this problem by utilizing the heterogeneous computing techniques to design a real-time on-site inspection system. Firstly, the required computational complexity of CNN inference is reduced using FFT-based convolution algorithms, speeding up the inference. Then we utilize the region of interest (ROI) extrapolation to predict the object detection bounding boxes without CNN inference, thus saving computing power. Finally, a heterogeneous computing architecture is presented to accommodate the requirements of proposed algorithms. According to the experiment results, the proposed design significantly improves the frame rate of CNN-based inspection visual system applied to power line inspection. The processing frame rate is also drastically improved. Moreover, the precision loss is negligible which means our proposed schemes are applicable for real application scenarios.
{"title":"Real-time on-site inspection system for power transmission based on heterogeneous computing","authors":"Xiaohong Yan, Zhigang Zhao, Yongqiang Liu","doi":"10.3233/JHS-210662","DOIUrl":"https://doi.org/10.3233/JHS-210662","url":null,"abstract":"As the need of power supply is tremendously increasing in modern society, the stableness and reliability of the power delivery system are the two essential factors that ensure the power supply safety. With the quick expansion of electricity infrastructures, the failures of power transmission system are becoming more frequent, leading to economic loss and high risk of maintenance work under hazardous conditions. The existing automatic power line inspection utilizes advanced convolutional neural network (CNN) to improve the inspection efficiency, emerging as one promising solution. But the needed computational complexity is high since CNN inference demands large amount of multiplication-and-accumulation operations. In this paper, we alleviate this problem by utilizing the heterogeneous computing techniques to design a real-time on-site inspection system. Firstly, the required computational complexity of CNN inference is reduced using FFT-based convolution algorithms, speeding up the inference. Then we utilize the region of interest (ROI) extrapolation to predict the object detection bounding boxes without CNN inference, thus saving computing power. Finally, a heterogeneous computing architecture is presented to accommodate the requirements of proposed algorithms. According to the experiment results, the proposed design significantly improves the frame rate of CNN-based inspection visual system applied to power line inspection. The processing frame rate is also drastically improved. Moreover, the precision loss is negligible which means our proposed schemes are applicable for real application scenarios.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"93 1","pages":"215-224"},"PeriodicalIF":0.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80439669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of filter coefficients for optimal factored truncated cascade FIR filter using optimization algorithm","authors":"Srivatsan Kannan","doi":"10.3233/JHS-210674","DOIUrl":"https://doi.org/10.3233/JHS-210674","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"27 1","pages":"403-420"},"PeriodicalIF":0.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70072501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At present, China’s traffic signal control machine has a low level of intelligence and a single control strategy. It cannot make corresponding control according to the actual traffic situation, and its ability to direct traffic flow in a reasonable and orderly manner is low. In order to understand the urban rail transit signal and control system, we analyzed the requirements of the train dispatching subsystem, designed the overall architecture of the system from the perspective of function realization and architecture, and constructed the wireless sensor network of the system, which is the best for other experts. In this paper, combined with the research of related technologies of the Internet of Things (IoT), an intelligent traffic signal control machine is designed, and the traffic signal control effects under different algorithms are compared, and the relevant rail transit conditions are statistically studied. Studies have proved that sensors based on IoT technology can effectively improve the intensity and control effect of urban rail transit signals. Compared with other algorithm technologies, the overall score of the sensor algorithm is higher than other algorithms, and the ratio is about 30% higher. This article realizes the maintenance function of various data on the system simulation operation terminal, and builds the overall framework of the system; realize the main functions of the train dispatching operation terminal, including the realization of train dispatching functions such as station map, manual route arrangement, automatic route triggering, station deduction and station jump settings, and log report generation. This shows that the sensor algorithm under the IoT has a great promotion effect on the urban rail transit signal and control system.
{"title":"Urban rail transit signal and control based on Internet of Things","authors":"Cong Huang, Ying Huang","doi":"10.3233/JHS-210664","DOIUrl":"https://doi.org/10.3233/JHS-210664","url":null,"abstract":"At present, China’s traffic signal control machine has a low level of intelligence and a single control strategy. It cannot make corresponding control according to the actual traffic situation, and its ability to direct traffic flow in a reasonable and orderly manner is low. In order to understand the urban rail transit signal and control system, we analyzed the requirements of the train dispatching subsystem, designed the overall architecture of the system from the perspective of function realization and architecture, and constructed the wireless sensor network of the system, which is the best for other experts. In this paper, combined with the research of related technologies of the Internet of Things (IoT), an intelligent traffic signal control machine is designed, and the traffic signal control effects under different algorithms are compared, and the relevant rail transit conditions are statistically studied. Studies have proved that sensors based on IoT technology can effectively improve the intensity and control effect of urban rail transit signals. Compared with other algorithm technologies, the overall score of the sensor algorithm is higher than other algorithms, and the ratio is about 30% higher. This article realizes the maintenance function of various data on the system simulation operation terminal, and builds the overall framework of the system; realize the main functions of the train dispatching operation terminal, including the realization of train dispatching functions such as station map, manual route arrangement, automatic route triggering, station deduction and station jump settings, and log report generation. This shows that the sensor algorithm under the IoT has a great promotion effect on the urban rail transit signal and control system.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"237-250"},"PeriodicalIF":0.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90152441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The robust control network for nonlinear large-scale systems with parametric uncertainties also considers the uncertain robust stabilization problem for controlled networks. In heterogeneous populations, hybrid regression models are the most important statistical analysis tools. To aim of the study is to conduct a more in-depth analysis of the existing completive robust control networks relying on biased temporal logic. Compared with the symmetric distribution, the skewed distribution can obtain accurate and effective information. Therefore, a time-series logic model under skewed distribution is proposed. The temporal logic under skew state is applied to describe the normative language of fuzzy systems. Firstly, the mixed nonlinear regression model under skewed distribution data is introduced to test whether the temporal logic formula can be realized under the skew state. Secondly, through the method of reduction, the control flow interval logic CFITL is studied, and the time series logic sequence is used to describe the measurement output loss. The sufficient conditions for the control network system to satisfy the exponential stability and H ∞ performance index are given. The linear matrix inequality obtains the completeness control network to be designed, and the effectiveness of the proposed method is verified by stochastic simulation experiments. Finally, the method is verified to be practical and feasible based on actual data. The maximum recognition rates of nearest neighbor classification, nearest subspace classification and biased distribution temporal logic classification reached 0.9019, 0.9622 and 0.9304, respectively.
{"title":"A complete robust control network based on skewed temporal logic","authors":"Liuxing Li","doi":"10.3233/JHS-210666","DOIUrl":"https://doi.org/10.3233/JHS-210666","url":null,"abstract":"The robust control network for nonlinear large-scale systems with parametric uncertainties also considers the uncertain robust stabilization problem for controlled networks. In heterogeneous populations, hybrid regression models are the most important statistical analysis tools. To aim of the study is to conduct a more in-depth analysis of the existing completive robust control networks relying on biased temporal logic. Compared with the symmetric distribution, the skewed distribution can obtain accurate and effective information. Therefore, a time-series logic model under skewed distribution is proposed. The temporal logic under skew state is applied to describe the normative language of fuzzy systems. Firstly, the mixed nonlinear regression model under skewed distribution data is introduced to test whether the temporal logic formula can be realized under the skew state. Secondly, through the method of reduction, the control flow interval logic CFITL is studied, and the time series logic sequence is used to describe the measurement output loss. The sufficient conditions for the control network system to satisfy the exponential stability and H ∞ performance index are given. The linear matrix inequality obtains the completeness control network to be designed, and the effectiveness of the proposed method is verified by stochastic simulation experiments. Finally, the method is verified to be practical and feasible based on actual data. The maximum recognition rates of nearest neighbor classification, nearest subspace classification and biased distribution temporal logic classification reached 0.9019, 0.9622 and 0.9304, respectively.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"85 1","pages":"265-278"},"PeriodicalIF":0.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90724091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the last few decades, fiber optic cables not only replaced copper cables but also made drastic evolution in the technology to overcome the optoelectronic bandwidth mismatch. Light trail concept is such an attempt to minimize the optoelectronic bandwidth gap between actual WDM bandwidth and end user access bandwidth. A light trail is an optical bus that connects two nodes of an all optical WDM network. In this paper, we studied the concept of split light trail and proposed an algorithm namely Static Multi-Hop Split Light Trail Assignment (SMSLTA), which aims to minimize blocking probability, the number of static split light trails assigned and also the number of network resources used, at the same time maximizing the network throughput. Our proposed algorithm works competently with the existing algorithms and generates better performance in polynomial time complexity.
{"title":"Multi-hop traffic grooming routing and wavelength assignment using split light trail in WDM all optical mesh networks","authors":"Sampa Rani Bhadra, A. Pradhan, U. Biswas","doi":"10.3233/JHS-210658","DOIUrl":"https://doi.org/10.3233/JHS-210658","url":null,"abstract":"For the last few decades, fiber optic cables not only replaced copper cables but also made drastic evolution in the technology to overcome the optoelectronic bandwidth mismatch. Light trail concept is such an attempt to minimize the optoelectronic bandwidth gap between actual WDM bandwidth and end user access bandwidth. A light trail is an optical bus that connects two nodes of an all optical WDM network. In this paper, we studied the concept of split light trail and proposed an algorithm namely Static Multi-Hop Split Light Trail Assignment (SMSLTA), which aims to minimize blocking probability, the number of static split light trails assigned and also the number of network resources used, at the same time maximizing the network throughput. Our proposed algorithm works competently with the existing algorithms and generates better performance in polynomial time complexity.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"43 1","pages":"169-182"},"PeriodicalIF":0.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80971050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}