WorldWideScience

Sample records for survey packet consisting

  1. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  2. Current Status Of Velocity Field Surveys: A Consistency Check

    CERN Document Server

    Sarkar, D; Watkins, R; Sarkar, Devdeep; Feldman, Hume A.

    2006-01-01

    We present a statistical analysis comparing the bulk--flow measurements for six recent peculiar velocity surveys, namely, ENEAR, SFI, RFGC, SBF and the Mark III singles and group catalogs. We study whether the bulk--flow estimates are consistent with each other and construct the full three dimensional bulk--flow vectors. The method we discuss could be used to test the consistency of all velocity field surveys. We show that although these surveys differ in their geometry and measurement errors, their bulk flow vectors are expected to be highly correlated and in fact show impressive agreement in all cases. Our results suggest that even though the surveys we study target galaxies of different morphology and use different distance measures, they all reliably reflect the same underlying large-scale flow.

  3. Probing primordial non-Gaussianity consistency relation with galaxy surveys

    CERN Document Server

    Yamauchi, Daisuke

    2015-01-01

    With a radio continuum galaxy survey by Square Kilometre Array (SKA), a photometric galaxy survey by Euclid and their combination, we forecast future constraints on primordial non-Gaussianity. We focus on the potential impact of local-type higher-order nonlinear parameters on the parameter estimation and particularly the confirmation of the inflationary consistency inequality. Non-standard inflationary models, such as multi-field models, introduce the scale-dependent stochastic clustering of galaxies on large scales, which is a unique probe of mechanism for generating primordial density fluctuations. Our Fisher matrix analysis indicates that a deep and wide survey provided by SKA is more advantageous to constrain $\\tau_{\\rm NL}$, while Euclid has a strong constraining power for $f_{\\rm NL}$ due to the redshift information, suggesting that the joint analysis between them are quite essential to break the degeneracy between $f_{\\rm NL}$ and $\\tau_{\\rm NL}$. The combination of full SKA and Euclid will achieve the...

  4. Multipath packet switch using packet bundling

    DEFF Research Database (Denmark)

    Berger, Michael Stubert

    2002-01-01

    The basic concept of packet bundling is to group smaller packets into larger packets based on, e.g., quality of service or destination within the packet switch. This paper presents novel applications of bundling in packet switching. The larger packets created by bundling are utilized to extend...... switching capacity by use of parallel switch planes. During the bundling operation, packets will experience a delay that depends on the actual implementation of the bundling and scheduling scheme. Analytical results for delay bounds and buffer size requirements are presented for a specific scheduling...

  5. Extensible packet processing architecture

    Science.gov (United States)

    Robertson, Perry J.; Hamlet, Jason R.; Pierson, Lyndon G.; Olsberg, Ronald R.; Chun, Guy D.

    2013-08-20

    A technique for distributed packet processing includes sequentially passing packets associated with packet flows between a plurality of processing engines along a flow through data bus linking the plurality of processing engines in series. At least one packet within a given packet flow is marked by a given processing engine to signify by the given processing engine to the other processing engines that the given processing engine has claimed the given packet flow for processing. A processing function is applied to each of the packet flows within the processing engines and the processed packets are output on a time-shared, arbitered data bus coupled to the plurality of processing engines.

  6. Extensible packet processing architecture

    Energy Technology Data Exchange (ETDEWEB)

    Robertson, Perry J.; Hamlet, Jason R.; Pierson, Lyndon G.; Olsberg, Ronald R.; Chun, Guy D.

    2013-08-20

    A technique for distributed packet processing includes sequentially passing packets associated with packet flows between a plurality of processing engines along a flow through data bus linking the plurality of processing engines in series. At least one packet within a given packet flow is marked by a given processing engine to signify by the given processing engine to the other processing engines that the given processing engine has claimed the given packet flow for processing. A processing function is applied to each of the packet flows within the processing engines and the processed packets are output on a time-shared, arbitered data bus coupled to the plurality of processing engines.

  7. Optical packet switching without packet alignment

    DEFF Research Database (Denmark)

    Hansen, Peter Bukhave; Danielsen, Søren Lykke; Stubkjær, Kristian

    1998-01-01

    Operation without packet alignment of an all-optical packet switch is proposed and predicted feasible through a detailed traffic analysis. Packet alignment units are eliminated resulting in a simple switch architecture while optimal traffic performance is maintained through the flexibility provided...

  8. Consistency of students’ conceptions of wave propagation: Findings from a conceptual survey in mechanical waves

    Directory of Open Access Journals (Sweden)

    Chernchok Soankwan

    2011-07-01

    Full Text Available We recently developed a multiple-choice conceptual survey in mechanical waves. The development, evaluation, and demonstration of the use of the survey were reported elsewhere [ A. Tongchai et al. Int. J. Sci. Educ. 31 2437 (2009]. We administered the survey to 902 students from seven different groups ranging from high school to second year university. As an outcome of that analysis we were able to identify several conceptual models which the students seemed to be using when answering the questions in the survey. In this paper we attempt to investigate the strength with which the students were committed to these conceptual models, as evidenced by the consistency with which they answered the questions. For this purpose we focus on the patterns of student responses to questions in one particular subtopic, wave propagation. This study has three main purposes: (1 to investigate the consistency of student conceptions, (2 to explore the relative usefulness of different analysis techniques, and (3 to determine what extra information a study of consistency can give about student understanding of basic concepts. We used two techniques: first, categorizing and counting, which is widely used in the science education community, and second, model analysis, recently introduced into physics education research. The manner in which categorizing and counting is used is very diverse while model analysis has been employed only in prescriptive ways. Research studies have reported that students often use their conceptual models inconsistently when solving a series of questions that test the same idea. Our results support their conclusions. Moreover, our findings suggest that students who have had more experiences in physics learning seem to use the scientifically accepted models more consistently. Further, the two analysis techniques have different advantages and disadvantages. Our findings show that model analysis can be used in more diverse ways, provides

  9. DPDK-based Improvement of Packet Forwarding

    Directory of Open Access Journals (Sweden)

    Bi Hao

    2016-01-01

    Full Text Available Reel-time processing of packets occupies a significant position in the field of computer network security. With theexplosive growth of the backbone link rate,which is consistent with Gilder's law, many bottlenecks of server performance leave the real-time data stream unprocessed.Thus, we proposedto take use of DPDK(Data Plan Development Kit framework to achieve an intelligent NIC packet forwarding system. During this research, we deeply analysis the forwarding process of packet in DPDK and improve its DMA mode.According to the results of experiment, the system greatly enhanced the performance of packet forwarding,and the throughput of forwarding 64-byet or random-length packets by 20Gbit NIC reaches13.3Gbps and 18.7Gbps(dual ports forwarding.

  10. Feasibility of Optical Packet Switched WDM Networks without Packet Synchronisation Under Bursty Traffic Conditions

    DEFF Research Database (Denmark)

    Fjelde, Tina; Hansen, Peter Bukhave; Kloch, Allan;

    1999-01-01

    We show that complex packet synchronisation may be avoided in optical packetswitched networks. Detailed traffic analysis demonstrates that packet lossratios of 1e-10 are feasible under bursty traffic conditions for a highcapacity network consisting of asynchronously operated add-drop switch...

  11. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  12. Wave-packet motion

    Energy Technology Data Exchange (ETDEWEB)

    Sacks, R.A.; Robinson, J.E.

    1980-02-15

    The time-dependent Schroedinger equation is integrated numerically to obtain the time evolution of an initially Gaussian packet in the presence of Eckart, truncated quadratic, and untruncated quadratic potentials. Potential and packet parameters are chosen with hydrogen interstitials in transition metals in mind and are varied over significant ranges. Use of the smooth, bounded Eckart potential eliminates the pronounced structure and the anomalous spreading reported previously for other potentials. An interesting transient feature of the scattered packet is found and discussed in terms of the Wigner time delay. Packet transmission coefficients are discussed, and a quasiclassical approximation is found to agree closely with the exact results.

  13. A survey paper on Ant Colony Optimization Routing algorithm for selecting Multiple Feasible Paths for Packet Switched Networks

    Directory of Open Access Journals (Sweden)

    Meenakshi R Patel

    2012-03-01

    Full Text Available ACO algorithms for datagram networks was given by Di Caro Dorigo, in year 1996. Basic mechanisms in typical ACO routing algorithms is Ant-like agents are proactively generated at the nodes to find/check paths toward assigned destinations Ants move hop-by-hop according to a exploratory routing policy based on the local routing .After reaching their destination, ants retrace their path and update nodes routing information according to the quality of the path. Routing information is statistical estimates of the time-to-go to the destination maintained in pheromone arrays. Data are probabilistically spread over the paths according to their estimated quality as stored in the pheromone variables. AntNet algorithms may cause the network congestion and stagnation as the routing table converges. In this paper we perform a survey on modified AntNet routing algorithm using Multiple Ant-Colony Optimization. Multiple ant colonies with different pheromone updating mechanism have different searching traits. By leveraging this feature, much of work is done by designing a set of adaptive rules to facilitate the collaboration between these colonies. This approach can balance the diversity and convergence of solutions generated by different ant colonies and also overcome the problem of Stagnation.

  14. Fictitious time wave packet dynamics: I. Nondispersive wave packets in the quantum Coulomb problem

    CERN Document Server

    Fabčič, T; Wunner, G

    2009-01-01

    Nondispersive wave packets in a fictitious time variable are calculated analytically for the field-free hydrogen atom. As is well known by means of the Kustaanheimo-Stiefel transformation the Coulomb problem can be converted into that of a four-dimensional harmonic oscillator, subject to a constraint. This regularization makes use of a fictitious time variable, but arbitrary Gaussian wave packets in that time variable in general violate that constraint. The set of "restricted Gaussian wave packets" consistent with the constraint is constructed and shown to provide a complete basis for the expansion of states in the original three-dimensional coordinate space. Using that expansion arbitrary localized Gaussian wave packets of the hydrogen atom can be propagated analytically, and exhibit a nondispersive periodic behavior as functions of the fictitious time. Restricted wave packets with and without well defined angular momentum quantum n umbers are constructed. They will be used as trial functions in time-depende...

  15. Detecting the BAO using Discrete Wavelet Packets

    Science.gov (United States)

    Garcia, Noel Anthony; Wu, Yunyun; Kadowaki, Kevin; Pando, Jesus

    2017-01-01

    We use wavelet packets to investigate the clustering of matter on galactic scales in search of the Baryon Acoustic Oscillations. We do so in two ways. We develop a wavelet packet approach to measure the power spectrum and apply this method to the CMASS galaxy catalogue from the Sloan Digital Sky Survey (SDSS). We compare the resulting power spectrum to published BOSS results by measuring a parameter β that compares our wavelet detected oscillations to the results from the SDSS collaboration. We find that β=1 indicating that our wavelet packet methods are detecting the BAO at a similar level as traditional Fourier techniques. We then use wavelet packets to decompose, denoise, and then reconstruct the galaxy density field. Using this denoised field, we compute the standard two-point correlation function. We are able to successfully detect the BAO at r ≈ 105 h-1 Mpc in line with previous SDSS results. We conclude that wavelet packets do reproduce the results of the key clustering statistics computed by other means. The wavelet packets show distinct advantages in suppressing high frequency noise and in keeping information localized.

  16. Quantum wave packet revivals

    CERN Document Server

    Robinett, R W

    2004-01-01

    The numerical prediction, theoretical analysis, and experimental verification of the phenomenon of wave packet revivals in quantum systems has flourished over the last decade and a half. Quantum revivals are characterized by initially localized quantum states which have a short-term, quasi-classical time evolution, which then can spread significantly over several orbits, only to reform later in the form of a quantum revival in which the spreading reverses itself, the wave packet relocalizes, and the semi-classical periodicity is once again evident. Relocalization of the initial wave packet into a number of smaller copies of the initial packet (`minipackets' or `clones') is also possible, giving rise to fractional revivals. Systems exhibiting such behavior are a fundamental realization of time-dependent interference phenomena for bound states with quantized energies in quantum mechanics and are therefore of wide interest in the physics and chemistry communities. We review the theoretical machinery of quantum w...

  17. Optical packet switched networks

    DEFF Research Database (Denmark)

    Hansen, Peter Bukhave

    1999-01-01

    Optical packet switched networks are investigated with emphasis on the performance of the packet switch blocks. Initially, the network context of the optical packet switched network is described showing that a packet network will provide transparency, flexibility and bridge the granularity gap...... between the electrical switched layer and the WDM transport layer. Analytical models are implemented to determine the signal quality ghrough the switch blocks in terms of power penalty and to assess the traffic performance of different switch block architectures. Further, a computer simulation model...... is used to investigate the influence on the traffic performance of asynchronous operation of the switch blocks. The signal quality investigation illustrates some of the component requirements in respect to gain saturation in SOA gates and crosstalk in order to obtain high cascadability of the switch...

  18. Packet Selection and Scheduling for Multipath Video Streaming

    OpenAIRE

    Jurca, Dan; Frossard, Pascal

    2004-01-01

    This paper addresses the problem of choosing the best streaming policy for distortion optimal multipath video delivery, under delay constraints. The streaming policy consists in a joint selection of the video packets to be transmitted, as well as their sending time, and the transmission path. A simple streaming model is introduced, which takes into account the video packet importance, and the dependencies among packets, and allows to compute the quality perceived by the receiver, as a functio...

  19. Quantum wave packet revivals

    Energy Technology Data Exchange (ETDEWEB)

    Robinett, R.W

    2004-03-01

    The numerical prediction, theoretical analysis, and experimental verification of the phenomenon of wave packet revivals in quantum systems has flourished over the last decade and a half. Quantum revivals are characterized by initially localized quantum states which have a short-term, quasi-classical time evolution, which then can spread significantly over several orbits, only to reform later in the form of a quantum revival in which the spreading reverses itself, the wave packet relocalizes, and the semi-classical periodicity is once again evident. Relocalization of the initial wave packet into a number of smaller copies of the initial packet ('minipackets' or 'clones') is also possible, giving rise to fractional revivals. Systems exhibiting such behavior are a fundamental realization of time-dependent interference phenomena for bound states with quantized energies in quantum mechanics and are therefore of wide interest in the physics and chemistry communities. We review the theoretical machinery of quantum wave packet construction leading to the existence of revivals and fractional revivals, in systems with one (or more) quantum number(s), as well as discussing how information on the classical period and revival time is encoded in the energy eigenvalue spectrum. We discuss a number of one-dimensional model systems which exhibit revival behavior, including the infinite well, the quantum bouncer, and others, as well as several two-dimensional integrable quantum billiard systems. Finally, we briefly review the experimental evidence for wave packet revivals in atomic, molecular, and other systems, and related revival phenomena in condensed matter and optical systems.

  20. Quantum wave packet revivals

    Science.gov (United States)

    Robinett, R. W.

    2004-03-01

    The numerical prediction, theoretical analysis, and experimental verification of the phenomenon of wave packet revivals in quantum systems has flourished over the last decade and a half. Quantum revivals are characterized by initially localized quantum states which have a short-term, quasi-classical time evolution, which then can spread significantly over several orbits, only to reform later in the form of a quantum revival in which the spreading reverses itself, the wave packet relocalizes, and the semi-classical periodicity is once again evident. Relocalization of the initial wave packet into a number of smaller copies of the initial packet (‘minipackets’ or ‘clones’) is also possible, giving rise to fractional revivals. Systems exhibiting such behavior are a fundamental realization of time-dependent interference phenomena for bound states with quantized energies in quantum mechanics and are therefore of wide interest in the physics and chemistry communities. We review the theoretical machinery of quantum wave packet construction leading to the existence of revivals and fractional revivals, in systems with one (or more) quantum number(s), as well as discussing how information on the classical period and revival time is encoded in the energy eigenvalue spectrum. We discuss a number of one-dimensional model systems which exhibit revival behavior, including the infinite well, the quantum bouncer, and others, as well as several two-dimensional integrable quantum billiard systems. Finally, we briefly review the experimental evidence for wave packet revivals in atomic, molecular, and other systems, and related revival phenomena in condensed matter and optical systems.

  1. Optical Packet Switching Demostrator

    DEFF Research Database (Denmark)

    Mortensen, Brian Bach; Berger, Michael Stübert

    2002-01-01

    In the IST project DAVID (data and voice integration over DWDM) work is carried out defining possible architectures of future optical packet switched networks. The feasibility of the architecture is to be verified in a demonstration set-up. This article describes the demonstrator set-up and the m......In the IST project DAVID (data and voice integration over DWDM) work is carried out defining possible architectures of future optical packet switched networks. The feasibility of the architecture is to be verified in a demonstration set-up. This article describes the demonstrator set...

  2. Consistency and validity of self-reporting scores in stress measurement surveys.

    Science.gov (United States)

    Masood, Khalid; Ahmed, Beena; Choi, Jongyong; Gutierrez-Osuna, Ricardo

    2012-01-01

    Stress has been attributed to physiological and psychological demands that exceed the natural regulatory capacity of a person. Chronic stress is not only a catalyst for diseases such as hypertension, diabetes, insomnia but may also lead to social problems such as marriage breakups, suicide and violence. Objective assessment of stress is difficult so self-reports are commonly used to indicate the severity of stress. However, empirical information on the validity of self-reports is limited. The present study investigated the authenticity and validity of different self-report surveys. An analysis, based on a three-pronged strategy, was performed on these surveys. It was concluded that although subjects are prone to systematic error in reporting, self-reports can provide a useful substitute for data modeling specifically in stress evaluation where other objective assessments such as determination of stress using only physiological response are difficult.

  3. Development of optical packet and circuit integrated ring network testbed.

    Science.gov (United States)

    Furukawa, Hideaki; Harai, Hiroaki; Miyazawa, Takaya; Shinada, Satoshi; Kawasaki, Wataru; Wada, Naoya

    2011-12-12

    We developed novel integrated optical packet and circuit switch-node equipment. Compared with our previous equipment, a polarization-independent 4 × 4 semiconductor optical amplifier switch subsystem, gain-controlled optical amplifiers, and one 100 Gbps optical packet transponder and seven 10 Gbps optical path transponders with 10 Gigabit Ethernet (10GbE) client-interfaces were newly installed in the present system. The switch and amplifiers can provide more stable operation without equipment adjustments for the frequent polarization-rotations and dynamic packet-rate changes of optical packets. We constructed an optical packet and circuit integrated ring network testbed consisting of two switch nodes for accelerating network development, and we demonstrated 66 km fiber transmission and switching operation of multiplexed 14-wavelength 10 Gbps optical paths and 100 Gbps optical packets encapsulating 10GbE frames. Error-free (frame error rate < 1×10(-4)) operation was achieved with optical packets of various packet lengths and packet rates, and stable operation of the network testbed was confirmed. In addition, 4K uncompressed video streaming over OPS links was successfully demonstrated.

  4. An improved packet structure

    KAUST Repository

    Bader, Ahmed

    2014-05-22

    A multihop network transmits a packet including a RACH area and a hop number. The RACH area includes a list of subcarriers. A source node in the network dynamically determines the size of the RACH area. A node in the network performs an open-loop transmit power control.

  5. Hoover Dam Learning Packet.

    Science.gov (United States)

    Bureau of Reclamation (Dept. of Interior), Washington, DC.

    This learning packet provides background information about Hoover Dam (Nevada) and the surrounding area. Since the dam was built at the height of the Depression in 1931, people came from all over the country to work on it. Because of Hoover Dam, the Colorado River was controlled for the first time in history and farmers in Nevada, California, and…

  6. Shocked POststarbust Galaxy Survey I: Candidate Poststarbust Galaxies with Emission Line Ratios Consistent with Shocks

    CERN Document Server

    Alatalo, Katherine; Rich, Jeffrey A; Appleton, Philip N; Kewley, Lisa J; Lacy, Mark; Lanz, Lauranne; Medling, Anne M; Nyland, Kristina

    2016-01-01

    [Abridged] There are many mechanisms by which galaxies can transform from blue, star-forming spirals to red, quiescent early-type galaxies, but our current census of them does not form a complete picture. Recent studies of nearby case studies seem to have identified a population of galaxies that quench "quietly." Traditional poststarburst searches seem to catch galaxies only after they have quenched and transformed, and thus miss any objects with additional ionization mechanisms exciting the remaining gas. The Shocked POststarburst Galaxy Survey (SPOGS) aims to identify galaxies in an earlier phase of transformation, in which the nebular lines are excited via shocks instead of through star formation processes. Utilizing the OSSY measurements on the Sloan Digital Sky Survey Data Release 7 catalog, we applied Balmer absorption and shock boundary criteria to identify 1,067 SPOG candidates (SPOGs*) within z = 0.2. SPOGs* represent 0.7% of emission line galaxies (and 0.2% of OSSY). SPOGs* colors suggest that they ...

  7. Packet transport network in metro

    Science.gov (United States)

    Huang, Feng; Yi, Xiaobo; Zhang, Hanzheng; Gong, Ping

    2008-11-01

    IP packet based services such as high speed internet, IP voice and IP video will be widely deployed in telecom network, which make transport network evolution to packet transport network. Characteristics of transport network and requirements of packet transport network are analyzed, T-MPLS/MPLS-TP based PTN technology is given and it will be used in metro (access, aggregation and core) network.

  8. Efficient Packet Forwarding in Mesh Network

    CERN Document Server

    Kanrar, Soumen

    2012-01-01

    Wireless Mesh Network (WMN) is a multi hop low cost, with easy maintenance robust network providing reliable service coverage. WMNs consist of mesh routers and mesh clients. In this architecture, while static mesh routers form the wireless backbone, mesh clients access the network through mesh routers as well as directly meshing with each other. Different from traditional wireless networks, WMN is dynamically self-organized and self-configured. In other words, the nodes in the mesh network automatically establish and maintain network connectivity. Over the years researchers have worked, to reduce the redundancy in broadcasting packet in the mesh network in the wireless domain for providing reliable service coverage, the source node deserves to broadcast or flood the control packets. The redundant control packet consumes the bandwidth of the wireless medium and significantly reduces the average throughput and consequently reduces the overall system performance. In this paper I study the optimization problem in...

  9. Optical packet switching

    Science.gov (United States)

    Shekel, Eyal; Ruschin, Shlomo; Majer, Daniel; Levy, Jeff; Matmon, Guy; Koenigsberg, Lisa; Vecht, Jacob; Geron, Amir; Harlavan, Rotem; Shfaram, Harel; Arbel, Arnon; McDermott, Tom; Brewer, Tony

    2005-02-01

    We report here a scalable, multichassis, 6.3 terabit core router, which utilizes our proprietary optical switch. The router is commercially available and deployed in several customer sites. Our solution combines optical switching with electronic routing. An internal optical packet switching network interconnects the router"s electronic line cards, where routing and buffering functions take place electronically. The system architecture and performance will be described. The optical switch is based on Optical Phased Array (OPA) technology. It is a 64 x 64, fully non-blocking, optical crossbar switch, capable of switching in a fraction of a nanosecond. The basic principles of operation will be explained. Loss and crosstalk results will be presented, as well as the results of BER measurements of a 160 Gbps transmission through one channel. Basic principles of operation and measured results will be presented for the burst-mode-receivers, arbitration algorithm and synchronization. Finally, we will present some of our current research work on a next-generation optical switch. The technological issues we have solved in our internal optical packet network can have broad applicability to any global optical packet network.

  10. Packet combining based on cross-packet coding

    Institute of Scientific and Technical Information of China (English)

    LIN DengSheng; XIAO Ming; LI ShaoQian

    2013-01-01

    We propose a packet combining scheme of using cross-packet coding. With the coding scheme, one redundant packet can be used to ensure the error-correction of multiple source packets. Thus, the proposed scheme can increase the code rate. Moreover, the proposed coding scheme has also advantages of decoding complexity, reducing undetectable errors (by the proposed low-complexity decoder) and flexibility (applicable to channels with and without feedback). Theoretical analysis under the proposed low-complexity decoding algorithm is given to maximize the code rate by optimizing the number of source packets. Finally, we give numerical results to demonstrate the advantages of the proposed scheme in terms of code rates compared to the traditional packet combining without coding or ARQ (automatic repeat-request) techniques.

  11. Estimating TCP Packet Loss Ratio from Sampled ACK Packets

    Science.gov (United States)

    Yamasaki, Yasuhiro; Shimonishi, Hideyuki; Murase, Tutomu

    The advent of various quality-sensitive applications has greatly changed the requirements for IP network management and made the monitoring of individual traffic flows more important. Since the processing costs of per-flow quality monitoring are high, especially in high-speed backbone links, packet sampling techniques have been attracting considerable attention. Existing sampling techniques, such as those used in Sampled NetFlow and sFlow, however, focus on the monitoring of traffic volume, and there has been little discussion of the monitoring of such quality indexes as packet loss ratio. In this paper we propose a method for estimating, from sampled packets, packet loss ratios in individual TCP sessions. It detects packet loss events by monitoring duplicate ACK events raised by each TCP receiver. Because sampling reveals only a portion of the actual packet loss, the actual packet loss ratio is estimated statistically. Simulation results show that the proposed method can estimate the TCP packet loss ratio accurately from a 10% sampling of packets.

  12. Technology Corner: Internet Packet Sniffers

    Directory of Open Access Journals (Sweden)

    Nick Flor

    2011-03-01

    Full Text Available A packet sniffer is a piece of software that allows a person to eavesdrop on computer communications over the internet.  A packet sniffer can be used as a diagnostic tool by network administrators or as a spying tool by hackers who can use it to steal passwords and other private information from computer users.  Whether you are a network administrator or information assurance specialist, it helps to have a detailed understanding of how packet sniffers work.  And one of the best ways to acquire such an understanding is to build and modify an actual packet sniffer.

  13. IP Lookup as a Critical Functionality of Packet Processors

    Directory of Open Access Journals (Sweden)

    Z. G. Čiča

    2013-06-01

    Full Text Available Packet processing represents the most significant part of a router’s data plane and has a large impact on router’s scalability. Packet processing consists of many functions and some of them can become critical for the future router’s scalability. In this paper, the IP lookup as one of the most critical packet processing functions is analyzed to determine its impact on the Internet router’s scalability. Also, in this paper we propose a new modification of our previously proposed IP lookup algorithm BPFL.

  14. Consistently low prevalence of syphilis among female sex workers in Jinan, China: findings from two consecutive respondent driven sampling surveys.

    Directory of Open Access Journals (Sweden)

    Meizhen Liao

    Full Text Available BACKGROUND: Routine surveillance using convenient sampling found low prevalence of HIV and syphilis among female sex workers in China. Two consecutive surveys using respondent driven sampling were conducted in 2008 and 2009 to examine the prevalence of HIV and syphilis among female sex workers in Jinan, China. METHODS: A face-to-face interview was conducted to collect demographic, behavioral and service utilization information using a structured questionnaire. Blood samples were drawn for serological tests of HIV-1 antibody and syphilis antibody. Respondent Driven Sampling Analysis Tool was used to generate population level estimates. RESULTS: In 2008 and in 2009, 363 and 432 subjects were recruited and surveyed respectively. Prevalence of syphilis was 2.8% in 2008 and 2.2% in 2009, while no HIV case was found in both years. Results are comparable to those from routine sentinel surveillance system in the city. Only 60.8% subjects in 2008 and 48.3% in 2009 reported a consistent condom use with clients during the past month. Over 50% subjects had not been covered by any HIV-related services in the past year, with only 15.6% subjects in 2008 and 13.1% in 2009 ever tested for HIV. CONCLUSIONS: Despite the low prevalence of syphilis and HIV, risk behaviors are common. Targeted interventions to promote the safe sex and utilization of existing intervention services are still needed to keep the epidemic from growing.

  15. Shocked POststarbust Galaxy Survey. I. Candidate Post-starbust Galaxies with Emission Line Ratios Consistent with Shocks

    Science.gov (United States)

    Alatalo, Katherine; Cales, Sabrina L.; Rich, Jeffrey A.; Appleton, Philip N.; Kewley, Lisa J.; Lacy, Mark; Lanz, Lauranne; Medling, Anne M.; Nyland, Kristina

    2016-06-01

    There are many mechanisms by which galaxies can transform from blue, star-forming spirals, to red, quiescent early-type galaxies, but our current census of them does not form a complete picture. Recent observations of nearby case studies have identified a population of galaxies that quench “quietly.” Traditional poststarburst searches seem to catch galaxies only after they have quenched and transformed, and thus miss any objects with additional ionization mechanisms exciting the remaining gas. The Shocked POststarburst Galaxy Survey (SPOGS) aims to identify transforming galaxies, in which the nebular lines are excited via shocks instead of through star formation processes. Utilizing the Oh-Sarzi-Schawinski-Yi (OSSY) measurements on the Sloan Digital Sky Survey Data Release 7 catalog, we applied Balmer absorption and shock boundary criteria to identify 1067 SPOG candidates (SPOGs*) within z = 0.2. SPOGs* represent 0.2% of the OSSY sample galaxies that exceed the continuum signal-to-noise cut (and 0.7% of the emission line galaxy sample). SPOGs* colors suggest that they are in an earlier phase of transition than OSSY galaxies that meet an “E+A” selection. SPOGs* have a 13% 1.4 GHz detection rate from the Faint Images of the Radio Sky at Twenty Centimeters Survey, higher than most other subsamples, and comparable only to low-ionization nuclear emission line region hosts, suggestive of the presence of active galactic nuclei (AGNs). SPOGs* also have stronger Na i D absorption than predicted from the stellar population, suggestive of cool gas being driven out in galactic winds. It appears that SPOGs* represent an earlier phase in galaxy transformation than traditionally selected poststarburst galaxies, and that a large proportion of SPOGs* also have properties consistent with disruption of their interstellar media, a key component to galaxy transformation. It is likely that many of the known pathways to transformation undergo a SPOG phase. Studying this sample of

  16. Bohmian trajectories of Airy packets

    Energy Technology Data Exchange (ETDEWEB)

    Nassar, Antonio B., E-mail: anassar@hw.com [Science Department, Harvard-Westlake School, 3700 Coldwater Canyon, Studio City, 91604 (United States); Department of Sciences, University of California, Los Angeles, Extension Program, 10995 Le Conte Avenue, Los Angeles, CA 90024 (United States); Miret-Artés, Salvador [Instituto de Física Fundamental, Consejo Superior de Investigaciones Científicas, Serrano 123, 28006 Madrid (Spain)

    2014-09-15

    The discovery of Berry and Balazs in 1979 that the free-particle Schrödinger equation allows a non-dispersive and accelerating Airy-packet solution has taken the folklore of quantum mechanics by surprise. Over the years, this intriguing class of wave packets has sparked enormous theoretical and experimental activities in related areas of optics and atom physics. Within the Bohmian mechanics framework, we present new features of Airy wave packet solutions to Schrödinger equation with time-dependent quadratic potentials. In particular, we provide some insights to the problem by calculating the corresponding Bohmian trajectories. It is shown that by using general space–time transformations, these trajectories can display a unique variety of cases depending upon the initial position of the individual particle in the Airy wave packet. Further, we report here a myriad of nontrivial Bohmian trajectories associated to the Airy wave packet. These new features are worth introducing to the subject’s theoretical folklore in light of the fact that the evolution of a quantum mechanical Airy wave packet governed by the Schrödinger equation is analogous to the propagation of a finite energy Airy beam satisfying the paraxial equation. Numerous experimental configurations of optics and atom physics have shown that the dynamics of Airy beams depends significantly on initial parameters and configurations of the experimental set-up.

  17. Investigating Dependences in Packet-queues

    Institute of Scientific and Technical Information of China (English)

    Cao Weihua(曹卫华); Girigi Deogratias; Wu Min

    2004-01-01

    Many packet communication networks carry several classes of traffic,each with its own service characteristics. The packet arrival processes from each source are also often bursty (highly variable),which can contribute to long packet delay. Ssociated dependence among successive service times and between service times and inter arrival times also can be for packet queues involving variable packet lengths. These dependence effects are demonstrated analytically by considering a multi class single server queue with batch Poisson arrival process.

  18. More Than 10 Gbps Photonic Packet-Switched Networks Using WDM-Based Packet Compression

    Institute of Scientific and Technical Information of China (English)

    Hiroaki Harai; Naoya Wada

    2003-01-01

    We propose photonic packet-switched networks in which more than 10Gbps optical packets are transferred. WDM- based packet compression at edge nodes plays an important role in resolving interface gap between core and metro.

  19. Truth or Consequences: The Intertemporal Consistency of Adolescent Self-report on the Youth Risk Behavior Survey

    OpenAIRE

    Rosenbaum, Janet E.

    2009-01-01

    Surveys are the primary information source about adolescents’ health risk behaviors, but adolescents may not report their behaviors accurately. Survey data are used for formulating adolescent health policy, and inaccurate data can cause mistakes in policy creation and evaluation. The author used test-retest data from the Youth Risk Behavior Survey (United States, 2000) to compare adolescents’ responses to 72 questions about their risk behaviors at a 2-week interval. Each question was evaluate...

  20. Efficient Optimal Packet Management in Distributed Wireless Ad-Hoc Environment using DST

    Directory of Open Access Journals (Sweden)

    J. Amudhavel,

    2010-06-01

    Full Text Available Effective Packet Management (PM is widely used in distributed wireless environments to reduce the access costs and improve data availability. Therefore, packet transmission in wireless environment becomes one of the important challenges for effective data transfer and maintaining the reliability of data . This paper addresses theissues in maintaining the effective packet management in the wireless ad hoc network environments and proposes an effective solution for the same using an optimization technique. The proposed approach concentrates on effective packet management in the dynamic environment and maintaining local consistency issues which occur in the Distributed Wireless Ad-Hoc network environment. Therefore, this paper evaluates the efficiency of existing techniques, and proposes a more efficient local packet management algorithm. The new algorithm leverages existing techniques which are shown to be efficient. This paper also addresses the advantages and disadvantages of various packet management and its issues.

  1. Wave analysis of the evolution of a single wave packet in supersonic boundary layer

    Science.gov (United States)

    Yermolaev, Yury G.; Yatskikh, Aleksey A.; Kosinov, Alexander D.; Semionov, Nickolay V.

    2016-10-01

    The evolution of the artificial wave packet in laminar flat-plate boundary layer was experimentally studied by hot-wire measurements at M=2. The localized disturbances were generated by pulse glow discharge. The wave analysis of evolution of wave packet was provided. It was found, that the most unstable waves are oblique, that consistent with results of linear theory.

  2. Key Technologies for Optical Packet Switching

    Institute of Scientific and Technical Information of China (English)

    Akira; Okada

    2003-01-01

    The paper describes our recent progress on key technologies and components for realizing optical packet switching, including an out-of-band optical label switching technique, an optical packet synchronizer and a burst-mode optical receiver.

  3. Key Technologies for Optical Packet Switching

    Institute of Scientific and Technical Information of China (English)

    Akira Okada

    2003-01-01

    The paper describes our recent progress on key technologies and components for realizing optical packet switching,including an out-of-band optical label switching technique, an optical packet synchronizer and a burst-mode optical receiver.

  4. Orthogonal Matrix-Valued Wavelet Packets

    Institute of Scientific and Technical Information of China (English)

    Qingjiang Chen; Cuiling Wang; Zhengxing Cheng

    2007-01-01

    In this paper,we introduce matrix-valued multiresolution analysis and matrixvalued wavelet packets. A procedure for the construction of the orthogonal matrix-valued wavelet packets is presented. The properties of the matrix-valued wavelet packets are investigated. In particular,a new orthonormal basis of L2(R,Cs×s) is obtained from the matrix-valued wavelet packets.

  5. Dynamics of quantum wave packets

    Energy Technology Data Exchange (ETDEWEB)

    Gosnell, T.R.; Taylor, A.J.; Rodriguez, G.; Clement, T.S.

    1998-11-01

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The objective of this project was to develop ultrafast laser techniques for the creation and measurement of quantum vibrational wave packets in gas phase diatomic molecules. Moreover, the authors sought to manipulate the constitution of these wave packets in terms of harmonic-oscillator basis wavefunctions by manipulating the time-dependent amplitude and phase of the incident ultrashort laser pulse. They specifically investigated gaseous diatomic potassium (K{sub 2}), and discovered variations in the shape of the wave packets as a result of changing the linear chirp in the ultrashort preparation pulse. In particular, they found evidence for wave-packet compression for a specific degree of chirp. Important ancillary results include development of new techniques for denoising and deconvolution of femtosecond time traces and techniques for diagnosing the phase and amplitude of the electric field of femtosecond laser pulses.

  6. Ancient Chinese Bronzes: Teacher's Packet.

    Science.gov (United States)

    Smithsonian Institution, Washington, DC. Arthur M. Sackler Gallery.

    The focus of this teacher's packet is the bronze vessels made for the kings and great families of the early Chinese dynasties between 1700 B.C. and 200 A.D. The materials in the guide are intended for use by teachers and students visiting the exhibition, "The Arts of China," at the Arthur M. Sackler Gallery of the Smithsonian Institution…

  7. Wave packet dynamics under effect of a pulsed electric field

    Science.gov (United States)

    da Silva, A. R. C. B.; de Moura, F. A. B. F.; Dias, W. S.

    2016-06-01

    We studied the dynamics of an electron in a crystalline one-dimensional model under effect of a time-dependent Gaussian field. The time evolution of an initially Gaussian wave packet it was obtained through the numerical solution of the time-dependent Schrödinger equation. Our analysis consists of computing the electronic centroid as well as the mean square displacement. We observe that the electrical pulse is able to promote a special kind of displacement along the chain. We demonstrated a direct relation between the group velocity of the wave packet and the applied electrical pulses. We compare those numerical calculations with a semi-classical approach.

  8. Anti-Litter Curriculum Packet, Interdisciplinary, K-12.

    Science.gov (United States)

    Tillis, Richard

    This curriculum packet consists of 20 illustrated cards with 15 activities designed to create "positive feelings" about a clean environment. Activities range from picture coloring for younger students, to lessons such as the economic and health problems litter creates for older students. Objectives include encouraging anti-litter and…

  9. Causal evolution of wave packets

    CERN Document Server

    Eckstein, Michał

    2016-01-01

    Drawing from the optimal transport theory adapted to the relativistic setting we formulate the principle of a causal flow of probability and apply it in the wave packet formalism. We demonstrate that whereas the Dirac system is causal, the relativistic-Schr\\"odinger Hamiltonian impels a superluminal evolution of probabilities. We quantify the causality breakdown in the latter system and argue that, in contrast to the popular viewpoint, it is not related to the localisation properties of the states.

  10. Transmission performance of all-optically labelled packets using ASK/DPSK orthogonal modulation

    DEFF Research Database (Denmark)

    Chi, Nan; Carlsson, B.; Zhang, Jianfeng

    2002-01-01

    First transmission experiment with all-optically labelled packets consisting of ASK modulated payload and orthogonally modulated DPSK label is demonstrated. The limitation of the laser linewidth and the input extinction ratio are discussed.......First transmission experiment with all-optically labelled packets consisting of ASK modulated payload and orthogonally modulated DPSK label is demonstrated. The limitation of the laser linewidth and the input extinction ratio are discussed....

  11. Intrusion Detection Systems Based On Packet Sniffing

    Directory of Open Access Journals (Sweden)

    Ushus Maria Joseph

    2013-01-01

    Full Text Available In the present era of networks, security of network systems is becoming increasingly important, as more and more sensitive information is being stored and manipulated online. The paper entitled ’Packet Sniffing’ is a IDS where it monitors packets on the network wire and attempts to the discovery of hacker/cracker who is attempting to break into system. Packet Sniffing also finds the contents and tracks the data packet in the network system. This sniffing is being performed by comparing the captured packet with the intruder details stored in the database .If the packet is found to be an intruder it is then forwarded to the firewall with the respective message for blocking. The Emotional Ants module contains the sender and receiver .The sender will inform all the other Ants running in other machines about the detection of intruder through his pheromone (Messages. The receiver in Ants will listen for the messages from other Ants

  12. Packet Queueing Delay in Resilient Packet Ring Network Nodes

    Institute of Scientific and Technical Information of China (English)

    史国炜; 方红波; 曲建岭; 曾烈光

    2004-01-01

    The packet queueing delay is one of the most important performance measures of a data network and is also a significant factor to be considered in the scheduling buffer design for a network node.This paper presents a traffic queueing model for resilient packet ring (RPR) networks and a method for quantitatively analyzing queueing delays in RPR nodes.The method was used to calculate the average queueing delays of different priority traffic for different transit queue modes.The simulations show that,in the transmit direction,lower priority traffic is delayed more than higher priority traffic,and that Class-A traffic is delayed more in a single-queue ring than in a dual-queue ring.In the transit direction,the secondary transit buffer in the dual-queue ring contributes more to the traffic delay than the primary transit buffer in the single-queue ring,which in turn causes more delay than the primary transit buffer in the dual-queue ring.

  13. Slow-light Airy wave packets and their active control via electromagnetically induced transparency

    CERN Document Server

    Hang, Chao

    2014-01-01

    We propose a scheme to generate (3+1)-dimensional slow-light Airy wave packets in a resonant $\\Lambda$-type three-level atomic gas via electromagnetically induced transparency. We show that in the absence of dispersion the Airy wave packets formed by a probe field consist of two Airy wave packets accelerated in transverse directions and a longitudinal Gaussian pulse with a constant propagating velocity lowered to $10^{-5}\\,c$ ($c$ is the light speed in vacuum). We also show that in the presence of dispersion it is possible to generate another type of slow-light Airy wave packets consisting of two Airy beams in transverse directions and an Airy wave packet in the longitudinal direction. In this case, the longitudinal velocity of the Airy wave packet can be further reduced during propagation. Additionally, we further show that the transverse accelerations (or bending) of the both types of slow-light Airy wave packets can be completely eliminated and the motional trajectories of them can be actively manipulated ...

  14. Random Shift and XOR of Unequal-sized Packets (RaSOR) to Shave off Transmission Overhead

    DEFF Research Database (Denmark)

    Taghouti, Maroua; Roetter, Daniel Enrique Lucani; Fitzek, Frank Hanns Paul

    2017-01-01

    We propose the design of a novel coding scheme of unequal-sized packets. Unlike the conventional wisdom that consists of brute-force zero-padding in Random Linear Network Coding (RLNC), we exploit this heterogeneity to shave off this trailing overhead and transmit considerably less coded packets...

  15. Synthesizing Exoplanet Demographics: A Single Population of Long-period Planetary Companions to M Dwarfs Consistent with Microlensing, Radial Velocity, and Direct Imaging Surveys

    Science.gov (United States)

    Clanton, Christian; Gaudi, B. Scott

    2016-03-01

    We present the first study to synthesize results from five different exoplanet surveys using three independent detection methods: microlensing, radial velocity, and direct imaging. The constraints derived herein represent the most comprehensive picture of the demographics of large-separation (≳2 AU) planets orbiting the most common stars in our Galaxy that has been constructed to date. We assume a simple, joint power-law planet distribution function of the form {d}2{N}{{pl}}/(d{log} {m}p d{log} a)={ A }{({m}p/{M}{{Sat}})}α {(a/2.5{{AU}})}β with an outer cutoff radius of the separation distribution function of aout. Generating populations of planets from these models and mapping them into the relevant observables for each survey, we use actual or estimated detection sensitivities to determine the expected observations for each survey. Comparing with the reported results, we derive constraints on the parameters \\{α ,β ,{ A },{a}{{out}}\\} that describe a single population of planets that is simultaneously consistent with the results of microlensing, radial velocity, and direct imaging surveys. We find median and 68% confindence intervals of α =-{0.86}-0.19+0.21 (-{0.85}-0.19+0.21), β ={1.1}-1.4+1.9 ({1.1}-1.3+1.9), { A }={0.21}-0.15+0.20 {{dex}}-2 ({0.21}-0.15+0.20 {{dex}}-2), and {a}{{out}}={10}-4.7+26 AU ({12}-6.2+50 AU) assuming “hot-start” (“cold-start”) planet evolutionary models. These values are consistent with all current knowledge of planets on orbits beyond ∼2 AU around single M dwarfs.

  16. Grooming. Instructor's Packet. Learning Activity Package.

    Science.gov (United States)

    Stark, Pamela

    This instructor's packet accompanies the learning activity package (LAP) on grooming. Contents included in the packet are a time sheet, suggested uses for the LAP, an instruction sheet, final LAP reviews, a final LAP review answer key, suggested activities, an additional resources list, and student completion cards to issue to students as an…

  17. Effective Packet-level FEC Software Coding

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper introduces an effective software-based FEC redundant packets generating algorithm. The algorithm is based on Reed-Solomon coding over Galois Field. By operating on words of packets and performing polynomial multiplication via lookup tables, software coding efficiency is achieved to satisfy the needs of most of computer network applications. The approach to generate lookup tables is detailed.

  18. Oral Hygiene. Instructor's Packet. Learning Activity Package.

    Science.gov (United States)

    Hime, Kirsten

    This instructor's packet accompanies the learning activity package (LAP) on oral hygiene. Contents included in the packet are a time sheet, suggested uses for the LAP, an instruction sheet, final LAP reviews, a final LAP review answer key, suggested activities, additional resources (student handouts), student performance checklists for both…

  19. Method and Apparatus for Processing UDP Data Packets

    Science.gov (United States)

    Murphy, Brandon M. (Inventor)

    2017-01-01

    A method and apparatus for processing a plurality of data packets. A data packet is received. A determination is made as to whether a portion of the data packet follows a selected digital recorder standard protocol based on a header of the data packet. Raw data in the data packet is converted into human-readable information in response to a determination that the portion of the data packet follows the selected digital recorder standard protocol.

  20. The Application of Factorial Surveys in General Population Samples: The Effects of Respondent Age and Education on Response Times and Response Consistency

    Directory of Open Access Journals (Sweden)

    Carsten Sauer

    2011-12-01

    Full Text Available Over the last decade, there has been a marked increase in the number of studies on attitude and decision research which use the factorial survey (FS design. The FS integrates experimental set-ups into a survey: respondents react to hypothetical descriptions (vignettes while the values of each attribute (dimension of these descriptions systematically vary in order to estimate their impact on respondent judgments. As the vignettes are based on a number of dimensions and as respondents evaluate several vignettes, FSs are demanding in terms of individual cognitive and information-processing abilities. So far, there is little empirical knowledge of whether and to what extent this complexity is feasible in general population samples with heterogeneous respondents. Using data from a study on the fairness of earnings (with a mixed mode sample consisting a computer assisted personal interview [CAPI], computer assisted self interview [CASI], and paper and pencil [PAPI] mode, the complexity of FSs is analyzed in terms of: 1 design dimensions, such as the number of vignette dimensions (five, eight, or 12 and the number of vignettes for single respondents (10, 20, or 30, which were varied in a 3x3 experimental design; and 2 respondent characteristics that are associated with cognitive abilities (age and education. Two different indicators for cognitive load as well as learning and fatigue effects are analyzed: 1 latency time and 2 response consistency. The results show that raw reaction times but not latency times are longer for older respondents, suggesting that the cognitive effort needed for the evaluation of vignettes is not particularly high. Consistency measures reveal that respondents with a lower educational level show greater inconsistency in their evaluations when the number of vignettes is high. The number of dimensions has an effect on consistency only when respondents have to rate a large number of vignettes. In short, the results demonstrate

  1. Synthesizing Exoplanet Demographics: A Single Population of Long-Period Planetary Companions to M Dwarfs Consistent with Microlensing, Radial Velocity, and Direct Imaging Surveys

    CERN Document Server

    Clanton, Christian

    2015-01-01

    We present the first study to synthesize results from five different exoplanet surveys using three independent detection methods: microlensing, radial velocity, and direct imaging. The constraints derived herein represent the most comprehensive picture of the demographics of large-separation (>~ 2 AU) planets orbiting the most common stars in our Galaxy that has been constructed to date. We assume a simple, joint power-law planet distribution function of the form d^2N_{pl}/[dlog(m_p)dlog(a)] = A(m_p/M_{Sat})^{alpha}(a/2.5 AU)^{beta} with an outer cutoff radius of the separation distribution function of a_{out}. Generating populations of planets from these models and mapping them into the relevant observables for each survey, we use actual or estimated detection sensitivities to determine the expected observations for each survey. Comparing with the reported results, we derive constraints on the parameters {alpha, beta, A, a_{out}} that describe a single population of planets that is simultaneously consistent ...

  2. Downlink Transmission of Short Packets: Framing and Control Information Revisited

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2017-01-01

    Cellular wireless systems rely on frame-based transmissions. The frame design is conventionally based on heuristics, consisting of a frame header and a data part. The frame header contains control information that provides pointers to the messages within the data part. In this paper, we revisit...... the principles of frame design and show the impact of the new design in scenarios that feature short data packets, which are central to various 5G and Internet of Things applications. We~treat framing for downlink transmission in an AWGN broadcast channel with $K$ users, where the sizes of the messages...... to the users are random variables. Using approximations from finite blocklength information theory, we establish a framework in which a message to a given user is not necessarily encoded as a single packet, but may be grouped with messages to other users and benefit from the improved efficiency of longer codes...

  3. Energy based reliable multicast routing protocol for packet forwarding in MANET

    Directory of Open Access Journals (Sweden)

    S. Gopinath

    2015-06-01

    Full Text Available Mobile Ad hoc Network consists of mobile nodes without any assisting infrastructure. Mobility of nodes causes network partition. This leads to heavy overhead and less packet forwarding ratio. In this research work, Residual Energy based Reliable Multicast Routing Protocol (RERMR is proposed to attain more network lifetime and increased packet delivery and forwarding rate. A multicast backbone is constructed to achieve more stability based on node familiarity and trustable loop. Reliable path criterion is estimated to choose best reliable path among all available paths. Data packets will be forwarded once the reliable path is chosen. We have also demonstrated that residual energy of paths aids to provide maximum network lifetime. Based on the simulation results, the proposed work achieves better performance than previous protocols in terms of packet reliability rate, network stability rate, end to end delay, end to end transmission and communication overhead.

  4. Packet Guide to Routing and Switching

    CERN Document Server

    Hartpence, Bruce

    2011-01-01

    Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to Packet Guide to Core Network Protocols, this concise guide dissects several of these protocols to explain their structure and operation. This isn't a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures. You'll learn about protocol classification, static vs. dynamic topologies, and reasons for installing a pa

  5. Benefits of extensive recruitment effort persist during follow-ups and are consistent across age group and survey method. The TRAILS study

    Directory of Open Access Journals (Sweden)

    Nederhof Esther

    2012-07-01

    . Conclusions First, extensive recruitment effort at the first assessment wave of a prospective population based cohort study has long lasting positive effects. Second, characteristics of hard-to-recruit responders are largely consistent across age groups and survey methods.

  6. Consistency of the growth rate in different environments with the 6dF Galaxy Survey: measurement of the void-galaxy & galaxy-galaxy correlation functions

    CERN Document Server

    Achitouv, Ixandra

    2016-01-01

    We present a new test of gravitational physics by comparing the growth rate of cosmic structure measured around voids with that measured around galaxies in the same large-scale structure dataset, the low-redshift 6-degree Field Galaxy Survey. By fitting a self-consistent Redshift Space Distortion model to the 2D galaxy-galaxy and void-galaxy correlation functions, we recover growth rate values f\\sigma_8 = 0.36 \\pm 0.06 and 0.39 \\pm 0.11, respectively. The environmental-dependence of cosmological statistics can potentially discriminate between modified-gravity scenarios which modulate the growth rate as a function of scale or environment and test the underlying assumptions of homogeneity and isotropy.

  7. Sparsely-Packetized Predictive Control by Orthogonal Matching Pursuit

    DEFF Research Database (Denmark)

    Nagahara, Masaaki; Quevedo, Daniel; Østergaard, Jan

    2012-01-01

    We study packetized predictive control, known to be robust against packet dropouts in networked systems. To obtain sparse packets for rate-limited networks, we design control packets via an ℓ0 optimization, which can be eectively solved by orthogonal matching pursuit. Our formulation ensures asym...

  8. Sparse Packetized Predictive Control for Networked Control over Erasure Channels

    DEFF Research Database (Denmark)

    Nagahara, Masaaki; Quevedo, Daniel E.; Østergaard, Jan

    2014-01-01

    We study feedback control over erasure channels with packet-dropouts. To achieve robustness with respect to packet-dropouts, the controller transmits data packets containing plant input predictions, which minimize a finite horizon cost function. To reduce the data size of packets, we propose to a...

  9. Circumpolar Arctic vegetation: a hierarchic review and roadmap toward an internationally consistent approach to survey, archive and classify tundra plot data

    Science.gov (United States)

    Walker, D. A.; Daniëls, F. J. A.; Alsos, I.; Bhatt, U. S.; Breen, A. L.; Buchhorn, M.; Bültmann, H.; Druckenmiller, L. A.; Edwards, M. E.; Ehrich, D.; Epstein, H. E.; Gould, W. A.; Ims, R. A.; Meltofte, H.; Raynolds, M. K.; Sibik, J.; Talbot, S. S.; Webber, P. J.

    2016-05-01

    Satellite-derived remote-sensing products are providing a modern circumpolar perspective of Arctic vegetation and its changes, but this new view is dependent on a long heritage of ground-based observations in the Arctic. Several products of the Conservation of Arctic Flora and Fauna are key to our current understanding. We review aspects of the PanArctic Flora, the Circumpolar Arctic Vegetation Map, the Arctic Biodiversity Assessment, and the Arctic Vegetation Archive (AVA) as they relate to efforts to describe and map the vegetation, plant biomass, and biodiversity of the Arctic at circumpolar, regional, landscape and plot scales. Cornerstones for all these tools are ground-based plant-species and plant-community surveys. The AVA is in progress and will store plot-based vegetation observations in a public-accessible database for vegetation classification, modeling, diversity studies, and other applications. We present the current status of the Alaska Arctic Vegetation Archive (AVA-AK), as a regional example for the panarctic archive, and with a roadmap for a coordinated international approach to survey, archive and classify Arctic vegetation. We note the need for more consistent standards of plot-based observations, and make several recommendations to improve the linkage between plot-based observations biodiversity studies and satellite-based observations of Arctic vegetation.

  10. Performance optimization for multicast packet authentication

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead.

  11. Fair Scheduling in Networks Through Packet Election

    CERN Document Server

    Jagabathula, Srikanth

    2008-01-01

    We consider the problem of designing a fair scheduling algorithm for discrete-time constrained queuing networks. Each queue has dedicated exogenous packet arrivals. There are constraints on which queues can be served simultaneously. This model effectively describes important special instances like network switches, interference in wireless networks, bandwidth sharing for congestion control and traffic scheduling in road roundabouts. Fair scheduling is required because it provides isolation to different traffic flows; isolation makes the system more robust and enables providing quality of service. Existing work on fairness for constrained networks concentrates on flow based fairness. As a main result, we describe a notion of packet based fairness by establishing an analogy with the ranked election problem: packets are voters, schedules are candidates and each packet ranks the schedules based on its priorities. We then obtain a scheduling algorithm that achieves the described notion of fairness by drawing upon ...

  12. Multiwavelet Packets and Frame Packets of $L^2(\\mathbb{R}^d)$

    Indian Academy of Sciences (India)

    Biswaranjan Behera

    2001-11-01

    The orthonormal basis generated by a wavelet of $L^2(\\mathbb{R})$ has poor frequency localization. To overcome this disadvantage Coifman, Meyer, and Wickerhauser constructed wavelet packets. We extend this concept to the higher dimensions where we consider arbitrary dilation matrices. The resulting basis of $L^2(\\mathbb{R}^d)$ is called the multiwavelet packet basis. The concept of wavelet frame packet is also generalized to this setting. Further, we show how to construct various orthonormal bases of $L^2(\\mathbb{R}^d)$ from the multiwavelet packets.

  13. Packet Reordering Procedure with Ubiquous Communication Systems

    Directory of Open Access Journals (Sweden)

    Giridhar Akula

    2012-11-01

    Full Text Available Satellite links are going to play a vital role in the deployment of ubiquous broad band systems. Non- Geostationary (NGEO satellite communication systems are more advantageous than terrestrial satellites. This paper presents an exchange of information on cooperation status among neiboring satellites. The new explicit load balancing scheme is used to avoid congestion and packet drops at the satellite. A TTL based algorithm is used for packet reordering.

  14. Asymmetric Best Effort Service for Packet Networks

    OpenAIRE

    Le Boudec, Jean-Yves; Hamdi, M; Blazevic, L.; P. Thiran

    1998-01-01

    We propose a system and method for providing a ``throughput versus delay'' differentiated service for IP packets. We distinguish two types of traffic: type A and type B. It is expected that type A traffic receives less throughput per flow than type B. On the other hand, type A packets experience considerably smaller delay. The method is intended to be implemented in Internet routers. No bandwidth or buffer reservation is assumed in this system. The service remains a Best Effort service, thus ...

  15. Asymmetric Best Effort Service for Packet Networks

    OpenAIRE

    Blazevic, Ljubica; Le Boudec, Jean-Yves; Thiran, Patrick

    1998-01-01

    We propose a system and method for providing a ``throughput versus delay`` differentiated service for IP packets. We distinguish two types of traffic: type A and type B. It is expected that type A traffic receives less throughput per flow than type B. On the other hand, type A packets experience considerably smaller delay. The method is intended to be implemented in Internet routers. No bandwidth or buffer reservation is assumed in this system. The service remains a Best Effort service, thus...

  16. Protocol Software for a Packet Voice Terminal

    Science.gov (United States)

    1983-11-16

    III satellite. The PVTs with their attached telephone instrument serve as the interface with the voice user. The PVTs prepare speech for transmission...through a packet network by digitizing the speech, preparing speech data packets, and sending speech data messages. The PVT handles the speech coming...TOTALKin. Thes Foori alControle wilno trani speech message s unlTreessin ithas note rcenie s speehdfr ao sufficentpo toefl erAcofitt cdng atei t pfres

  17. Comparison of Ring-Buffer-Based Packet Capture Solutions

    Energy Technology Data Exchange (ETDEWEB)

    Barker, Steven Andrew [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2015-10-01

    Traditional packet-capture solutions using commodity hardware incur a large amount of overhead as packets are copied multiple times by the operating system. This overhead slows sensor systems to a point where they are unable to keep up with high bandwidth traffic, resulting in dropped packets. Incomplete packet capture files hinder network monitoring and incident response efforts. While costly commercial hardware exists to capture high bandwidth traffic, several software-based approaches exist to improve packet capture performance using commodity hardware.

  18. Interface Consistency

    DEFF Research Database (Denmark)

    Staunstrup, Jørgen

    1998-01-01

    This paper proposes that Interface Consistency is an important issue for the development of modular designs. Byproviding a precise specification of component interfaces it becomes possible to check that separately developedcomponents use a common interface in a coherent matter thus avoiding a very...... significant source of design errors. Awide range of interface specifications are possible, the simplest form is a syntactical check of parameter types.However, today it is possible to do more sophisticated forms involving semantic checks....

  19. Solid consistency

    Science.gov (United States)

    Bordin, Lorenzo; Creminelli, Paolo; Mirbabayi, Mehrdad; Noreña, Jorge

    2017-03-01

    We argue that isotropic scalar fluctuations in solid inflation are adiabatic in the super-horizon limit. During the solid phase this adiabatic mode has peculiar features: constant energy-density slices and comoving slices do not coincide, and their curvatures, parameterized respectively by ζ and Script R, both evolve in time. The existence of this adiabatic mode implies that Maldacena's squeezed limit consistency relation holds after angular average over the long mode. The correlation functions of a long-wavelength spherical scalar mode with several short scalar or tensor modes is fixed by the scaling behavior of the correlators of short modes, independently of the solid inflation action or dynamics of reheating.

  20. A Packet Routing Model for Computer Networks

    Directory of Open Access Journals (Sweden)

    O. Osunade

    2012-05-01

    Full Text Available The quest for reliable data transmission in today’s computer networks and internetworks forms the basis for which routing schemes need be improved upon. The persistent increase in the size of internetwork leads to a dwindling performance of the present routing algorithms which are meant to provide optimal path for forwarding packets from one network to the other. A mathematical and analytical routing model framework is proposed to address the routing needs to a substantial extent. The model provides schemes typical of packet sources, queuing system within a buffer, links and bandwidth allocation and time-based bandwidth generator in routing chunks of packets to their destinations. Principal to the choice of link are such design considerations as least-congested link in a set of links, normalized throughput, mean delay and mean waiting time and the priority of packets in a set of prioritized packets. These performance metrics were targeted and the resultant outcome is a fair, load-balanced network.

  1. Fair packet scheduling in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2014-02-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs. TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity across a large number of topologies.

  2. An overview of packet-switching communications

    Science.gov (United States)

    Heggestad, H. M.

    1984-04-01

    A brief introduction is provided to an alternative computer-based technique for connecting a source to a destination, one which is not an evolutionary improvement in circuit switching but a radical departure from traditional techniques, namely packet switching. It is noted that this mechanism is becoming firmly established as a method for communicating digital data. Advances are also being made rapidly in the transmission of voice by this means, and packet switching may in fact be ideal for some future systems in which voice and data are fully integrated. The distinguishing feature of a packet-switched system is that a computer organizes outgoing digital information into segments which make their way independently to the receiving stations. Here, other computers reassemble them into replicas of the original message. One of the objectives conveniently achieved by packet systems is robustness with respect to blockage on particular links in the network. It is pointed out that two significant limitations affect the design and use of packet-switched systems; one is the need for substantial computer processing and bit manipulation at the network nodes, the other is accumulation of delay for real-time traffic.

  3. THE OPTICALLY UNBIASED GRB HOST (TOUGH) SURVEY. VI. RADIO OBSERVATIONS AT z {approx}< 1 AND CONSISTENCY WITH TYPICAL STAR-FORMING GALAXIES

    Energy Technology Data Exchange (ETDEWEB)

    Michalowski, M. J.; Dunlop, J. S. [SUPA (Scottish Universities Physics Alliance), Institute for Astronomy, University of Edinburgh, Royal Observatory, Edinburgh EH9 3HJ (United Kingdom); Kamble, A.; Kaplan, D. L. [Physics Department, University of Wisconsin-Milwaukee, Milwaukee, WI 53211 (United States); Hjorth, J.; Malesani, D.; Fynbo, J. P. U.; Kruehler, T. [Dark Cosmology Centre, Niels Bohr Institute, University of Copenhagen, Juliane Maries Vej 30, DK-2100 Copenhagen O (Denmark); Reinfrank, R. F. [CSIRO Astronomy and Space Science, P.O. Box 76, Epping, NSW 1710 (Australia); Bonavera, L. [Instituto de Fisica de Cantabria, CSIC-Universidad de Cantabria, Avda. de los Castros s/n, E-39005 Santander (Spain); Castro Ceron, J. M. [Department of Radio Astronomy, Madrid Deep Space Communications Complex (INTA-NASA/INSA), Ctra. M-531, km. 7, E-28.294 Robledo de Chavela (Madrid) (Spain); Ibar, E. [UK Astronomy Technology Centre, Royal Observatory, Blackford Hill, Edinburgh EH9 3HJ (United Kingdom); Garrett, M. A. [Netherlands Institute for Radio Astronomy (ASTRON), Postbus 2, 7990 AA Dwingeloo (Netherlands); Jakobsson, P. [Centre for Astrophysics and Cosmology, Science Institute, University of Iceland, Dunhagi 5, 107 Reykjavik (Iceland); Levan, A. J. [Department of Physics, University of Warwick, Coventry CV4 7AL (United Kingdom); Massardi, M. [INAF-Istituto di Radioastronomia, via Gobetti 101, I-40129 Bologna (Italy); Pal, S. [ICRAR, University of Western Australia, 35 Stirling Highway, Crawley, WA (Australia); Sollerman, J. [Oskar Klein Centre, Department of Astronomy, AlbaNova, Stockholm University, SE-10691 Stockholm (Sweden); Tanvir, N. R. [Department of Physics and Astronomy, University of Leicester, University Road, Leicester LE1 7RH (United Kingdom); Van der Horst, A. J., E-mail: mm@roe.ac.uk [Astronomical Institute ' Anton Pannekoek' , University of Amsterdam, Science Park 904, 1098XH Amsterdam (Netherlands); and others

    2012-08-20

    The objective of this paper is to determine the level of obscured star formation activity and dust attenuation in a sample of gamma-ray burst (GRB) hosts, and to test the hypothesis that GRB hosts have properties consistent with those of the general star-forming galaxy populations. We present a radio continuum survey of all z < 1 GRB hosts in The Optically Unbiased GRB Host (TOUGH) sample supplemented with radio data for all (mostly pre-Swift) GRB-SN hosts discovered before 2006 October. We present new radio data for 22 objects and have obtained a detection for three of them (GRB 980425, 021211, 031203; none in the TOUGH sample), increasing the number of radio-detected GRB hosts from two to five. The star formation rate (SFR) for the GRB 021211 host of {approx}825 M{sub Sun} yr{sup -1}, the highest ever reported for a GRB host, places it in the category of ultraluminous infrared galaxies. We found that at least {approx}63% of GRB hosts have SFR < 100 M{sub Sun} yr{sup -1} and at most {approx}8% can have SFR > 500 M{sub Sun} yr{sup -1}. For the undetected hosts the mean radio flux (<35 {mu}Jy 3{sigma}) corresponds to an average SFR < 15 M{sub Sun} yr{sup -1}. Moreover, {approx}> 88% of the z {approx}< 1 GRB hosts have ultraviolet dust attenuation A{sub UV} < 6.7 mag (visual attenuation A{sub V} < 3 mag). Hence, we did not find evidence for large dust obscuration in a majority of GRB hosts. Finally, we found that the distributions of SFRs and A{sub UV} of GRB hosts are consistent with those of Lyman break galaxies, H{alpha} emitters at similar redshifts, and of galaxies from cosmological simulations. The similarity of the GRB population with other star-forming galaxies is consistent with the hypothesis that GRBs, a least at z {approx}< 1, trace a large fraction of all star formation, and are therefore less biased indicators than once thought.

  4. Rydberg Wave Packets and Half-Cycle Electromagnetic Pulses

    Science.gov (United States)

    Raman, Chandra S.

    1998-05-01

    This dissertation summarizes an examination of the dynamics of atomic Rydberg wave packets with coherent pulses of THz electromagnetic radiation consisting of less than a single cycle of the electric field. The bulk of the energy is contained in just a half-cycle. Previous work ( R. Jones, D. You, and P. Bucksbaum, ``Ionization of Rydberg atoms by subpicosecond half-cycle electromagnetic pulses,'' Phys. Rev. Lett.), vol. 70, 1993. had shown how these half-cycle pulses can be used to ionize the highly excited states of an atom, and that a classical view of electronic motion in the atom explains the ionization mechanism. To further probe the boundary between classical trajectories and quantum mechanics, in this work I investigate dynamical combinations of Rydberg states, or Rydberg wave packets, and how they ionize under the influence of a half-cycle electromagnetic pulse. With time-domain techniques I am able to extract the dynamics of the wave packet from the ionization rate, and to observe wave packet motion in both the electronic radial ( C. Raman, C. Conover, C. Sukenik, and P. Bucksbaum, ``Ionization of Rydberg wavepackets by sub-picosecond half-cycle electromagnetic pulses,'' Phys. Rev. Lett.), vol. 76, 1996.and angular ( C. Raman, T. Weinacht, and P. Bucksbaum, ``Stark wavepackets viewed with half cycle pulses.'' Phys. Rev. A), vol. 55, No. 6, 1997. coordinates. This is the first time a wavepacket technique has been used to view electron motion everywhere on its trajectory, and not just at the nucleus. This is the principal feature of half-cycle pulse ionization. Semiclassical ideas of ionization in conjunction with quantum descriptions of the wave packet, are capable of reproducing the main trends in the data, and in the absence of a rigorous model I rely on these. Experiments of this nature provide examples of the ongoing effort to use the coherent properties of radiation to control electronic motion in an atom, as well as to probe the boundaries between

  5. Two Novel Structures of Optical Packet Switching Nodes

    Institute of Scientific and Technical Information of China (English)

    YIN Hongxi; XU Anshi; WU Deming

    2001-01-01

    All-optical packet switching networkis currently one of the research hotspots of all-opticalcommunication networks and optical packet switchingnodes are the key technique of optical packet switch-ing network. In this paper, two novel structures ofoptical packet switching nodes are put forward, and the switching capacity of the node and the packet con-tention resolution are analyzed. These two switchingarchitectures can realize wavelength routing switchingfunction and broadcast-and-select switching functionrespectively. They are simple but efficient for realizingoptical packet switching network.

  6. Properties of whistler mode wave packets at the leading edge of steepened magnetosonic waves - Comet Giacobini-Zinner

    Science.gov (United States)

    Tsurutani, Bruce T.; Smith, Edward J.; Brinca, Armando L.; Thorne, Richard M.; Matsumoto, Hiroshi

    1989-01-01

    The physical characteristics of high-frequency wave packets detected at the steepened edge of magnetosonic waves near Comet Giacobini-Zinner are explored, based on an examination of over 45 well-defined events. The results suggest that the wave packets play an important role in the reorientation and reduction in field magnitude from the steepened magnetosonic waves to the upstream ambient field. The observed properties of the wave packets are shown to be consistent with anomalously Doppler-shifted right-hand polarized waves.

  7. ETHERNET PACKET PROCESSOR FOR SOC APPLICATION

    Directory of Open Access Journals (Sweden)

    Raja Jitendra Nayaka

    2012-07-01

    Full Text Available As the demand for Internet expands significantly in numbers of users, servers, IP addresses, switches and routers, the IP based network architecture must evolve and change. The design of domain specific processors that require high performance, low power and high degree of programmability is the bottleneck in many processor based applications. This paper describes the design of ethernet packet processor for system-on-chip (SoC which performs all core packet processing functions, including segmentation and reassembly, packetization classification, route and queue management which will speedup switching/routing performance. Our design has been configured for use with multiple projects ttargeted to a commercial configurable logic device the system is designed to support 10/100/1000 links with a speed advantage. VHDL has been used to implement and simulated the required functions in FPGA.

  8. Voice communications over packet radio networks

    Science.gov (United States)

    Seah, M. M.

    1985-03-01

    The use of packet virtual circuit technique for voice communications in military radio networks was investigated. The work was concerned with various aspects of networking which include network modeling, communications techniques, traffic analysis and network control. An attempt has been made to develop a simple yet efficient time slot assignment algorithm . This was analyzed under a variety of slot depths and networks topologies using computer simulation. The Erlang' B results were used to provide more insight into the channel characteristics of the packet radio networks. The capabilities of implementing TDMA/CDMA hybrid schemes in the system were scrutinized. A method to estimate the transmission capacity of the inter-node links was found. We demonstrate its effectiveness in controlling local congestion by computer simulation. Graphical results were presented to highlight the behavior of the proposed packet radio networks. We concluded that an appropriate link weight function would provide efficient and reliable network services.

  9. Packet Filtering using IP Tables in Linux

    Directory of Open Access Journals (Sweden)

    Bhisham Sharma

    2011-07-01

    Full Text Available Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In addition, inserting or modifying a filtering rule requires thorough analysis of the relationship between the rules in order to determine the proper order. In this paper work has been done on creating the virtual network environment using Microsoft virtual PC(SP1 and Capturing and analyzing of network packets using the most popular open source network protocol analyzer Wireshark and on the basis of analyzing the packet work has been done on writing the script to block/allow the network traffic using IPtables and after blocking traffic further capturing and analyzing of packets using Wireshark.

  10. Dynamic Packet Scheduling in Wireless Networks

    CERN Document Server

    Kesselheim, Thomas

    2012-01-01

    We consider protocols that serve communication requests arising over time in a wireless network that is subject to interference. Unlike previous approaches, we take the geometry of the network and power control into account, both allowing to increase the network's performance significantly. We introduce a stochastic and an adversarial model to bound the packet injection. Although taken as the primary motivation, this approach is not only suitable for models based on the signal-to-interference-plus-noise ratio (SINR). It also covers virtually all other common interference models, for example the multiple-access channel, the radio-network model, the protocol model, and distance-2 matching. Packet-routing networks allowing each edge or each node to transmit or receive one packet at a time can be modeled as well. Starting from algorithms for the respective scheduling problem with static transmission requests, we build distributed stable protocols. This is more involved than in previous, similar approaches because...

  11. Separated Fringe Packet Observations with the CHARA Array II: $\\omega$ Andromeda, HD 178911, and {\\xi} Cephei

    CERN Document Server

    Farrington, Christopher D; Mason, Brian D; Hartkopf, William I; Mourard, Denis; Moravveji, Ehsan; McAlister, Harold A; Turner, Nils H; Sturmann, Laszlo; Sturmann, Judit

    2014-01-01

    When observed with optical long-baseline interferometers (OLBI), components of a binary star which are sufficiently separated produce their own interferometric fringe packets; these are referred to as Separated Fringe Packet (SFP) binaries. These SFP binaries can overlap in angular separation with the regime of systems resolvable by speckle interferometry at single, large-aperture telescopes and can provide additional measurements for preliminary orbits lacking good phase coverage, help constrain elements of already established orbits, and locate new binaries in the undersampled regime between the bounds of spectroscopic surveys and speckle interferometry. In this process, a visibility calibration star is not needed, and the separated fringe packets can provide an accurate vector separation. In this paper, we apply the SFP approach to {\\omega} Andromeda, HD 178911, and {\\xi} Cephei with the CLIMB three-beam combiner at the CHARA Array. For these systems we determine component masses and parallax of 0.963${\\pm...

  12. Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch

    Science.gov (United States)

    Wang, Xiaoliang; Jiang, Xiaohong; Horiguchi, Susumu

    Shared-Memory Optical Packet (SMOP) switch architecture is very promising for significantly reducing the amount of required optical memory, which is typically constructed from fiber delay lines (FDLs). The current reservation-based scheduling algorithms for SMOP switches can effectively utilize the FDLs and achieve a low packet loss rate by simply reserving the departure time for each arrival packet. It is notable, however, that such a simple scheduling scheme may introduce a significant packet out of order problem. In this paper, we first identify the two main sources of packet out of order problem in the current reservation-based SMOP switches. We then show that by introducing a “last-timestamp” variable and modifying the corresponding FDLs arrangement as well as the scheduling process in the current reservation-based SMOP switches, it is possible to keep packets in-sequence while still maintaining a similar delay and packet loss performance as the previous design. Finally, we further extend our work to support the variable-length burst switching.

  13. Wavelet and wavelet packet compression of electrocardiograms.

    Science.gov (United States)

    Hilton, M L

    1997-05-01

    Wavelets and wavelet packets have recently emerged as powerful tools for signal compression. Wavelet and wavelet packet-based compression algorithms based on embedded zerotree wavelet (EZW) coding are developed for electrocardiogram (ECG) signals, and eight different wavelets are evaluated for their ability to compress Holter ECG data. Pilot data from a blind evaluation of compressed ECG's by cardiologists suggest that the clinically useful information present in original ECG signals is preserved by 8:1 compression, and in most cases 16:1 compressed ECG's are clinically useful.

  14. ON CONVERGENCE OF WAVELET PACKET EXPANSIONS

    Institute of Scientific and Technical Information of China (English)

    Morten Nielsen

    2002-01-01

    It is well known that the-Walsh-Fourier expansion of a function from the block space ([0, 1 ) ), 1 <q≤∞, converges pointwise a.e. We prove that the same result is true for the expansion of a function from in certain periodixed smooth periodic non-stationary wavelet packets bases based on the Haar filters. We also consider wavelet packets based on the Shannon filters and show that the expansion of Lp-functions, 1<p<∞, converges in norm and pointwise almost everywhere.

  15. Squeezed Wave Packets in Quantum Cosmology

    Science.gov (United States)

    Pedram, Pouria

    2010-11-01

    We use an appropriate initial condition for constructing squeezed wave packets in the context of Wheeler-DeWitt equation with complete classical description. This choice of initial condition does not alter the classical paths and only affect the quantum mechanical picture. To demonstrate the method, we consider an empty 4+1-dimensional Kaluza-Klein quantum cosmology in the presence of a negative cosmological constant. We show that these wave packets do not disperse and sharply peak on the classical trajectories in the whole configuration space. So, the probability of finding the corresponding physical quantities approaches zero everywhere except on the classical paths.

  16. Utility Optimal Coding for Packet Transmission over Wireless Networks - Part II: Networks of Packet Erasure Channels

    CERN Document Server

    Karumbu, Premkumar; Leith, Douglas J

    2011-01-01

    We define a class of multi--hop erasure networks that approximates a wireless multi--hop network. The network carries unicast flows for multiple users, and each information packet within a flow is required to be decoded at the flow destination within a specified delay deadline. The allocation of coding rates amongst flows/users is constrained by network capacity. We propose a proportional fair transmission scheme that maximises the sum utility of flow throughputs. This is achieved by {\\em jointly optimising the packet coding rates and the allocation of bits of coded packets across transmission slots.}

  17. Wave packet dynamics and factorization of numbers

    CERN Document Server

    Mack, H; Haug, F; Straub, F S; Freyberger, M; Schleich, W P; Mack, Holger; Bienert, Marc; Haug, Florian; Straub, Frank S.; Freyberger, Matthias; Schleich, Wolfgang P.

    2002-01-01

    We connect three phenomena of wave packet dynamics: Talbot images, revivals of a particle in a box and fractional revivals. The physical origin of these effects is deeply rooted in phase factors which are quadratic in the quantum number. We show that the characteristic structures in the time evolution of these systems allow us to factorize large integers.

  18. Relativistic suppression of wave packet spreading.

    Science.gov (United States)

    Su, Q; Smetanko, B; Grobe, R

    1998-03-30

    We investigate numerically the solution of Dirac equation and analytically the Klein-Gordon equation and discuss the relativistic motion of an electron wave packet in the presence of an intense static electric field. In contrast to the predictions of the (non-relativistic) Schroedinger theory, the spreading rate in the field's polarization direction as well as in the transverse directions is reduced.

  19. Packet models revisited: tandem and priority systems

    NARCIS (Netherlands)

    Mandjes, M.R.H.

    2004-01-01

    We examine two extensions of traditional single-node packet-scale queueing models: tandem networks and (strict) priority systems. Two generic input processes are considered: periodic and Poisson arrivals. For the two-node tandem, an exact expression is derived for the joint distribution of the total

  20. Packet models revisited: tandem and priority systems

    NARCIS (Netherlands)

    M.R.H. Mandjes

    2004-01-01

    Abstract : We examine two extensions of traditional single-node packet-scale queueing models: tandem networks and (strict) priority systems. Two generic input processes are considered: periodic and Poisson arrivals. For the two-node tandem, an exact expression is derived for the joint distribution o

  1. Humane Education Teachers' Packet (Preschool & Kindergarten).

    Science.gov (United States)

    Sammut-Tovar, Dorothy

    Designed to sensitize preschoolers and kindergartners to the responsibilities involved in caring for living things, this teacher's packet provides a variety of student worksheets and activity suggestions. Teaching plans are provided for a total of nine lessons, which can be easily integrated into other learning areas such as numbers, colors,…

  2. Satcom access in the Evolved Packet Core

    NARCIS (Netherlands)

    Cano Soveri, M.D.; Norp, A.H.J.; Popova, M.P.

    2011-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is consid

  3. Satcom access in the evolved packet core

    NARCIS (Netherlands)

    Cano, M.D.; Norp, A.H.J.; Popova, M.P.

    2012-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is consid

  4. Solid Waste Activity Packet for Teachers.

    Science.gov (United States)

    Illinois Univ., Urbana. Cooperative Extension Service.

    This solid waste activity packet introduces students to the solid waste problem in Illinois. Topics explore consumer practices in the market place, packaging, individual and community garbage generation, and disposal practices. The activities provide an integrated approach to incorporating solid waste management issues into subject areas. The…

  5. Multiple descriptions for packetized predictive control

    DEFF Research Database (Denmark)

    Østergaard, Jan; Quevedo, Daniel

    2016-01-01

    In this paper, we propose to use multiple descriptions (MDs) to achieve a high degree of robustness towards random packet delays and erasures in networked control systems. In particular, we consider the scenario, where a data-rate limited channel is located between the controller and the plant...

  6. Cashier/Checker Learning Activity Packets (LAPs).

    Science.gov (United States)

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    Twenty-four learning activity packets (LAPs) are provided for six areas of instruction in a cashier/checker program. Section A, Orientation, contains an LAP on exploring the job of cashier-checker. Section B, Operations, has nine LAPs, including those on operating the cash register, issuing trading stamps, and completing the cash register balance…

  7. Peninsula Humane Society Teacher's Packet. Secondary Level.

    Science.gov (United States)

    Peninsula Humane Society, San Mateo, CA.

    Activities in this teacher's packet are designed to familiarize secondary school students with the responsibilities involved in pet ownership. Teaching plans are provided for a total of 12 lessons grouped under social studies, language arts, math, and health sciences. Activities focus on pet overpopulation, expressions of social responses in…

  8. Peninsula Humane Society Teacher's Packet. Secondary Level.

    Science.gov (United States)

    Peninsula Humane Society, San Mateo, CA.

    Activities in this teacher's packet are designed to familiarize secondary school students with the responsibilities involved in pet ownership. Teaching plans are provided for a total of 12 lessons grouped under social studies, language arts, math, and health sciences. Activities focus on pet overpopulation, expressions of social responses in…

  9. Scheduling Packets with Values and Deadlines in Size-bounded Buffers

    CERN Document Server

    Li, Fei

    2010-01-01

    Motivated by providing quality-of-service differentiated services in the Internet, we consider buffer management algorithms for network switches. We study a multi-buffer model. A network switch consists of multiple size-bounded buffers such that at any time, the number of packets residing in each individual buffer cannot exceed its capacity. Packets arrive at the network switch over time; they have values, deadlines, and designated buffers. In each time step, at most one pending packet is allowed to be sent and this packet can be from any buffer. The objective is to maximize the total value of the packets sent by their respective deadlines. A 9.82-competitive online algorithm has been provided for this model (Azar and Levy. SWAT 2006), but no offline algorithms have been known yet. In this paper, We study the offline setting of the multi-buffer model. Our contributions include a few optimal offline algorithms for some variants of the model. Each variant has its unique and interesting algorithmic feature. Thes...

  10. Performance of Ad Hoc Networks with Two-Hop Relay Routing and Limited Packet Lifetime

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Nain, Philippe; Altman, Eitan

    2006-01-01

    Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay nodes are assumed to have a limited lifetime in the network. All nodes are moving inside a bounded region according to some ra

  11. Network-based Mobility with DVB-RCS2 using the Evolved Packet Core

    NARCIS (Netherlands)

    Walraven, F.A.; Venemans, P.H.A.; Velt, R. in 't; Fransen, F.

    2013-01-01

    The network of the future consists of a combination of different access networks, each providing a level of network availability and mobility suited for a wide range of applications. Mobile network developments culminated in work on the E-UTRAN and Evolved Packet Core (EPC) network and can provide m

  12. Segregation of helicity in inertial wave packets

    Science.gov (United States)

    Ranjan, A.

    2017-03-01

    Inertial waves are known to exist in the Earth's rapidly rotating outer core and could be important for the dynamo generation. It is well known that a monochromatic inertial plane wave traveling parallel to the rotation axis (along positive z ) has negative helicity while the wave traveling antiparallel (negative z ) has positive helicity. Such a helicity segregation, north and south of the equator, is necessary for the α2-dynamo model based on inertial waves [Davidson, Geophys. J. Int. 198, 1832 (2014), 10.1093/gji/ggu220] to work. The core is likely to contain a myriad of inertial waves of different wave numbers and frequencies. In this study, we investigate whether this characteristic of helicity segregation also holds for an inertial wave packet comprising waves with the same sign of Cg ,z, the z component of group velocity. We first derive the polarization relations for inertial waves and subsequently derive the resultant helicity in wave packets forming as a result of superposition of two or more waves. We find that the helicity segregation does hold for an inertial wave packet unless the wave numbers of the constituent waves are widely separated. In the latter case, regions of opposite color helicity do appear, but the mean helicity retains the expected sign. An illustration of this observation is provided by (a) calculating the resultant helicity for a wave packet formed by superposition of four upward-propagating inertial waves with different wave vectors and (b) conducting the direct numerical simulation of a Gaussian eddy under rapid rotation. Last, the possible effects of other forces such as the viscous dissipation, the Lorentz force, buoyancy stratification, and nonlinearity on helicity are investigated and discussed. The helical structure of the wave packet is likely to remain unaffected by dissipation or the magnetic field, but can be modified by the presence of linearly stable stratification and nonlinearity.

  13. Semiclassical wave-packets emerging from interaction with an environment

    Energy Technology Data Exchange (ETDEWEB)

    Recchia, Carla, E-mail: carla.recchia@libero.it [D.I.S.I.M., Università di L’Aquila, Via Vetoio - Loc. Coppito - 67010 L’Aquila (Italy); Teta, Alessandro, E-mail: teta@mat.uniroma1.it [Dipartimento di Matematica, “Sapienza” Università di Roma, P.le A. Moro 5, 00185 Roma (Italy)

    2014-01-15

    We study the quantum evolution in dimension three of a system composed by a test particle interacting with an environment made of N harmonic oscillators. At time zero the test particle is described by a spherical wave, i.e., a highly correlated continuous superposition of states with well localized position and momentum, and the oscillators are in the ground state. Furthermore, we assume that the positions of the oscillators are not collinear with the center of the spherical wave. Under suitable assumptions on the physical parameters characterizing the model, we give an asymptotic expression of the solution of the Schrödinger equation of the system with an explicit control of the error. The result shows that the approximate expression of the wave function is the sum of two terms, orthogonal in L{sup 2}(R{sup 3(N+1)}) and describing rather different situations. In the first one, all the oscillators remain in their ground state and the test particle is described by the free evolution of a slightly deformed spherical wave. The second one consists of a sum of N terms where in each term there is only one excited oscillator and the test particle is correspondingly described by the free evolution of a wave packet, well concentrated in position and momentum. Moreover, the wave packet emerges from the excited oscillator with an average momentum parallel to the line joining the oscillator with the center of the initial spherical wave. Such wave packet represents a semiclassical state for the test particle, propagating along the corresponding classical trajectory. The main result of our analysis is to show how such a semiclassical state can be produced, starting from the original spherical wave, as a result of the interaction with the environment.

  14. A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks

    CERN Document Server

    Sen, Jaydip; Balamuralidhar, P; G., Harihara S; Reddy, Harish

    2011-01-01

    In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a malicious node can partially degrade or completely disrupt communication in the network by consistently dropping packets. In this paper, a mechanism for detection of packet dropping attack is presented based on cooperative participation of the nodes in a MANET. The redundancy of routing information in an ad hoc network is utilized to make the scheme robust so that it works effectively even in presence of transient network partitioning and Byzantine failure of nodes. The proposed scheme is fully cooperative an...

  15. Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET

    Directory of Open Access Journals (Sweden)

    Aishwarya Sagar Anand Ukey

    2010-07-01

    Full Text Available Mobile Ad hoc NETwork (MANET is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and limited battery-based energy some nodes (i.e. selfish or malicious may not cooperate correctly. After becoming part of active path, theses nodes start refusing to forward or drop data packets thereby degrades the performance of network. In this paper, a new reputation based approach is proposed that deals with such routing misbehavior and consists of detection and isolation of misbehaving nodes. Proposed approach can be integrated on top of any source routing protocol and based on sending acknowledgement packets and counting the number of data packets of active path.

  16. Effect of Coulomb interaction on multi-electronwave packet dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Shiokawa, T. [Graduate School of Pure and Applied Sciences, University of Tsukuba, Tsukuba, 305-8571 (Japan); Takada, Y. [Faculty of Engineering, Tokyo University of Science, Chiyoda, Tokyo, 102-0073, Japan and CREST, Japan Science and Technology Agency (Japan); Konabe, S.; Hatsugai, Y. [Graduate School of Pure and Applied Sciences, University of Tsukuba, Tsukuba, 305-8571, Japan and CREST, Japan Science and Technology Agency (Japan); Muraguchi, M. [Graduate School of Engineering, Tohoku University, Sendai, 980-8579, Japan and CREST, Japan Science and Technology Agency (Japan); Endoh, T. [Graduate School of Engineering, Tohoku University, Sendai, 980-8579, Japan and Center for Spintronics Integrated Systems, Tohoku University, Sendai, 980-8577, Japan and CREST, Japan Science and Technology Agency (Japan); Shiraishi, K. [Graduate School of Pure and Applied Sciences, University of Tsukuba, Tsukuba, 305-8571, Japan and Center for Computational Science, University of Tsukuba, Tsukuba, 305-8577, Japan and CREST, Japan Science and Technology Agency (Japan)

    2013-12-04

    We have investigated the effect of Coulomb interaction on electron transport in a one-dimensional nanoscale structure using a multi-electron wave packet approach. To study the time evolution, we numerically solve the time-dependent Hartree-Fock equation, finding that the electron wave packet dynamics strongly depends on the Coulomb interaction strength. When the Coulomb interaction is large, each electron wave packet moves separately in the presence of an electric field. With weak Coulomb interaction, however, the electron wave packets overlap, forming and moving as one collective wave packet.

  17. On the Effects of Heterogeneous Packet Lengths on Network Coding

    DEFF Research Database (Denmark)

    Compta, Pol Torres; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2014-01-01

    Random linear network coding (RLNC) has been shown to provide increased throughput, security and robustness for the transmission of data through the network. Most of the analysis and the demonstrators have focused on the study of data packets with the same size (number of bytes). This constitutes...... a best case scenario as coded packets will incur little overhead to handle such packets. However, packet lengths are quite heterogeneous in real networks, which can cause a high overhead or, alternatively, a high delay in the transmission of data packets. As we show, this can have a severe effect...

  18. North Dakota Piping Plover Survey : 1992

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Packet of information on conducting piping plover surveys in North Dakota for 1992. These surveys are part of a cooperative effort with other resource agencies and...

  19. Transporting live video over high packet loss networks

    Science.gov (United States)

    Werdin, Dave

    2013-05-01

    Transport of live video requires a robust backbone as live video decoders are subject to dropouts and buffer starvation. A short duration packet loss will many times cause a decoder to go black for many seconds as it reacquires the stream and clock. IP networks due to their connectionless approach and support for variable length packets, inherently display packet delivery variability. These characteristics most typically include packet loss, packet delay variation, and packets being delivered out of order. Deep Packet Recovery (DPR) techniques provide correction to IP network induced errors and issues. DPR can provide a much broader and stronger protection than traditional Forward Error Correction techniques enabling transport of live video across severely impaired networks.

  20. Network Packet Length Covert Channel Based on Empirical Distribution Function

    Directory of Open Access Journals (Sweden)

    Lihua Zhang

    2014-06-01

    Full Text Available Network packet length covert channel modulates secret message bits onto the packet lengths to transmit secret messages. In this paper, a novel network packet length covert channel is proposed. The proposed scheme is based on the empirical distribution function of packet length series of legitimate traffic. Different from the existing schemes, the lengths of packets which are generated by the covert sender follow the distribution of normal traffic more closely in our scheme. To validate the security of the proposed scheme, the state-of-the-art packet length covert channel detection algorithm is adopted. The experimental results show that the packet length covert channel provides a significant performance improvement in detection resistance meanings

  1. Qualitative dynamics of wave packets in turbulent jets

    Science.gov (United States)

    Semeraro, Onofrio; Lusseyran, François; Pastur, Luc; Jordan, Peter

    2017-09-01

    We analyze the temporal dynamics associated with axisymmetric coherent structures in a turbulent jet. It has long been established that turbulent jets comprise large-scale coherent structures, now more commonly referred to as "wave packets" [Jordan and Colonius, Annu. Rev. Fluid Mech. 45, 173 (2013), 10.1146/annurev-fluid-011212-140756]. These structures exhibit a marked spatiotemporal organization, despite turbulence, and we aim to characterize their temporal dynamics by means of nonlinear statistical tools. The analysis is based on data presented Breakey et al., in Proceedings of the 19th AIAA/CEAS Aeroacoustics Conference, AIAA Paper 2013-2083 (AIAA, Reston, VA, 2013), where time series of the wave-packet signatures are extracted at different streamwise locations. The experiment runs at Ma=0.6 and Re=5.7 ×105 . A thorough analysis is performed. Statistical tools are used to estimate the embedding and correlation dimensions that characterize the dynamical system. Input-output transfer functions are designed as control-oriented models; and for this special case, consistent with other recent studies, we find that linear models can reproduce much of the convective input-ouput behavior. Finally, we show how surrogate models can partially reproduce the nonlinear dynamics.

  2. Node design in optical packet switched networks

    DEFF Research Database (Denmark)

    Nord, Martin

    2006-01-01

    The thesis discusses motivation, realisation and performance of the Optical Packet Switching (OPS) network paradigm. The work includes proposals for designs and methods to efficiently use both the wavelength- and time domain for contention resolution in asynchronous operation. The project has also...... adapting network performance to the different acceptable packet loss rate levels of supported applications, while improving overall bandwidth efficiency. The project has evaluated QoS differentiation methods and proposed schemes with improved efficiency, which also include jitter sensitivity as a Qo...... proposed parallel designs to overcome scalability constraints and to support migration scenarios. Furthermore, it has proposed and demonstrated optical input processing schemes for hybrids networks to simultaneously support OPS and Optical Circuit Switching. Quality of Service (QoS) differentiation enables...

  3. Congestion Control Algorithm for Resilient Packet Ring

    Institute of Scientific and Technical Information of China (English)

    孔红伟; 葛宁; 阮方; 冯重熙

    2003-01-01

    A congestion control algorithm is proposed for resilient packet ring (RPR) in this paper. In thisalgorithm, nonlinear explicit rate feedback control is used to ensure fast convergence and smooth equilibriumbehavior. The algorithm combines explicit rate control with a deficit round robin (DRR) scheduler, which notonly ensures fairness, but also avoids the implementation difficulties of explicit rate control algorithms. Thealgorithm has good features of fairness, fast convergence, smooth equilibrium, Iow queue depth, and easyimplementation. It is insensitive to the loss of congestion control packets and can adapt to a wide range of linkrates and network scales. It has solved the unbalanced traffic problem of spatial reuse protocol (SRP). Thealgorithm can be implemented on the multi-access control layer of RPR nodes to ensure fair and efficient accessof the best-effort traffic.

  4. Ship-Shore Packet Switched Communications System.

    Science.gov (United States)

    1986-06-01

    a fatal flaw for sea service communications. This instability is described in several texts [ Stallings , 85; Tanenbaum, 81]. 68 b. Token Systems Again... decompressor in the data path. otherwise, the decompression algorithm would compound errors and make different instances of errored packets different lengths...Further detail may be found in several sources including listed references [ Stallings , 85]. DoD’s seminal ARPANET work predated the ISO model and evolved a

  5. Teleportation of Nonclassical Wave Packets of light

    CERN Document Server

    Lee, Noriyuki; Takeno, Yuishi; Takeda, Shuntaro; Webb, James; Huntington, Elanor; Furusawa, Akira

    2012-01-01

    We report on the experimental quantum teleportation of strongly nonclassical wave packets of light. To perform this full quantum operation while preserving and retrieving the fragile non-classicality of the input state, we have developed a broadband, zero-dispersion teleportation apparatus that works in conjunction with time-resolved state preparation equipment. Our approach brings within experimental reach a whole new set of hybrid protocols involving discrete- and continuous-variable techniques in quantum information processing for optical sciences.

  6. Voice Communications Over Packet Radio Networks.

    Science.gov (United States)

    1985-03-01

    standpoint, the major difference between telephone networks and packet radio networks concerns the availabilty of time slots over each frame. The...mentioning that simulations require large amounts of detailed knowledge about the structure of the system and about patterns of usage . Simulation is...proposed time slot algorithm adopts. Moreover, the proposed time slot scheme may give more uniform usage of time slots in each time frame. In addition

  7. Spectral Modulation by Rotational Wave Packets

    Science.gov (United States)

    Baertschy, Mark; Hartinger, Klaus

    2005-05-01

    Periodic rephasing of molecular rotational wave packets can create rapid fluctuations in the optical properties of a molecular gas which can be used to manipulate the temporal phase and spectral content of ultrashort light pulses. We have demonstrated spectral control of a time-delayed ultrafast probe pulse propagating through the rotational wave packet prepared by a pump laser pulse. The spectrum of the probe pulse can be either broadened or compressed, depending on the relative sign of the temporal phase modulation and the initial chirp of the probe pulse. Adjustment of the spectral phase at the output of the interaction region allows controlled temporal pulse streching^1 and compression^2. The degree to which the spectrum of an ultrafast pulse can be modified depends on the strength and shape of the rotational wavepacket. We are studying the optimization of the rotational wave packet excitation with complex, shaped pump laser pulses for the purpose of optimizing probe pulse spectra modulation. ^1 Klaus Hartinger and Randy A. Bartels, Opt. Lett., submitted (2005). ^2 R.A. Bartels, T.C. Weinacht, N. Wagner, M. Baertschy, Chris H. Greene, M.M. Murnane, and H.C. Kapteyn , Phys. Rev. Lett., 88, 013903 (2002). This work was supported by the NSF.

  8. Turbulent Spot Pressure Fluctuation Wave Packet Model

    Energy Technology Data Exchange (ETDEWEB)

    Dechant, Lawrence J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    Wave packet analysis provides a connection between linear small disturbance theory and subsequent nonlinear turbulent spot flow behavior. The traditional association between linear stability analysis and nonlinear wave form is developed via the method of stationary phase whereby asymptotic (simplified) mean flow solutions are used to estimate dispersion behavior and stationary phase approximation are used to invert the associated Fourier transform. The resulting process typically requires nonlinear algebraic equations inversions that can be best performed numerically, which partially mitigates the value of the approximation as compared to a more complete, e.g. DNS or linear/nonlinear adjoint methods. To obtain a simpler, closed-form analytical result, the complete packet solution is modeled via approximate amplitude (linear convected kinematic wave initial value problem) and local sinusoidal (wave equation) expressions. Significantly, the initial value for the kinematic wave transport expression follows from a separable variable coefficient approximation to the linearized pressure fluctuation Poisson expression. The resulting amplitude solution, while approximate in nature, nonetheless, appears to mimic many of the global features, e.g. transitional flow intermittency and pressure fluctuation magnitude behavior. A low wave number wave packet models also recover meaningful auto-correlation and low frequency spectral behaviors.

  9. Printed Persian Subword Recognition Using Wavelet Packet Descriptors

    Directory of Open Access Journals (Sweden)

    Samira Nasrollahi

    2013-01-01

    Full Text Available In this paper, we present a new approach to offline OCR (optical character recognition for printed Persian subwords using wavelet packet transform. The proposed algorithm is used to extract font invariant and size invariant features from 87804 subwords of 4 fonts and 3 sizes. The feature vectors are compressed using PCA. The obtained feature vectors yield a pictorial dictionary for which an entry is the mean of each group that consists of the same subword with 4 fonts in 3 sizes. The sets of these features are congregated by combining them with the dot features for the recognition of printed Persian subwords. To evaluate the feature extraction results, this algorithm was tested on a set of 2000 subwords in printed Persian text documents. An encouraging recognition rate of 97.9% is got at subword level recognition.

  10. Discrete Wave-Packet Representation in Nuclear Matter Calculations

    CERN Document Server

    Müther, H; Kukulin, V I; Pomerantsev, V N

    2016-01-01

    The Lippmann-Schwinger equation for the nucleon-nucleon $t$-matrix as well as the corresponding Bethe-Goldstone equation to determine the Brueckner reaction matrix in nuclear matter are reformulated in terms of the resolvents for the total two-nucleon Hamiltonians defined in free space and in medium correspondingly. This allows to find solutions at many energies simultaneously by using the respective Hamiltonian matrix diagonalization in the stationary wave packet basis. Among other important advantages, this approach simplifies greatly the whole computation procedures both for coupled-channel $t$-matrix and the Brueckner reaction matrix. Therefore this principally novel scheme is expected to be especially useful for self-consistent nuclear matter calculations because it allows to accelerate in a high degree single-particle potential iterations. Furthermore the method provides direct access to the properties of possible two-nucleon bound states in the nuclear medium. The comparison between reaction matrices f...

  11. Design and implementation considerations of a MSAT packet data network

    Science.gov (United States)

    Karam, Fouad G.; Hearn, Terry; Rohr, Doug; Guibord, Arthur F.

    The Mobile Data System, which is intended to provide for packet switched data services is currently under development. The system is based on a star network topology consisting of a centralized Data Hub (DH) serving a large number of mobile terminals. Through the Data Hub, end-to-end connections can be established between terrestrial users on public or private data networks and mobile users. The MDS network will be capable of offering a variety of services some of which are based on the standard X.25 network interface protocol, and others optimized for short messages and broadcast messages. A description of these services and the trade-offs in the DH design are presented.

  12. Avoiding Loops and Packet Losses in Internet Service Protocol Networks

    Directory of Open Access Journals (Sweden)

    B. Priyanka

    2014-03-01

    Full Text Available Abstract - Even in well managed Large ISP networks, failures of links and routers are common. Due to these failures the routers update their routing tables. Transient loops can occur in the networks when the routers adapt their forwarding tables. In this paper, a new approach is proposed that lets the network converge to its optimal state without loops and the related packet lossless. The mechanism (OUTFC-Ordered Updating Technique with Fast Convergence is based on an ordering of the updates of the forwarding tables of the routers and fast convergence. Typically we have chosen a Network consisting of routers and Link costs for simulation. Link failures are simulated. Avoiding transient loops in each case is demonstrated, by constructing a Reverse Shortest Path Tree (RSPT.

  13. On Limits of Embedded Systems in Network Packet Processing

    Directory of Open Access Journals (Sweden)

    Ondrej Vondrous

    2016-01-01

    Full Text Available The paper deals with a measurement of single-hop one way packet delay on embedded systems used for networking. The single-hop one way packet delay is essential parameter when we need to process packets with strict delivery time constrains. Comparison of different approaches to single-hop one way packet delay measurements is presented in this work along with discussion about strong and weak points in specific measurement approach. The impact of different types of system load and number of CPU cores are also covered by presented results. The presented results of measurement single-hop one way packet delay in embedded Linux system show that for the specific system configuration the packet processing delay depends (in different ways on system load and network stack load.

  14. Advanced Radio Resource Management for Multi Antenna Packet Radio Systems

    OpenAIRE

    Stanislav Nonchev; Mikko Valkama

    2010-01-01

    In this paper, we propose fairness-oriented packet scheduling (PS) schemes with power-efficientcontrol mechanism for future packet radio systems. In general, the radio resource managementfunctionality plays an important role in new OFDMA based networks. The control of the networkresource division among the users is performed by packet scheduling functionality based on maximizingcell coverage and capacity satisfying, and certain quality of service requirements. Moreover, multiantennatransmit-r...

  15. Loss Analysis of the Software-based Packet Capturing

    Directory of Open Access Journals (Sweden)

    Tamas Skopko

    2012-06-01

    Full Text Available Gigabit per second and higher bandwidths imply greater challenge to perform lossless packet capturing on generic PC architectures. This is because of software based capture solutions, which did not improve as fast as network bandwidth and they still heavily rely on the OS's packet processing mechanism. There are hardware and operating system factors that primarily affect capture performance. This paper summarizes these parameters and shows how to predict packet loss ratio during the capture process.

  16. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  17. Fast packet switch architectures for broadband integrated services digital networks

    Science.gov (United States)

    Tobagi, Fouad A.

    1990-01-01

    Background information on networking and switching is provided, and the various architectures that have been considered for fast packet switches are described. The focus is solely on switches designed to be implemented electronically. A set of definitions and a brief description of the functionality required of fast packet switches are given. Three basic types of packet switches are identified: the shared-memory, shared-medium, and space-division types. Each of these is described, and examples are given.

  18. Square-integrability of multivariate metaplectic wave-packet representations

    Science.gov (United States)

    Ghaani Farashahi, Arash

    2017-03-01

    This paper presents a systematic study for harmonic analysis of metaplectic wave-packet representations on the Hilbert function space {{L}2}≤ft({{{R}}d}\\right) . The abstract notions of symplectic wave-packet groups and metaplectic wave-packet representations will be introduced. We then present an admissibility condition on closed subgroups of the real symplectic group \\text{Sp}≤ft({{{R}}d}\\right) , which guarantees the square-integrability of the associated metaplectic wave-packet representation on {{L}2}≤ft({{{R}}d}\\right) .

  19. Spreading of Ultrarelativistic Wave Packet and Redshift

    CERN Document Server

    Lev, Felix M

    2012-01-01

    The red shift of light coming to the Earth from distant objects is usually explained as a consequence of the fact that the Universe is expanding. Such an explanation implies that photons emitted by distant objects travel in the interstellar medium practically without interaction with interstellar matter and hence they can survive their long journey to the Earth. We analyze this assumption by considering wave-packet spreading for an ultrarelativistic particle. We derive a formula which shows that spreading in the direction perpendicular to the particle momentum is very important and cannot be neglected. The implications of the results are discussed.

  20. On Steganography in Lost Audio Packets

    CERN Document Server

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents a new hidden data insertion procedure based on estimated probability of the remaining time of the call for steganographic method called LACK (Lost Audio PaCKets steganography). LACK provides hidden communication for real-time services like Voice over IP. The analytical results presented in this paper concern the influence of LACK's hidden data insertion procedures on the method's impact on quality of voice transmission and its resistance to steganalysis. The proposed hidden data insertion procedure is also compared to previous steganogram insertion approach based on estimated remaining average call duration.

  1. Quantization of wavelet packet audio coding

    Institute of Scientific and Technical Information of China (English)

    Tan Jianguo; Zhang Wenjun; Liu Peilin

    2006-01-01

    The method of quantization noise control of audio coding in the wavelet domain is proposed. Using the inverse Discrete Fourier Transform (DFT), it converts the masking threshold coming from MPEG psycho-acoustic model in the frequency domain to the signal in the time domain; the Discrete Wavelet Packet Transform (DWPT) is performed; the energy in each subband is regarded as the maximum allowed quantization noise energy. The experimental result shows that the proposed method can attain the nearly transparent audio quality below 64kbps for the most testing audio signals.

  2. Packet scheduling for OFDMA based relay networks

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The combination of relay networks with orthogonal frequency division multiple access (OFDMA) has been proposed as a promising solution for the next generation wireless system. Considering different traffic classes and user quality of service (QoS), three efficient scheduling algorithms are introduced in such networks. The round-robin (RR) algorithm in relay networks serves as a performance benchmark. Numerical results show that the proposed algorithms achieve significant improvement on system throughput and decrease system packet loss rate, compared with the RR and absence of relaying system (traditional network). Furthermore, comparisons have been carried out among the three proposed algorithms.

  3. Scattering of wave packets with phases

    CERN Document Server

    Karlovets, Dmitry

    2016-01-01

    A general problem of $2\\rightarrow N_f$ scattering is addressed with all the states being wave packets with arbitrary phases. Depending on these phases, one deals with coherent states in $(3+1)$ D, vortex particles with orbital angular momentum, the Airy beams, and their generalizations. A method is developed in which a number of events represents a functional of the Wigner functions of such states. Using width of a packet $\\sigma_p/\\langle p\\rangle$ as a small parameter, the Wigner functions, the number of events, and a cross section are represented as power series in this parameter, the first non-vanishing corrections to their plane-wave expressions are derived, and generalizations for beams are made. Although in this regime the Wigner functions turn out to be everywhere positive, the cross section develops new specifically quantum features, inaccessible in the plane-wave approximation. Among them is dependence on an impact parameter between the beams, on phases of the incoming states, and on a phase of the...

  4. Scattering of wave packets with phases

    Science.gov (United States)

    Karlovets, Dmitry V.

    2017-03-01

    A general problem of 2 → N f scattering is addressed with all the states being wave packets with arbitrary phases. Depending on these phases, one deals with coherent states in (3 + 1) D, vortex particles with orbital angular momentum, the Airy beams, and their generalizations. A method is developed in which a number of events represents a functional of the Wigner functions of such states. Using width of a packet σ p /p> as a small parameter, the Wigner functions, the number of events, and a cross section are represented as power series in this parameter, the first non-vanishing corrections to their plane-wave expressions are derived, and generalizations for beams are made. Although in this regime the Wigner functions turn out to be everywhere positive, the cross section develops new specifically quantum features, inaccessible in the plane-wave approximation. Among them is dependence on an impact parameter between the beams, on phases of the incoming states, and on a phase of the scattering amplitude. A model-independent analysis of these effects is made. Two ways of measuring how a Coulomb phase and a hadronic one change with a transferred momentum t are discussed.

  5. Controlling the spreading of wave packets of a dissociating molecule

    DEFF Research Database (Denmark)

    Tiwari, Ashwani Kumar; Møller, Klaus Braagaard; Henriksen, Niels Engholm

    2007-01-01

    in the Franck-Condon region whereas, as well known, the positively chirped pulses focus the wave packet in the asymptotic region. For the negatively chirped pulses, we show that the time corresponding to the minimum in the width of the wave packet can be predicted by an analytical formula. (C) 2007 Elsevier B.V...

  6. Equations of motion for a relativistic wave packet

    Indian Academy of Sciences (India)

    L Kocis

    2012-05-01

    The time derivative of the position of a relativistic wave packet is evaluated. It is found that it is equal to the mean value of the momentum of the wave packet divided by the mass of the particle. The equation derived represents a relativistic version of the second Ehrenfest theorem.

  7. All-optical devices for ultrafast packet switching

    DEFF Research Database (Denmark)

    Dorren, H.J.S.; HerreraDorren, J.; Raz, O.;

    2007-01-01

    We discuss integrated devices for all-optical packet switching. We focus on monolithically integrated all-optical flip-flops, ultra-fast semiconductor based wavelength converters and explain the operation principles. Finally, a 160 Gb/s all-optical packet switching experiment over 110 km of field...

  8. Comparison of Deep Packet Inspection (DPI) Tools for Traffic Classification

    DEFF Research Database (Denmark)

    Bujlow, Tomasz; Carela-Español, Valentín; Barlet-Ros, Pere

    a dataset, which can be used to test all the traffic classifiers. In order to do that, we used our system to collect the complete packets from the network interfaces. The packets are grouped into flows, and each flow is collected together with the process name taken from Windows / Linux sockets, so...

  9. Continuing Development of California State Packet Radio Project.

    Science.gov (United States)

    Brownrigg, Edwin

    1992-01-01

    Provides background on the California State Library Packet Radio project, which will use packet radios to deploy a wireless, high-speed, wide-area network of 600 nodes, including 100 libraries, in the San Francisco Bay Area. Project goals and objectives, plan of operation, equipment, and evaluation plans are summarized. (MES)

  10. On Generalized Carleson Operators of Periodic Wavelet Packet Expansions

    Directory of Open Access Journals (Sweden)

    Shyam Lal

    2013-01-01

    Full Text Available Three new theorems based on the generalized Carleson operators for the periodic Walsh-type wavelet packets have been established. An application of these theorems as convergence a.e. for the periodic Walsh-type wavelet packet expansion of block function with the help of summation by arithmetic means has been studied.

  11. The Surgical Scrub. Instructor's Packet. Learning Activity Package.

    Science.gov (United States)

    Runge, Lillian

    This instructor's packet accompanies the learning activity package (LAP) on the surgical scrub. Contents included in the packet are a time sheet, suggested uses for the LAP, an instruction sheet, final LAP reviews, a final LAP review answer key, a student performance checklist, suggested activities, an additional resources list, and student…

  12. Detecting Black Holes in Packet-Radio Networks (SRNTN-56)

    Science.gov (United States)

    1989-01-01

    Black holes can occur in packet-switched networks that use distance- vector route calculation algorithms such as tier routing. This section briefly...reviews tier routing and defines new terms relevant to black holes . Packet radios use tier routing, a variation on distance-vector routing, to maintain

  13. Sculpture of Indonesia. [Teacher's Packet for a Teacher Workshop.

    Science.gov (United States)

    Asian Art Museum of San Francisco, CA.

    This teacher's packet accompanies a slide presentation on the sculpture found in Indonesia. The packet contains: (1) a slide list with descriptions listing time period and dimensions of each piece; (2) an introductory essay describing the setting of Indonesia, the Central Javanese Period and the Eastern Javanese Period; (3) descriptions of how to…

  14. Packet Delay Variation Analysis of the CQ Switch

    OpenAIRE

    I. Radusinović; I. Maljević; M. Radonjić

    2012-01-01

    Packet delay variation analysis for a 32x32 crosspoint queued switch under uniform and IBP arrival traffic is presented in this paper. Different buffer sizes and several scheduling algorithms are observed: longest queue first, round robin, exhaustive round robin and frame based round robin matching. Results show that the least packet delay variation, among observed algorithms, causes round robin algorithm.

  15. Packet Delay Variation Analysis of the CQ Switch

    Directory of Open Access Journals (Sweden)

    I. Radusinović

    2012-06-01

    Full Text Available Packet delay variation analysis for a 32x32 crosspoint queued switch under uniform and IBP arrival traffic is presented in this paper. Different buffer sizes and several scheduling algorithms are observed: longest queue first, round robin, exhaustive round robin and frame based round robin matching. Results show that the least packet delay variation, among observed algorithms, causes round robin algorithm.

  16. Validation of the Dementia Care Assessment Packet-Instrumental Activities of Daily Living

    OpenAIRE

    Lee, Seok Bum; Park, Jeong Ran; Yoo, Jeong-Hwa; Park, Joon Hyuk; Lee, Jung Jae; Yoon, Jong Chul; Jhoo, Jin Hyeong; Lee, Dong Young; Woo, Jong Inn; Han, Ji Won; Huh, Yoonseok; Kim, Tae Hui; Kim, Ki Woong

    2013-01-01

    Objective We aimed to evaluate the psychometric properties of the IADL measure included in the Dementia Care Assessment Packet (DCAP-IADL) in dementia patients. Methods The study involved 112 dementia patients and 546 controls. The DCAP-IADL was scored in two ways: observed score (OS) and predicted score (PS). The reliability of the DCAP-IADL was evaluated by testing its internal consistency, inter-rater reliability and test-retest reliability. Discriminant validity was evaluated by comparing...

  17. Learning packets in nursing education: reviving the past.

    Science.gov (United States)

    Xu, Yin; Martin, Madeleine; Gribbins, Ashley

    2010-05-01

    Learning packets gained popularity in nursing education in the 1960's. Recently, they have been cited as strategies for distance learning. The aim of this project was to integrate Topic Focused Learning Packets as a complementary teaching strategy for presentation of new content to large classes of undergraduate nursing students. In addition to reducing in-class content presentation time, goals included: fostering critical thinking, actively engaging the student, and providing opportunities for team-based interaction. Rationale, design process and packets will be described. The learning packet was viewed positively by the students and faculty. Among 134 students, 119 strongly agreed or agreed that the learning packet was effective in increasing their understanding of the content and achieving the course objectives. Copyright 2009 Elsevier Ltd. All rights reserved.

  18. Packet Classification using Support Vector Machines with String Kernels

    Directory of Open Access Journals (Sweden)

    Sarthak Munshi

    2016-08-01

    Full Text Available Since the inception of internet many methods have been devised to keep untrusted and malicious packets away from a user’s system . The traffic / packet classification can be used as an important tool to detect intrusion in the system. Using Machine Learning as an efficient statistical based approach for classifying packets is a novel method in practice today . This paper emphasizes upon using an advanced string kernel method within a support vector machine to classify packets .There exists a paper related to a similar problem using Machine Learning [2]. But the researches mentioned in their paper are not up-to date and doesn’t account for modern day string kernels that are much more efficient . My work extends their research by introducing different approaches to classify encrypted / unencrypted traffic / packets .

  19. Rotating Gaussian wave packets in weak external potentials

    Science.gov (United States)

    Goussev, Arseni

    2017-07-01

    We address the time evolution of two- and three-dimensional nonrelativistic Gaussian wave packets in the presence of a weak external potential of arbitrary functional form. The focus of our study is the phenomenon of rotation of a Gaussian wave packet around its center of mass, as quantified by mean angular momentum computed relative to the wave-packet center. Using a semiclassical approximation of the eikonal type, we derive an explicit formula for a time-dependent change of mean angular momentum of a wave packet induced by its interaction with a weak external potential. As an example, we apply our analytical approach to the scenario of a two-dimensional quantum particle crossing a tilted ridge potential barrier. In particular, we demonstrate that the initial orientation of the particle wave packet determines the sense of its rotation, and report a good agreement between analytical and numerical results.

  20. REDUCING BURST PACKET LOSS THROUGH ROUTE-FREE FORWARDING

    Institute of Scientific and Technical Information of China (English)

    Ma Hailong; Guo Yunfei; Cheng Dongnian; Zhang Jianwei

    2010-01-01

    It is well known that today's inter-domain routing protocol,Border Gateway Protocol (BGP),converges slowly during network failures. Due to the distribution nature of Internet routing decisions and the rate-limiting timer Minimum Route Advertisement Interval (MRAI) of BGP,unavoidable convergence latency is introduced in reaction to network changes. During the period of convergence temporarily routing table inconsistencies cause short-term routing blackholes and loops which result in widespread temporary burst packet loss. In this paper,we present ROute-Free Forwarding (ROFF) - a novel technique for packet delivering continuously during periods of convergence. With slightly modifications on IP packet header and BGP,route loops and blackholes can be avoided. Our preliminary evaluation demonstrates that ROFF succeeds in reducing the number of Autonomous Systems (ASes) which experience burst packet loss and the duration of packet loss.

  1. Poisson Packet Traffic Generation Based on Empirical Data

    Directory of Open Access Journals (Sweden)

    Andrej Kos

    2003-10-01

    Full Text Available An algorithm for generating equivalent Poisson packet traffic based on empirical traffic data is presented in this paper. Two steps are required in order to produce equivalent Poisson packet traffic. Real traffic trace is analyzed in the first step. In the second step, a new equivalent synthetic Poisson traffic is generated in such a way that the first order statistical parameters remain unchanged. New packet inter-arrival time series are produced in a random manner using negative exponential probability distribution with a known mean. New packet size series are also produced in a random manner. However, due to specified minimum and maximum packet sizes, a truncated exponential probability distribution is applied.

  2. Packet throughput performance of multiservice, multirate OCDMA in elastic networks

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    of both multirate techniques is proposed. The proposed formalism can be successfully applied for performance evaluation of any arbitrary number of user classes in the system as well as for both 1-D and 2-D codes. The bit error rate (BER) and packet correct probability expressions are derived considering......In this paper, the packet throughput performance of multiservice, multirate optical code-division multiple-access (OCDMA) networks is addressed based on two distinct multirate techniques, namely multilength code and multicode. A new analytical formalism to evaluate the packet throughput performance...... the multiple-access interference (MAI) as binomially distributed. The packet throughput expression, by its turn, is derived considering a Poisson distribution for the composite packet arrivals. Numerical results show that the multicode technique is a good candidate for future multiservice, multirate OCDMA...

  3. Scheduling Issues in ECOFRAME Optical Packet Switched Ring

    Directory of Open Access Journals (Sweden)

    P. Gravey

    2011-06-01

    Full Text Available In the metropolitan area, traditional SONET/SDH circuit switched rings are likely to be replaced with optical packet/burst switching technologies. In this paper we consider a slotted WDM optical packet ring operating without resource reservation mechanisms. In such rings, optical packets in transit have priority over traffic to be inserted by the node. Packets to be inserted are thus queued according to their destination, in order to avoid headof-line blocking. We focus on scheduling policies and compare several MaxWeight scheduling policies, including Oldest Packet First (OPF which emulates FIFO queueing while avoiding head-of-line blocking. We show that there is a trade-off between implementation complexity and fairness, and identify the Largest Virtual Waiting Time First (LVWTF scheduling policy as presenting both a low complexity and a good fairness performance.

  4. Performance analysis of a scalable optical packet switching architecture

    Science.gov (United States)

    Wu, Ho-Ting; Tuan, Chia-Wei

    2010-10-01

    We carry out the analysis of a scalable switching architecture for all-optical packet switching networks. The underlying switch is based on a 2×2 two-stage multibuffer switched delay-line-based optical switching node. By incorporating an additional bypass line and employing a novel switch control strategy, the optical packet switching node can effectively resolve packet contentions, thus reducing the packet deflection probability substantially. In this work, we develop an exact queueing model from a discrete time Markov chain (DTMC) to evaluate the system performance under bursty, nonbursty, symmetric, and asymmetric traffic conditions. The accurate deflection probability and mean packet delay are obtained from this analytical model. Furthermore, we derive an approximate analysis to calculate the lower bound of deflection probability without the heavy computational complexities incurred by the exact analytical model. Simulation results are performed to confirm the validity of our analytic models.

  5. Image coding based on energy-sorted wavelet packets

    Science.gov (United States)

    Kong, Lin-Wen; Lay, Kuen-Tsair

    1995-04-01

    The discrete wavelet transform performs multiresolution analysis, which effectively decomposes a digital image into components with different degrees of details. In practice, it is usually implemented in the form of filter banks. If the filter banks are cascaded and both the low-pass and the high-pass components are further decomposed, a wavelet packet is obtained. The coefficients of the wavelet packet effectively represent subimages in different resolution levels. In the energy-sorted wavelet- packet decomposition, all subimages in the packet are then sorted according to their energies. The most important subimages, as measured by the energy, are preserved and coded. By investigating the histogram of each subimage, it is found that the pixel values are well modelled by the Laplacian distribution. Therefore, the Laplacian quantization is applied to quantized the subimages. Experimental results show that the image coding scheme based on wavelet packets achieves high compression ratio while preserving satisfactory image quality.

  6. Advanced Radio Resource Management for Multi Antenna Packet Radio Systems

    CERN Document Server

    Nonchev, Stanislav; 10.5121/ijwmn.2010.2201

    2010-01-01

    In this paper, we propose fairness-oriented packet scheduling (PS) schemes with power-efficient control mechanism for future packet radio systems. In general, the radio resource management functionality plays an important role in new OFDMA based networks. The control of the network resource division among the users is performed by packet scheduling functionality based on maximizing cell coverage and capacity satisfying, and certain quality of service requirements. Moreover, multiantenna transmit-receive schemes provide additional flexibility to packet scheduler functionality. In order to mitigate inter-cell and co-channel interference problems in OFDMA cellular networks soft frequency reuse with different power masks patterns is used. Stemming from the earlier enhanced proportional fair scheduler studies for single-input multiple-output (SIMO) and multiple-input multipleoutput (MIMO) systems, we extend the development of efficient packet scheduling algorithms by adding transmit power considerations in the ove...

  7. Backpressure-Based Packet-By-Packet Adaptive Routing For Traffic Management in Communication Networks

    Directory of Open Access Journals (Sweden)

    P. Swetha,

    2014-06-01

    Full Text Available Back pressure-based adaptive routing algorithms where each packet is routed along a possibly different pathhave been extensively studied in the literature. However, suchalgorithms typically result in poor delay performance and involvehigh implementation complexity. In this paper, we develop anew adaptive routing algorithm built upon the widely-studiedback-pressure algorithm. We decouple the routing and schedulingcomponents of the algorithm by designing a probabilistic routingtable which is used to route packets to per-destination queues.The scheduling decisions in the case of wireless networks aremade using counters called shadow queues. The results arealso extended to the case of networks which employ simpleforms of network coding. In that case, our algorithm provides alow-complexity solution to optimally exploit the routing-codingtrade-off.

  8. One Packet Suffices - Highly Efficient Packetized Network Coding With Finite Memory

    CERN Document Server

    Haeupler, Bernhard

    2011-01-01

    Random Linear Network Coding (RLNC) has emerged as a powerful tool for robust high-throughput multicast. Projection analysis - a recently introduced technique - shows that the distributed packetized RLNC protocol achieves (order) optimal and perfectly pipelined information dissemination in many settings. In the original approach to RNLC intermediate nodes code together all available information. This requires intermediate nodes to keep considerable data available for coding. Moreover, it results in a coding complexity that grows linearly with the size of this data. While this has been identified as a problem, approaches that combine queuing theory and network coding have heretofore not provided a succinct representation of the memory needs of network coding at intermediates nodes. This paper shows the surprising result that, in all settings with a continuous stream of data, network coding continues to perform optimally even if only one packet per node is kept in active memory and used for computations. This l...

  9. Dynamic Homeostasis in Packet Switching Networks

    CERN Document Server

    Oka, Mizuki; Ikegami, Takashi

    2014-01-01

    In this study, we investigate the adaptation and robustness of a packet switching network (PSN), the fundamental architecture of the Internet. We claim that the adaptation introduced by a transmission control protocol (TCP) congestion control mechanism is interpretable as the self-organization of multiple attractors and stability to switch from one attractor to another. To discuss this argument quantitatively, we study the adaptation of the Internet by simulating a PSN using ns-2. Our hypothesis is that the robustness and fragility of the Internet can be attributed to the inherent dynamics of the PSN feedback mechanism called the congestion window size, or \\textit{cwnd}. By varying the data input into the PSN system, we investigate the possible self-organization of attractors in cwnd temporal dynamics and discuss the adaptability and robustness of PSNs. The present study provides an example of Ashby's Law of Requisite Variety in action.

  10. Differential AR algorithm for packet delay prediction

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Different delay prediction algorithms have been applied in multimedia communication, among which linear prediction is attractive because of its low complexity. AR (auto regressive) algorithm is a traditional one with low computation cost, while NLMS (normalize least mean square) algorithm is more precise. In this paper, referring to ARIMA (auto regression integrated with moving averages) model, a differential AR algorithm (DIAR) is proposed based on the analyses of both AR and NLMS algorithms. The prediction precision of the new algorithm is about 5-10 db higher than that of the AR algorithm without increasing the computation complexity.Compared with NLMS algorithm, its precision slightly improves by 0.1 db on average, but the algorithm complexity reduces more than 90%. Our simulation and tests also demonstrate that this method improves the performance of the average end-to-end delay and packet loss ratio significantly.

  11. Waveform and packet structure of lion roars

    Directory of Open Access Journals (Sweden)

    W. Baumjohann

    Full Text Available The Equator-S magnetometer is very sensitive and has a sampling rate of normally 128 Hz. The high sampling rate allows for the first time fluxgate magnetometer measurements of ELF waves between the ion cyclotron and the lower hybrid frequencies in the equatorial dayside magnetosheath. The so-called lion roars, typically seen by the Equator-S magnetometer at the bottom of the magnetic troughs of magnetosheath mirror waves, are near-monochromatic packets of electron whistler waves lasting for a few wave cycles only, typically 0.25 s. They are right-hand circularly polarized waves with typical amplitudes of 0.5–1 nT at around one tenth of the electron gyrofrequency. The cone angle between wave vector and ambient field is usually smaller than 1.5°.

    Key words. Interplanetary physics (MHD waves and turbulence; plasma waves and turbulence

  12. Interconnection between packet switching national networks and local packet radio communication networks

    Science.gov (United States)

    Talone, P.; Trigila, S.

    1985-07-01

    Multipoint topology networks based on a single statistically distributed radiocommunication channel are considered, referring only to restricted area networks with line of sight type links. The architecture and protocols of such networks are reviewed. The problems related to the interconnection of such networks with large public packet switching communication networks are examined. Several hypothesis are studied concluding that mainly in the case of emergencies or catastrophic events these networks are an extremely useful resource.

  13. Low-loss optical packet synchronization architecture

    Science.gov (United States)

    Franzen, Andre; Hunter, David K.; Andonovic, Ivan

    1998-10-01

    A novel synchronization architecture is presented for packet based optical networks, exhibiting low insertion loss and reduced crosstalk, taking advantage of the characteristics of AWG (arrayed waveguide grating) filters. Thus far, only logarithmic delay lines have been investigated rigorously, the generic structures either based on 2 X 2 switches or on a 1-to-m splitter combined with semiconductor optical amplifier gates. The first scheme introduces not only high loss but also crosstalk, producing a high amount of interferometric noise. The latter has a lot of splitting loss to accommodate but overall, fewer stages are necessary to achieve the same delay as more than two paths per stage can be set up. In this paper, AWGs in combination with wavelength converters replace the splitter/SOA-gate geometry minimizing the optical loss, ensuring that higher levels of optical power remain to traverse the adjacent switching matrix. This novel set-up ensures that only low levels of amplification are needed minimizing concomitant noise accumulation. An incoming cell or data stream will be converted to a distinct wavelength determined by an evaluation circuit in the electronic domain. The chosen wavelength maps the input to a length of fiber which in turn represents the necessary delay, effectively executing path length (and hence time alignment) equalization of different incoming packets. Once the wavelength conversion is executed the cell is fed into an AWG, governed by a `hardwired' translation-table (input/output), ensuring cells propagate to the correct output. Finer delays are realized by cascading the principle stage.

  14. Three-dimensional electromagnetic strong turbulence. II. Wave packet collapse and structure of wave packets during strong turbulence

    Energy Technology Data Exchange (ETDEWEB)

    Graham, D. B.; Robinson, P. A.; Cairns, Iver H. [School of Physics, University of Sydney, New South Wales 2006 (Australia); Skjaeraasen, O. [ProsTek, Institute for Energy Technology, P.O. Box 40, N-2027 Kjeller (Norway)

    2011-07-15

    Large-scale simulations of wave packet collapse are performed by numerically solving the three-dimensional (3D) electromagnetic Zakharov equations, focusing on individual wave packet collapses and on wave packets that form in continuously driven strong turbulence. The collapse threshold is shown to decrease as the electron thermal speed {nu}{sub e}/c increases and as the temperature ratio T{sub i}/T{sub e} of ions to electrons decreases. Energy lost during wave packet collapse and dissipation is shown to depend on {nu}{sub e}/c. The dynamics of density perturbations after collapse are studied in 3D electromagnetic strong turbulence for a range of T{sub i}/T{sub e}. The structures of the Langmuir, transverse, and total electric field components of wave packets during strong turbulence are investigated over a range of {nu}{sub e}/c. For {nu}{sub e}/c < or approx. 0.17, strong turbulence is approximately electrostatic and wave packets have very similar structure to purely electrostatic wave packets. For {nu}{sub e}/c > or approx. 0.17, transverse modes become trapped in density wells and contribute significantly to the structure of the total electric field. At all {nu}{sub e}/c, the Langmuir energy density contours of wave packets are predominantly oblate (pancake shaped). The transverse energy density contours of wave packets are predominantly prolate (sausage shaped), with the major axis being perpendicular to the major axes of the Langmuir component. This results in the wave packet becoming more nearly spherical as {nu}{sub e}/c increases, and in turn generates more spherical density wells during collapse. The results obtained are compared with previous 3D electrostatic results and 2D electromagnetic results.

  15. Throughput and delay performance analysis of packet aggregation scheme for PRMA

    DEFF Research Database (Denmark)

    Zhang, Qi; Iversen, Villy Bæk; Fitzek, F.H.P.

    2007-01-01

    Packet reservation multiple access (PRMA) protocol is an implicit reservation MAC protocol. It is initially designed for voice packets in the cellular networks [2, 3] but it is currently also used for data packets in OFDM based fixed wireless access networks [8, 9]. When it is applied for data...... packets, the system throughput depends on the size of packets and the number of consecutive packets. From the statistics of existent wireless data networks using PRMA protocol, it shows that the system throughput is quite low because of the inconsecutive small packets. In order to improve the throughput......, packet aggregation scheme is considered to be applied in PRMA. Before designing packet aggregation algorithm, it is worth investigating the effect of packet aggregation scheme on the performance of throughput and delay. In this paper we develop a generic Markov chain model for PRMA with packet...

  16. Throughput and Delay Performance Analysis of Packet Aggregation Scheme for PRMA

    DEFF Research Database (Denmark)

    Zhang, Qi; Iversen, Villy Bæk; Fitzek, Frank H.P.

    2008-01-01

    Packet reservation multiple access (PRMA) protocol is an implicit reservation MAC protocol. It is initially designed for voice packets in the cellular networks, but it is currently also used for data packets in OFDM based fixed wireless access networks. When it is applied for data packets......, the system throughput depends on the size of packets and the number of consecutive packets. From the statistics of existent wireless data networks using PRMA protocol, it shows that the system throughput is quite low because of the inconsecutive small packets. In order to improve the throughput, packet...... aggregation scheme is considered to be applied in PRMA. Before designing packet aggregation algorithm, it is worth investigating the effect of packet aggregation scheme on the performance of throughput and delay. In this paper we develop a generic Markov chain model for PRMA with packet aggregation. Based...

  17. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  18. Novel Adaptive Beamforming Algorithm Based on Wavelet Packet Transform

    Institute of Scientific and Technical Information of China (English)

    Zhang Xiaofei; Xu Dazhuan

    2005-01-01

    An analysis of the received signal of array antennas shows that the received signal has multi-resolution characteristics, and hence the wavelet packet theory can be used to detect the signal. By emplying wavelet packet theory to adaptive beamforming, a wavelet packet transform-based adaptive beamforming algorithm (WP-ABF) is proposed . This WP-ABF algorithm uses wavelet packet transform as the preprocessing, and the wavelet packet transformed signal uses least mean square algorithm to implement the adaptive beamforming. White noise can be wiped off under wavelet packet transform according to the different characteristics of signal and white under the wavelet packet transform. Theoretical analysis and simulations demonstrate that the proposed WP-ABF algorithm converges faster than the conventional adaptive beamforming algorithm and the wavelet transform-based beamforming algorithm. Simulation results also reveal that the convergence of the algorithm relates closely to the wavelet base and series; that is, the algorithm convergence gets better with the increasing of series, and for the same series of wavelet base the convergence gets better with the increasing of regularity.

  19. A New Iterated Local Search Algorithm for Solving Broadcast Scheduling Problems in Packet Radio Networks

    Directory of Open Access Journals (Sweden)

    Chih-Chiang Lin

    2010-01-01

    Full Text Available The broadcast scheduling problem (BSP in packet radio networks is a well-known NP-complete combinatorial optimization problem. The broadcast scheduling avoids packet collisions by allowing only one node transmission in each collision domain of a time division multiple access (TDMA network. It also improves the transmission utilization by assigning one transmission time slot to one or more nodes; thus, each node transmits at least once in each time frame. An optimum transmission schedule could minimize the length of a time frame while minimizing the number of idle nodes. In this paper, we propose a new iterated local search (ILS algorithm that consists of two special perturbation and local search operators to solve the BSPs. Computational experiments are applied to benchmark data sets and randomly generated problem instances. The experimental results show that our ILS approach is effective in solving the problems with only a few runtimes, even for very large networks with 2,500 nodes.

  20. Monte Carlo wave packet approach to dissociative multiple ionization in diatomic molecules

    DEFF Research Database (Denmark)

    Leth, Henriette Astrup; Madsen, Lars Bojer; Mølmer, Klaus

    2010-01-01

    A detailed description of the Monte Carlo wave packet technique applied to dissociative multiple ionization of diatomic molecules in short intense laser pulses is presented. The Monte Carlo wave packet technique relies on the Born-Oppenheimer separation of electronic and nuclear dynamics...... and provides a consistent theoretical framework for treating simultaneously both ionization and dissociation. By simulating the detection of continuum electrons and collapsing the system onto either the neutral, singly ionized or doubly ionized states in every time step the nuclear dynamics can be solved....... The computational effort is restricted and the model is applicable to any molecular system where electronic Born-Oppenheimer curves, dipole moment functions, and ionization rates as a function of nuclear coordinates can be determined....

  1. An algorithmic technique for a class of queueing models with packet switching applications

    Science.gov (United States)

    Morris, R. J. T.

    The need to analyze the performance of a class of hardware packet switches leads to consideration of a queueing model consisting of a single server queue with input given by a function of a Markov chain. An algorithmic technique is developed to obtain the joint stationary distribution of the bivariate Markov chain which describes the system. Both the infinite and finite capacity cases are considered. The technique is used to study several design issues which arise when a packet switch is subjected to independent streams of bursty input traffic. Guidelines are given which aid in estimating the queueing space required to keep traffic losses acceptably small. It is seen that the commonly employed heuristic of dimensioning queueing space using the tail of the infinite capacity distribution can lead to considerable error when compared with exact results.

  2. SURVEY

    DEFF Research Database (Denmark)

    SURVEY er en udbredt metode og benyttes inden for bl.a. samfundsvidenskab, humaniora, psykologi og sundhedsforskning. Også uden for forskningsverdenen er der mange organisationer som f.eks. konsulentfirmaer og offentlige institutioner samt marketingsafdelinger i private virksomheder, der arbejder...... med surveys. Denne bog gennemgår alle surveyarbejdets faser og giver en praktisk indføring i: • design af undersøgelsen og udvælgelse af stikprøver, • formulering af spørgeskemaer samt indsamling og kodning af data, • metoder til at analysere resultaterne...

  3. Analysis of circular wave packets generated by pulsed electric fields

    Energy Technology Data Exchange (ETDEWEB)

    Yoshida, S., E-mail: shuhei@concord.itp.tuwien.ac.at [Institute for Theoretical Physics, Vienna University of Technology, Vienna (Austria); Reinhold, C.O. [Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831-6372 (United States); Department of Physics, University of Tennessee, Knoxville, TN 37996 (United States); Burgdoerfer, J. [Institute for Theoretical Physics, Vienna University of Technology, Vienna (Austria); Department of Physics, University of Tennessee, Knoxville, TN 37996 (United States); Wyker, B.; Ye, S.; Dunning, F.B. [Department of Physics and Astronomy and the Rice Quantum Institute, Rice University, Houston, TX 77005-1892 (United States)

    2012-05-15

    We demonstrate that circular wave packets in high Rydberg states generated by a pulsed electric field applied to extreme Stark states are characterized by a position-dependent energy gradient that leads to a correlation between the principal quantum number n and the spatial coordinate. This correlation is rather insensitive to the initial state and can be seen even in an incoherent mix of states such as is generated experimentally allowing information to be placed into, and extracted from, such wave packets. We show that detailed information on the spatial distribution of a circular wave packet can be extracted by analyzing the complex phase of its expansion coefficients.

  4. Lost Audio Packets Steganography: The First Practical Evaluation

    CERN Document Server

    Mazurczyk, Wojciech

    2011-01-01

    This paper presents first experimental results for an IP telephony-based steganographic method called LACK (Lost Audio PaCKets steganography). This method utilizes the fact that in typical multimedia communication protocols like RTP (Real-Time Transport Protocol), excessively delayed packets are not used for the reconstruction of transmitted data at the receiver, i.e. these packets are considered useless and discarded. The results presented in this paper were obtained basing on a functional LACK prototype and show the method's impact on the quality of voice transmission. Achievable steganographic bandwidth for the different IP telephony codecs is also calculated.

  5. Architectures of electro-optical packet switched networks

    DEFF Research Database (Denmark)

    Berger, Michael Stubert

    2004-01-01

    and examines possible architectures for future high capacity networks with high capacity nodes. It is assumed that optics will play a key role in this scenario, and in this respect, the European IST research project DAVID aimed at proposing viable architectures for optical packet switching, exploiting the best......, Constraint Based Routing is examined, and the effect from taking the link load into account is evaluated. It is believed that electrical packet switching will satisfy demands in the coming years, and this work covers several aspects hereof. A new load balancing scheme for multipath packet switches...

  6. SDRAM-based packet buffer model for high speed switches

    DEFF Research Database (Denmark)

    Rasmussen, Anders; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This article investigates the how the performance of SDRAM based packet buffering systems for high performance switches can be simulated using OPNET. In order to include the access pattern dependent performance of SDRAM modules in simulations, a custom SDRAM model is implemented in OPNET Modeller...... based on the specifications of a real-life DDR3-SDRAM chip. Based on this model the performance of different schemes for optimizing the performance of such a packet buffer can be evaluated. The purpose of this study is to find efficient schemes for memory mapping of the packet queues and I/O traffic...

  7. A channel distortion model for video over lossy packet networks

    Institute of Scientific and Technical Information of China (English)

    CHENG Jian-xin; GAO Zhen-ming; ZHANG Zhi-chao

    2006-01-01

    Error-resilient video communication over lossy packet networks is often designed and operated based on models for the effect of losses on the reconstructed video quality. This paper analyzes the channel distortion for video over lossy packet networks and proposes a new model that, compared to previous models, more accurately estimates the expected mean-squared error distortion for different packet loss patterns by accounting for inter-frame error propagation and the correlation between error frames. The accuracy of the proposed model is validated with JVT/H.264 encoded standard test sequences and previous frame concealment, where the proposed model provides an obvious accuracy gain over previous models.

  8. FIFO Queueing Policies for Packets with Heterogeneous Processing

    CERN Document Server

    Kogan, Kirill; Nikolenko, Sergey I; Sirotkin, Alexander V; Tugaryov, Denis

    2012-01-01

    We consider the problem of managing a bounded size First-In-First-Out (FIFO) queue buffer, where each incoming unit-sized packet requires several rounds of processing before it can be transmitted out. Our objective is to maximize the total number of successfully transmitted packets. We consider both push-out (when the policy is permitted to drop already admitted packets) and non-push-out cases. In particular, we provide analytical guarantees for the throughput performance of our algorithms. We further conduct a comprehensive simulation study which experimentally validates the predicted theoretical behaviour.

  9. Research on performance of multicasting in optical packet switched networks

    Institute of Scientific and Technical Information of China (English)

    Xin Liu; Yuefeng Ji; Lin Bai; Hongxiang Wang; Yongmei Sun

    2009-01-01

    @@ Different multicasting schemes in optical packet switched networks are discussed, including the parallel mode, serial mode, and hybrid mode multicasting schemes.Simulated modeling technique is applied to compare the network-level performance of the three multicasting schemes.A conclusion can be drawn from the results that since the hybrid-mode multicasting scheme can increase the multicast success ratio and reduce the packet retransmission times compared with the other two schemes, it is the best choice for delivering multicasting sessions in the optical packet switched networks.

  10. Massachusetts Bay - Internal wave packets digitized from SAR imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This feature class contains internal wave packets digitized from SAR imagery at 1:350,000 scale in Massachusetts Bay. Internal waves are nonsinusoidal waves that...

  11. Neutrino Oscillations in Intermediate States.II -- Wave Packets

    CERN Document Server

    Asahara, A; Shimomura, T; Yabuki, T

    2004-01-01

    We analyze oscillations of intermediate neutrinos in terms of scattering of particles described by Gaussian wave packets. We study a scalar model as in the previous paper (I) but in realistic situations, where two particles of the initial state and final state are wave packets and neutrinos are in the intermediate state. The oscillation of the intermediate neutrino is found from the time evolution of the total transition probability between the initial state and final state. The effect of a finite lifetime and a finite relaxation time $\\tau$ are also studied. We find that the oscillation pattern depends on the magnitude of wave packet sizes of particles in the initial state and final state and the lifetime of the initial particle. For $\\Delta m^2=10^{-2}$ eV$^2$, the oscillation probability deviates from the standard formula, if the wave packet sizes are around $10^{-13}$ m for 0.4 MeV neutrino.

  12. IMPLEMENTATION OF LABVIEW BASED PACKET LOGGER FOR ZIGBEE NETWORK

    Directory of Open Access Journals (Sweden)

    B. UDAYA KUMAR,

    2010-08-01

    Full Text Available ZigBee is a wireless technology being deployed for wireless sensor networks. Low data rate personal area network applications like smart home automation, greenhouse monitoring and healthcare use ZigBee, a high level communication protocol as a standard to acquire the data. The data from the sensor nodes are monitored and logged using packet sniffer. The available sniffers in the market need additional hardware with dedicated software which costs more. Also the packet sniffer has to be compatible with the sensor node hardware. In this paper, sniffing of packets at the base station is implemented using LabView. With Texas Instruments Z-Accel Modules, a tree topology is established and temperature is monitored, logged with time stamping and packet data analysis is presented.

  13. Stabilization of Networked Control System with Packet-Dropout

    Directory of Open Access Journals (Sweden)

    Hooman Sanatizadeh

    2014-10-01

    Secondly, by above method an inverted pendulum which was controlled in a network with delays, is controlled in a network through packet-dropouts. simulation results show the effectiveness of the above method.

  14. Group-normalized processing of complex wavelet packets

    Institute of Scientific and Technical Information of China (English)

    石卓尔; 保铮

    1997-01-01

    Linear phase is not possible for real valued FIR QMF, while linear phase FIR biorthogonal wavelet filter banks make the mean squared error of the constructed signal exceed that of the quantization error. W Lawton’ s method for complex valued wavelets construction is extended to generate the complex valued compactly supported wavelet packets that are symmetrical and unitary orthogonal; then well-defined wavelet packets are chosen by the analysis remarks on their time-frequency characteristics. Since the traditional wavelel packets transform coefficients do not exactly represent the strength of signal components, a modified adaptive wavelets transform, group-normalized wavelet packet transform (GNWPT), is presented and utilized for target extraction from formidable clutter or noises with the time-frequency masking technique. The extended definition of lp-norm entropy improves the performance cf GNWPT. Similar method can also be applied to image enhancement, clutter and noise suppression, optimal detection

  15. Resonance-Assisted Decay of Nondispersive Wave Packets

    OpenAIRE

    Wimberger, S.; Schlagheck, P.; Eltschka, C.; Buchleitner, A.

    2006-01-01

    We present a quantitative semiclassical theory for the decay of nondispersive electronic wave packets in driven, ionizing Rydberg systems. Statistically robust quantities are extracted combining resonance assisted tunneling with subsequent transport across chaotic phase space and a final ionization step.

  16. [Monte Vista National Wildlife Refuge livestock grazing lawsuit : Information packet

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Packet of information from the Colorado Cattlemen's Association concerning the 1992 lawsuit filed against the Monte Vista National Wildlife Refuge. The suit was...

  17. Value of Optical Bypass in Packet Ring Networks

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    This paper firstly examines the value of optical bypass scheme in packet ring networks. An Integer Linear Program (ILP) formulation is presented and analytical results under different traffic patterns are given.

  18. Some Results on the Wavelet Packet Decomposition of Nonstationary Processes

    Directory of Open Access Journals (Sweden)

    Touati Sami

    2002-01-01

    Full Text Available Wavelet/wavelet packet decomposition has become a very useful tool in describing nonstationary processes. Important examples of nonstationary processes encountered in practice are cyclostationary processes or almost-cyclostationary processes. In this paper, we study the statistical properties of the wavelet packet decomposition of a large class of nonstationary processes, including in particular cyclostationary and almost-cyclostationary processes. We first investigate in a general framework, the existence and some properties of the cumulants of wavelet packet coefficients. We then study more precisely the almost-cyclostationary case, and determine the asymptotic distributions of wavelet packet coefficients. Finally, we particularize some of our results in the cyclostationary case before providing some illustrative simulations.

  19. Analysis of Transmissions Scheduling with Packet Fragmentation

    Directory of Open Access Journals (Sweden)

    Nir Menakerman

    2001-12-01

    Full Text Available We investigate a scheduling problem in which packets, or datagrams, may be fragmented. While there are a few applications to scheduling with datagram fragmentation, our model of the problem is derived from a scheduling problem present in data over CATV networks. In the scheduling problem datagrams of variable lengths must be assigned (packed into fixed length time slots. One of the capabilities of the system is the ability to break a datagram into several fragments. When a datagram is fragmented, extra bits are added to the original datagram to enable the reassembly of all the fragments. We convert the scheduling problem into the problem of bin packing with item fragmentation, which we define in the following way: we are asked to pack a list of items into a minimum number of unit capacity bins. Each item may be fragmented in which case overhead units are added to the size of every fragment. The cost associated with fragmentation renders the problem NP-hard, therefore an approximation algorithm is needed. We define a version of the well-known Next-Fit algorithm, capable of fragmenting items, and investigate its performance. We present both worst case and average case results and compare them to the case where fragmentation is not allowed.

  20. Packet QoS level classifier based on optical binary priority comparison.

    Science.gov (United States)

    Song, Seoksu; Nguyen, Vancanh; Park, Jinwoo

    2010-07-19

    Next generation High-Speed optical packet switching networks require components capable of classifying incoming packet into the appropriate priority queue according to the service class of the packet. For the first time, we proposed an all-optical packet QoS (Quality of Service) level classifier employing a sequential binary packet priority comparator, which is implemented using the SOA-based optical logic gates. The performance of the optical binary packet priority comparator was verified experimentally at 1 Gbit/s showing that the proposed scheme can operate higher data rates. These packet level classifier structures are attractive for all-optical network and applications.

  1. Performance improvement for optical packet switch with shared buffers

    Institute of Scientific and Technical Information of China (English)

    Junjie Yang; Qingji Zeng; Jie Li; Tong Ye; Guolong Zhu

    2005-01-01

    @@ In this paper, an inner wavelength method is proposed to enlarge buffering capacity of shared fiber delay line buffers. In addition, an optical packet switch called extended shared buffer type optical packet switch(extended SB-OPS) is proposed to realize the inner wavelength method. In order to further improve performance of extended SB-OPS, a greedy algorithm based on inner wavelength method is introduced.The performance of extended SB-OPS is evaluated by simulation experiments.

  2. IMPROVEMENT OF TCAM-BASED PACKET CLASSIFICATION ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    Xu Zhen; Zhang Jun; Rui Liyang; Sun Jun

    2008-01-01

    The feature of Ternary Content Addressable Memories (TCAMs) makes them particularly attractive for IP address lookup and packet classification applications in a router system. However, the limitations of TCAMs impede their utilization. In this paper, the solutions for decreasing the power consumption and avoiding entry expansion in range matching are addressed. Experimental results demonstrate that the proposed techniques can make some big improvements on the performance of TCAMs in IP address lookup and packet classification.

  3. Embedded wavelet packet transform technique for texture compression

    Science.gov (United States)

    Li, Jin; Cheng, Po-Yuen; Kuo, C.-C. Jay

    1995-09-01

    A highly efficient texture compression scheme is proposed in this research. With this scheme, energy compaction of texture images is first achieved by the wavelet packet transform, and an embedding approach is then adopted for the coding of the wavelet packet transform coefficients. By comparing the proposed algorithm with the JPEG standard, FBI wavelet/scalar quantization standard and the EZW scheme with extensive experimental results, we observe a significant improvement in the rate-distortion performance and visual quality.

  4. Wave packet dynamics of potassium dimers attached to helium nanodroplets

    OpenAIRE

    Claas, P.; Droppelmann, G.; Schulz, C. P.; Mudrich, M.; Stienkemeier, F.

    2006-01-01

    The dynamics of vibrational wave packets excited in K$_2$ dimers attached to superfluid helium nanodroplets is investigated by means of femtosecond pump-probe spectroscopy. The employed resonant three-photon-ionization scheme is studied in a wide wavelength range and different pathways leading to K$^+_2$-formation are identified. While the wave packet dynamics of the electronic ground state is not influenced by the helium environment, perturbations of the electronically excited states are obs...

  5. Bandwidth and Detection of Packet Length Covert Channels

    Science.gov (United States)

    2011-03-01

    hidden or covert information. This contrasts with methods like steganography , which refers to hiding information in content [4]. In this thesis, we...series of packets. Nair then used a technique that has been applied in steganography of images to compare the normal packet length vector to a covert...Papadopoulos, and J. Neil, “Eliminating steganography in internet traffic with active wardens,” in Information Hiding, ser. Lecture Notes in

  6. Electronic Wave Packet in a Quantized Electromagnetic Field

    Institute of Scientific and Technical Information of China (English)

    程太旺; 薛艳丽; 李晓峰; 吴令安; 傅盘铭

    2002-01-01

    We study a non-stationary electronic wave packet in a quantized electromagnetic field. Generally, the electron and field become entangled as the electronic wave packet evolves. Here we find that, when the initial photon state is a coherent one, the wavefunction of the system can be factorized if we neglect the transferred photon number. In this case, the quantized-field calculation is equivalent to the semi-classical calculation.

  7. On wave-packet dynamics in a decaying quadratic potential

    DEFF Research Database (Denmark)

    Møller, Klaus Braagaard; Henriksen, Niels Engholm

    1997-01-01

    We consider the time-dependent Schrodinger equation for a quadratic potential with an exponentially decaying force constant. General analytical solutions are presented and we highlight in particular, the signatures of classical mechanics in the wave packet dynamics.......We consider the time-dependent Schrodinger equation for a quadratic potential with an exponentially decaying force constant. General analytical solutions are presented and we highlight in particular, the signatures of classical mechanics in the wave packet dynamics....

  8. Label-controlled optical packet routing technologies and applications

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Yan, N.; Vegas Olmos, Juan José;

    2007-01-01

    An overview is given of various optical packet labeling techniques. The architecture and technologies are discussed for optical packet routing nodes using orthogonal labeling with optoelectronic label processing, and for nodes using time-serial labeling with all-optical time-serial label processing....... An example of a nearterm application is given, and a comparison of routing technologies is made regarding their cost and reliability aspects....

  9. Discrete wave-packet representation in nuclear matter calculations

    Science.gov (United States)

    Müther, H.; Rubtsova, O. A.; Kukulin, V. I.; Pomerantsev, V. N.

    2016-08-01

    The Lippmann-Schwinger equation for the nucleon-nucleon t matrix as well as the corresponding Bethe-Goldstone equation to determine the Brueckner reaction matrix in nuclear matter are reformulated in terms of the resolvents for the total two-nucleon Hamiltonians defined in free space and in medium correspondingly. This allows one to find solutions at many energies simultaneously by using the respective Hamiltonian matrix diagonalization in the stationary wave-packet basis. Among other important advantages, this approach simplifies greatly the whole computation procedures both for the coupled-channel t matrix and the Brueckner reaction matrix. Therefore this principally novel scheme is expected to be especially useful for self-consistent nuclear matter calculations because it allows one to accelerate in a high degree single-particle potential iterations. Furthermore the method provides direct access to the properties of possible two-nucleon bound states in the nuclear medium. The comparison between reaction matrices found via the numerical solution of the Bethe-Goldstone integral equation and the straightforward Hamiltonian diagonalization shows a high accuracy of the method suggested. The proposed fully discrete approach opens a new way to an accurate treatment of two- and three-particle correlations in nuclear matter on the basis of the three-particle Bethe-Faddeev equation by an effective Hamiltonian diagonalization procedure.

  10. DESIGN OF AN ARRAYED WAVEGUIDE GRATINGS BASED OPTICAL PACKET SWITCH

    Directory of Open Access Journals (Sweden)

    VAIBHAV SHUKLA

    2016-12-01

    Full Text Available Optical packet switching is considered as the future of data transfer technologyin combination with middle-aged electronics. The biggest challenge encountered in optical packet switching is the lack of optical buffers for storing the contending packets. Therefore, for the contention resolution of packets, a temporary storage in terms of fiber delay lines is used. This task is accomplished by an optical packet switch. In this paper, a design modification in the AWGR (Arrayed Waveguide Grating Router is presented for improving the switch performance. The power budget analysis of the switch is also presented to estimate the sufficient power level of the switch. The obtained results clearly reveal that the architecture presented in this paper can be operated in micro-watts in comparison to the earlier optical switch which operates in milli watts regime. Finally, simulation results are presented to obtain packet loss probability and average delay. Even at the higher load of 0.6, the switch presented in this paper provides a very low loss probability (10^6 and delay remain within 2 slots.

  11. TCP Packet Trace Analysis. M.S. Thesis

    Science.gov (United States)

    Shepard, Timothy J.

    1991-01-01

    Examination of a trace of packets collected from the network is often the only method available for diagnosing protocol performance problems in computer networks. This thesis explores the use of packet traces to diagnose performance problems of the transport protocol TCP. Unfortunately, manual examination of these traces can be so tedious that effective analysis is not possible. The primary contribution of this thesis is a graphical method of displaying the packet trace which greatly reduce, the tediousness of examining a packet trace. The graphical method is demonstrated by the examination of some packet traces of typical TCP connections. The performance of two different implementations of TCP sending data across a particular network path is compared. Traces many thousands of packets long are used to demonstrate how effectively the graphical method simplifies examination of long complicated traces. In the comparison of the two TCP implementations, the burstiness of the TCP transmitter appeared to be related to the achieved throughput. A method of quantifying this burstiness is presented and its possible relevance to understanding the performance of TCP is discussed.

  12. Multi-resolution schemes for time scaled propagation of wave packets

    CERN Document Server

    Frapiccini, Ana Laura; Mota-Furtado, Francisca; O'Mahony, Patrick F; Piraux, Bernard

    2014-01-01

    We present a detailed analysis of the time scaled coordinate approach and its implementation for solving the time-dependent Schr\\"odinger equation describing the interaction of atoms or molecules with radiation pulses. We investigate and discuss the performance of multi-resolution schemes for the treatment of the squeezing around the origin of the bound part of the scaled wave packet. When the wave packet is expressed in terms of B-splines, we consider two different types of breakpoint sequences: an exponential sequence with a constant density and an initially uniform sequence with a density of points around the origin that increases with time. These two multi-resolution schemes are tested in the case of a one-dimensional gaussian potential and for atomic hydrogen. In the latter case, we also use Sturmian functions to describe the scaled wave packet and discuss a multi-resolution scheme which consists in working in a sturmian basis characterized by a set of non-linear parameters. Regarding the continuum part ...

  13. Consensus of Multiagent Systems with Packet Losses and Communication Delays Using a Novel Control Protocol

    Directory of Open Access Journals (Sweden)

    Zheping Yan

    2014-01-01

    Full Text Available This paper studies the consensus problem of multiagent system with packet losses and communication delays under directed communication channels. Different from previous research results, a novel control protocol is proposed depending only on periodic sampling and transmitting data in order to be convenient for practical implementation. Due to the randomicity of transmission delays and packet losses, each agent updates its input value asynchronously at discrete time instants with synchronized time stamped information and evolves in continuous time. Consensus conditions for multiagent system consists of three typical dynamics including single integrator, double integrator, and high-order integrator that are all discussed in this paper. It is proved that, for single integrator agents and double integrator systems with only communication delays, consensusability can be ensured through stochastic matrix theory if the designed communication topology contains a directed spanning tree. While, for double integrator agents and high-order integrator agents with packet losses and communication delays, the interval system theory is introduced to prove the consensus of multiagent system under the condition that the designed communication topology is a directed spanning tree. Finally, simulations are carried out to validate the effectiveness of the proposed solutions.

  14. Combining Single and Packet-Ray Tracing for Arbitrary Ray Distributions on the Intel MIC Architecture.

    Science.gov (United States)

    Benthin, Carsten; Wald, Ingo; Woop, Sven; Ernst, Manfred; Mark, William R

    2012-09-01

    Wide-SIMD hardware is power and area efficient, but it is challenging to efficiently map ray tracing algorithms to such hardware especially when the rays are incoherent. The two most commonly used schemes are either packet tracing, or relying on a separate traversal stack for each SIMD lane. Both work great for coherent rays, but suffer when rays are incoherent: The former experiences a dramatic loss of SIMD utilization once rays diverge; the latter requires a large local storage, and generates multiple incoherent streams of memory accesses that present challenges for the memory system. In this paper, we introduce a single-ray tracing scheme for incoherent rays that uses just one traversal stack on 16-wide SIMD hardware. It uses a bounding-volume hierarchy with a branching factor of four as the acceleration structure, exploits four-wide SIMD in each box and primitive intersection test, and uses 16-wide SIMD by always performing four such node or primitive tests in parallel. We then extend this scheme to a hybrid tracing scheme that automatically adapts to varying ray coherence by starting out with a 16-wide packet scheme and switching to the new single-ray scheme as soon as rays diverge. We show that on the Intel Many Integrated Core architecture this hybrid scheme consistently, and over a wide range of scenes and ray distributions, outperforms both packet and single-ray tracing.

  15. Improving Packet Delivery Performance of Publish/Subscribe Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ernesto García Davis

    2013-01-01

    Full Text Available MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs. The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO. This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K. Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP.

  16. Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks.

    Science.gov (United States)

    Davis, Ernesto García; Calveras, Anna; Demirkol, Ilker

    2013-01-04

    MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs). The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO). This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR) at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K). Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP.

  17. Improving Packet Delivery Performance of Publish/Subscribe Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Davis, Ernesto García; Calveras, Anna; Demirkol, Ilker

    2013-01-01

    MQTT-S and CoAP are two protocols able to use the publish/subscribe model in Wireless Sensor Networks (WSNs). The high scalability provided by the publish/subscribe model may incur a high packet loss and therefore requires an efficient reliability mechanism to cope with this situation. The reliability mechanism of MQTT-S and CoAP employs a method which defines a fixed value for the retransmission timeout (RTO). This article argues that this method is not efficient for deploying publish/subscribe in WSN, because it may be unable to recover a packet, therefore resulting in a lower packet delivery ratio (PDR) at the subscriber nodes. This article proposes and evaluates an adaptive RTO method, which consists in using a Smooth Round-trip Time and multiplying it by a constant parameter (K). Thanks to this method, the reliability mechanism of MQTT-S and CoAP would be able to react properly to packet loss and would also be lightweight in terms of energy, memory and computing for sensor nodes where these resources are critical. We present a detailed evaluation of the effects of the K value on the calculation of the adaptive RTO method. We also establish the setting for obtaining the highest PDR on the subscriber nodes for single-hop and multi-hop scenarios. The results for single-hop scenario show that use of the appropriate K value for the adaptive RTO method increases the PDR up to 76% for MQTT-S and up to 38% for CoAP when compared with the use of fixed RTO method for both protocols, respectively. Meanwhile the same comparison for multi-hop scenario, the adaptive RTO method increases the PDR up to 36% for MQTT-S and up to 14% for CoAP. PMID:23291579

  18. Hybrid single-packet IP traceback with low storage and high accuracy.

    Science.gov (United States)

    Yang, Ming Hour

    2014-01-01

    Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid single-packet IP traceback. Despite such attempts, their storage still increases with packet numbers. That is why RIHT bounds its storage with path numbers to guarantee low storage. RIHT uses IP header's ID and offset fields to mark packets, so it inevitably suffers from fragment and drop issues for its packet reassembly. Although the 16-bit hybrid IP traceback schemes, for example, MORE, can mitigate the fragment problem, their storage requirement grows up with packet numbers. To solve the storage and fragment problems in one shot, we propose a single-packet IP traceback scheme that only uses packets' ID field for marking. Our major contributions are as follows: (1) our fragmented packets with tracing marks can be reassembled; (2) our storage is not affected by packet numbers; (3) it is the first hybrid single-packet IP traceback scheme to achieve zero false positive and zero false negative rates.

  19. Combining control electronics with SOA to equalize packet-to-packet power variations for optical 3R regeneration in optical networks at 10 Gbit/s

    DEFF Research Database (Denmark)

    Wessing, Henrik; Lavigne, B.; Sørensen, Brian Michael;

    2004-01-01

    We report on the combined effects of control electronics and a SOA as to suppress packet to packet power fluctuations. Associated to a SOA-MZI based 3R regenerator, we demonstrate a power dynamic range of 9 dB.......We report on the combined effects of control electronics and a SOA as to suppress packet to packet power fluctuations. Associated to a SOA-MZI based 3R regenerator, we demonstrate a power dynamic range of 9 dB....

  20. Constrained traffic regulation in variable-length packet networks

    Science.gov (United States)

    Karumanchi, Ashok; Varadarajan, Sridhar; Rao, Kalyan; Talabattula, Srinivas

    2004-02-01

    The availability of high bandwidth in optical networks coupled with the evolution of applications such as video on demand and telemedicine create a clear need for providing quality-of-service (QoS) guarantees in optical networks. Proliferation of the IP-over-WDM model in these networks requires the network to provide QoS guarantees for variable-length packets. In this context, we address the problem of constrained traffic regulation--traffic regulation with buffer and delay constraints--in variable-length packet networks. We use the filtering theory under max-plus (max, +) algebra to address this problem. For a constrained traffic-regulation problem with maximum tolerable delay and maximum buffer size, the traffic regulator that generates g-regular output traffic minimizing the number of discarded packets is a concatenation of the f clipper and the minimal g regulator. f is a function of g, maximum delay, and maximum buffer size. The f clipper is a bufferless device, which drops the packets as necessary so that its output is f regular. The minimal g regulator is a buffered device that delays packets as necessary so that its output is g regular. The g regulator is a linear shift-invariant filter with impulse response g, under the (max, +) algebra.

  1. Flood Avoidance Mechanisms for Bridged Resilient Packet Rings

    Institute of Scientific and Technical Information of China (English)

    Pisai Setthawong; Surat Tanterdtid

    2008-01-01

    Resilient Packet Ring (RPR), or the Standard IEEE 802.17, is a new IP-based network technology proposed to replace SONET/SDH in metropolitan area networks. RPR is well-adapted to handle multimedia traffic and is efficient.However, when RPR networks are bridged, inter-ring packets, or packets with the destination on a remote RPR network other than on the source network, are flooded on the source and the destination networks, and also on the path of the intermediate networks between the source and the destination networks. This decreases the available bandwidth for othertraffic in those networks and is inefficient. As a result, we propose two solutions based on topology discovery, global topologydiscovery (GTD) and enhanced topology discovery (ETD), that prevent the flooding of inter-ring packets. GTD enables the bridges to determine the next-hop bridge for each destination. ETD enables the source node to determine a default ringlet,so that packets reach the next-hop bridge without flooding the source network. The proposed solutions were analyzed and the overhead bandwidth and stabilization time were shown to be bounded. Simulations performed showed that the proposed solutions successfully avoid flooding and achieve optimal efficiency in the intermediate and destination networks, and in the source networks with one bridge.

  2. SECURE SERVICE DISCOVERY BASED ON PROBE PACKET MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    S. Pariselvam

    2015-03-01

    Full Text Available In MANETs, Service discovery process is always considered to be crucial since they do not possess a centralized infrastructure for communication. Moreover, different services available through the network necessitate varying categories. Hence, a need arises for devising a secure probe based service discovery mechanism to reduce the complexity in providing the services to the network users. In this paper, we propose a Secure Service Discovery Based on Probe Packet Mechanism (SSDPPM for identifying the DoS attack in MANETs, which depicts a new approach for estimating the level of trust present in each and every routing path of a mobile ad hoc network by using probe packets. Probing based service discovery mechanisms mainly identifies a mobile node’s genuineness using a test packet called probe that travels the entire network for the sake of computing the degree of trust maintained between the mobile nodes and it’s attributed impact towards the network performance. The performance of SSDPPM is investigated through a wide range of network related parameters like packet delivery, throughput, Control overhead and total overhead using the version ns-2.26 network simulator. This mechanism SSDPPM, improves the performance of the network in an average by 23% and 19% in terms of packet delivery ratio and throughput than the existing service discovery mechanisms available in the literature.

  3. "Keeping each patient safe": quality safety teaching/learning packets.

    Science.gov (United States)

    Benezo, Chris; Gaudy, Doris; White, T Michael

    2004-12-01

    University of Pittsburgh Medical Center (UPMC) McKeesport developed a tool, the UPMC McKeesport Quality Safety Teaching/Learning Packet, to provide physicians, nurses, and therapists with a common language to address complex safety issues. Teaching/learning packets were developed to "keep each patient safe": by calling for help early; from falls and confusion; and from hospital-acquired infections (http://McKeesport.upmc.com/KeepingPatientsSafe.htm). In July 2002, the concept of calling for help early became a requirement at UPMC McKeesport. The code team was to be called for any significant change in status and for traditional code arrests. In 2004, a teaching/learning packet addressed the concepts of fall risk and acute (delirium) and chronic (dementia) confusion. Strategies were implemented to reduce the rate of falls through risk screening and interventions for falls and delirium. In April 2004, a teaching/learning packet was introduced to reduce hospital-acquired infections, and professionals were positioned to better address isolation, hand hygiene, central-line-associated bacteremia, Clostridium difficile, and appropriate antibiotic usage. Three quality safety teaching/learning packets, which provided the professionals in the organization with the common language (culture) to advance patient safety, accomplished rapid change and were well accepted by staff and physicians.

  4. Integrated optical buffers for packet-switched networks

    Science.gov (United States)

    Burmeister, Emily Frances

    Routers form the backbone of the Internet, directing data to the right locations with huge throughput capacity of terabits/second) and very few errors (1 error allowed in 1012 bits). However, as the Internet continues to grow rapidly, so must the capacity of electronic routers, thereby also growing in footprint and power consumption. The energy bill alone has developers looking for an alternate solution. Today's routers can only operate with electrical signals although Internet data is transmitted optically. This requires the data to be converted from the optical domain to the electrical domain and back again. Optical routers have the potential of saving in power by omitting these conversions, but have been held back in part by the lack of a practical optical memory device. This work presents the first integrated optical buffer for next generation optical packet-switched networks. Buffering is required in a router to move packets of data in order to avoid collisions between packets heading to the same destination at the same time. The device presented here uses an InP-based two-by-two switch with a silica waveguide delay to form a recirculating buffer. Packet storage was shown with 98% packet recovery for 5 circulations. Autonomous contention resolution was demonstrated with two buffered channels to show that the technology is a realistic solution for creating multiple element buffers on multiple router ports. This thesis proposes and demonstrates the first integrated optical random access memory, thereby making a great stride toward high capacity optical routers.

  5. Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks

    CERN Document Server

    Tamilselvan, G M

    2010-01-01

    As the explosive growth of the ISM band usage continues, there are many scenarios where different systems operate in the same place at the same time. One of growing concerns is the coexistence of heterogeneous wireless network systems. For the successful deployment of mission-critical systems such as wireless sensor networks, it is required to provide a solution for the coexistence. In this paper, we propose a new scheme using inter packet delay for the coexistence of IEEE 802.15.4 LRWPAN and IEEE 802.11b WLAN. To evaluate the effectiveness of the proposed scheme, measurement and simulation study are conducted using Qualnet 4.5 simulation software. The simulation results show that the proposed scheme is effective in performance improvement for coexistence network of IEEE 802.15.4 for various topologies.

  6. Chip Multithreaded Consistency Model

    Institute of Scientific and Technical Information of China (English)

    Zu-Song Li; Dan-Dan Huan; Wei-Wu Hu; Zhi-Min Tang

    2008-01-01

    Multithreaded technique is the developing trend of high performance processor. Memory consistency model is essential to the correctness, performance and complexity of multithreaded processor. The chip multithreaded consistency model adapting to multithreaded processor is proposed in this paper. The restriction imposed on memory event ordering by chip multithreaded consistency is presented and formalized. With the idea of critical cycle built by Wei-Wu Hu, we prove that the proposed chip multithreaded consistency model satisfies the criterion of correct execution of sequential consistency model. Chip multithreaded consistency model provides a way of achieving high performance compared with sequential consistency model and ensures the compatibility of software that the execution result in multithreaded processor is the same as the execution result in uniprocessor. The implementation strategy of chip multithreaded consistency model in Godson-2 SMT processor is also proposed. Godson-2 SMT processor supports chip multithreaded consistency model correctly by exception scheme based on the sequential memory access queue of each thread.

  7. High Performance Ethernet Packet Processor Core for Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Raja Jitendra Nayaka

    2012-10-01

    Full Text Available As the demand for high speed Internet significantly increasing to meet the requirement of large datatransfers, real-time communication and High Definition ( HD multimedia transfer over IP, the IP basednetwork products architecture must evolve and change. Application specific processors require highperformance, low power and high degree of programmability is the limitation in many general processorbased applications. This paper describes the design of Ethernet packet processor for system-on-chip (SoCwhich performs all core packet processing functions, including segmentation and reassembly, packetizationclassification, route and queue management which will speedup switching/routing performance making itmore suitable for Next Generation Networks (NGN. Ethernet packet processor design can be configuredfor use with multiple projects targeted to a FPGA device the system is designed to support 1/10/20/40/100Gigabit links with a speed and performance advantage. VHDL has been used to implement and simulatedthe required functions in FPGA.

  8. Foreign Material in the Gastrointestinal Tract: Cocaine Packets

    Directory of Open Access Journals (Sweden)

    Nurten Turkel Kucukmetin

    2014-01-01

    Full Text Available Smuggling drugs by swallowing or inserting into a body cavity is not only a serious and growing international crime, but can also lead to lethal medical complications. The most common cause of death in ‘body packers', people transporting drugs by ingesting a packet into the gastrointestinal tract, is acute drug toxicity from a ruptured packet. However, more than 30 years after the initial report of body packing, there is still no definitive treatment protocol for the management of this patient group. The treatment strategy is determined according to the particular condition of the patient and the clinical experience of the treatment center. Surgical intervention is also less common now, due to both the use of improved packaging materials among smugglers and a shift towards a more conservative medical approach. Herein, we report a case of toxicity from ingested packets of cocaine that leaked and, despite surgery, resulted in exitus of the patient.

  9. Optimization and Assessment of Wavelet Packet Decompositions with Evolutionary Computation

    Directory of Open Access Journals (Sweden)

    Schell Thomas

    2003-01-01

    Full Text Available In image compression, the wavelet transformation is a state-of-the-art component. Recently, wavelet packet decomposition has received quite an interest. A popular approach for wavelet packet decomposition is the near-best-basis algorithm using nonadditive cost functions. In contrast to additive cost functions, the wavelet packet decomposition of the near-best-basis algorithm is only suboptimal. We apply methods from the field of evolutionary computation (EC to test the quality of the near-best-basis results. We observe a phenomenon: the results of the near-best-basis algorithm are inferior in terms of cost-function optimization but are superior in terms of rate/distortion performance compared to EC methods.

  10. DIESEL ENGINES' VIBROACOUSTIC SIGNATURE EXTRACTION BY WAVELET PACKET TECHNIQUE

    Institute of Scientific and Technical Information of China (English)

    邹剑; 陈进; 邹军; 耿遵敏

    2002-01-01

    Multisource unstable impulsive excitations, time-varying transmission path, concentrated mode, dispersion and reverberation that are important characteristics of reciprocating machines such as diesel engines result in wide-band non-stationary vibroacoustic responses which influence the effective extraction of vibroacoustic signatures and become a key factor to limit diesel engines' vibration diagnosis. In this paper, a serial theoretical deduction on the unstable dynamic properties of diesel engines was made; the mechanism of non-stationary vibroacoustic responses was elucidated. Based upon that, the wavelet packet technique was introduced. The reason for the existence of frequency aliasing in the Paley series from wavelet packets' decomposition was analyzed, and the wavelet packet frequency-shifting algorithm was given. Experiments on 190 serial diesel engines verify the given method's significant validity in vibroacoustic signature extraction and reciprocating machines' vibration diagnosis.

  11. Climatology of extratropical atmospheric wave packets in the northern hemisphere

    CERN Document Server

    Grazzini, Federico

    2010-01-01

    Planetary and synoptic scale wave-packets represents one important component of the atmospheric large-scale circulation. These dissipative structures are able to rapidly transport eddy kinetic energy, generated locally (e.g. by baroclinic conversion), downstream along the upper tropospheric flow. The transported energy, moving faster than individual weather systems, will affect the development of the next meteorological system on the leading edge of the wave packet, creating a chain of connections between systems that can be far apart in time and space, with important implications on predictability. In this work we present a different and novel approach to investigate atmospheric variability, based on the objective recognition of planetary and synoptic wave packets. We have developed an objective tracking algorithm which allows to extract relevant statistical properties of the wave trains as a function of their dominant wavelength. We have applied the algorithm to the daily analysis (every 12h) from 1958-2009...

  12. New packet scheduling algorithm in wireless CDMA data networks

    Science.gov (United States)

    Wang, Yu; Gao, Zhuo; Li, Shaoqian; Li, Lemin

    2002-08-01

    The future 3G/4G wireless communication systems will provide internet access for mobile users. Packet scheduling algorithms are essential for QoS of diversified data traffics and efficient utilization of radio spectrum.This paper firstly presents a new packet scheduling algorithm DSTTF under the assumption of continuous transmission rates and scheduling intervals for CDMA data networks . Then considering the constraints of discrete transmission rates and fixed scheduling intervals imposed by the practical system, P-DSTTF, a modified version of DSTTF, is brought forward. Both scheduling algorithms take into consideration of channel condition, packet size and traffic delay bounds. The extensive simulation results demonstrate that the proposed scheduling algorithms are superior to some typical ones in current research. In addition, both static and dynamic wireless channel model of multi-level link capacity are established. These channel models sketch better the characterizations of wireless channel than two state Markov model widely adopted by the current literature.

  13. The Spatiotemporal Evolution of Wave Packets under Chaotic Condition

    Institute of Scientific and Technical Information of China (English)

    LIU Fang; LI Jun-Qing; LUO Yi-Xiao; XU Gong-Ou; ZUO Wei

    2001-01-01

    Using the minimum uncertainty state of quantum integrable system H0 as initial state,the spatiotemporal evolution of the wave packet under the action of perturbed Hamiltonian is studied causally as in classical mechanics. Due to the existence of the avoided energy level crossing in the spectrum there exist nonlinear resonances between somepairs of neighboring components of the wave packet,the deterministic dynamical evolution becomes very complicated and appears to be chaotic.It is proposed to use expectation values for the whole set of basic dynamical variables and the corresponding spreading widths to describe the topological features concisely such that the quantum chaotic motion can be studied in contrast with the quantum regular motion and well characterized with the asymptotic behaviors.It has been demonstrated with numerical results that such a wave packet has indeed quantum behaviors of ergodicity asin corresponding classical case.

  14. Detection and Defense Against Packet Drop Attack in MANET

    Directory of Open Access Journals (Sweden)

    Tariq Ahamad

    2016-02-01

    Full Text Available MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

  15. Cultural adaptation and internal consistency analysis of the MISSCARE Survey for use in Brazil Adaptación cultural y análisis de la consistencia interna del instrumento MISSCARE para uso en Brasil Adaptação cultural e análise da consistência interna do instrumento MISSCARE para uso no Brasil

    Directory of Open Access Journals (Sweden)

    Lillian Dias Castilho Siqueira

    2013-04-01

    Full Text Available OBJECTIVE: The aims of this methodological research were to culturally adapt the MISSCARE Survey instrument to Brazil and analyze the internal consistency of the adapted version. METHOD: The instrument consists of 41 items, presented in two parts. Part A contains 24 items listing elements of missed nursing care. Part B is comprised of 17 items, related to the reasons for not delivering care. The research received ethics committee approval and was undertaken in two phases. The first was the cultural adaptation process, in which a committee of five experts verified the face and content validity, in compliance with the steps recommended in the literature. The second was aimed at analyzing the internal consistency of the instrument, involving 60 nursing team professionals at a public teaching hospital. RESULTS: According to the experts, the instrument demonstrated face and content validity. Cronbach's alpha coefficients for parts A and B surpassed 0.70 and were considered appropriate. CONCLUSION: The adapted version of the MISSCARE Survey demonstrated satisfactory face validity and internal consistency for the study sample. OBJETIVOS: Los objetivos de este estudio metodológico fueron efectuar la adaptación cultural del instrumento MISSCARE para Brasil y analizar la consistencia interna de la versión adaptada. MÉTODO: El instrumento contiene 41 ítem, presentados en dos partes. La parte A contiene 24 ítem, referentes a los elementos de los cuidados de enfermería omitidos, y la parte B 17 ítem, relacionados a los motivos para no prestar los cuidados. La investigación, con aprobación del comité de ética, fue efectuada en dos fases. La primera fue el proceso de adaptación cultural, que verificó la validez aparente y de contenido, llevado a cabo por un comité de cinco jueces según los pasos recomendados por la literatura. El objetivo de la segunda fue analizar la consistencia interna del instrumento con 60 profesionales del equipo de

  16. Wave packet propagation across barriers by semiclassical initial value methods

    Science.gov (United States)

    Petersen, Jakob; Kay, Kenneth G.

    2015-07-01

    Semiclassical initial value representation (IVR) formulas for the propagator have difficulty describing tunneling through barriers. A key reason is that these formulas do not automatically reduce, in the classical limit, to the version of the Van Vleck-Gutzwiller (VVG) propagator required to treat barrier tunneling, which involves trajectories that have complex initial conditions and that follow paths in complex time. In this work, a simple IVR expression, that has the correct tunneling form in the classical limit, is derived for the propagator in the case of one-dimensional barrier transmission. Similarly, an IVR formula, that reduces to the Generalized Gaussian Wave Packet Dynamics (GGWPD) expression [D. Huber, E. J. Heller, and R. Littlejohn, J. Chem. Phys. 89, 2003 (1988)] in the classical limit, is derived for the transmitted wave packet. Uniform semiclassical versions of the IVR formulas are presented and simplified expressions in terms of real trajectories and WKB penetration factors are described. Numerical tests show that the uniform IVR treatment gives good results for wave packet transmission through the Eckart and Gaussian barriers in all cases examined. In contrast, even when applied with the proper complex trajectories, the VVG and GGWPD treatments are inaccurate when the mean energy of the wave packet is near the classical transmission threshold. The IVR expressions for the propagator and wave packet are cast as contour integrals in the complex space of initial conditions and these are generalized to potentially allow treatment of a larger variety of systems. A steepest descent analysis of the contour integral formula for the wave packet in the present cases confirms its relationship to the GGWPD method, verifies its semiclassical validity, and explains results of numerical calculations.

  17. Fast Packet Classification Using Multi-Dimensional Encoding

    Science.gov (United States)

    Huang, Chi Jia; Chen, Chien

    Internet routers need to classify incoming packets quickly into flows in order to support features such as Internet security, virtual private networks and Quality of Service (QoS). Packet classification uses information contained in the packet header, and a predefined rule table in the routers. Packet classification of multiple fields is generally a difficult problem. Hence, researchers have proposed various algorithms. This study proposes a multi-dimensional encoding method in which parameters such as the source IP address, destination IP address, source port, destination port and protocol type are placed in a multi-dimensional space. Similar to the previously best known algorithm, i.e., bitmap intersection, multi-dimensional encoding is based on the multi-dimensional range lookup approach, in which rules are divided into several multi-dimensional collision-free rule sets. These sets are then used to form the new coding vector to replace the bit vector of the bitmap intersection algorithm. The average memory storage of this encoding is Θ (L · N · log N) for each dimension, where L denotes the number of collision-free rule sets, and N represents the number of rules. The multi-dimensional encoding practically requires much less memory than bitmap intersection algorithm. Additionally, the computation needed for this encoding is as simple as bitmap intersection algorithm. The low memory requirement of the proposed scheme means that it not only decreases the cost of packet classification engine, but also increases the classification performance, since memory represents the performance bottleneck in the packet classification engine implementation using a network processor.

  18. Analysis of Circular Wave Packets Generated by Pulsed Electric Fields

    Energy Technology Data Exchange (ETDEWEB)

    Yoshida, S. [Vienna University of Technology, Austria; Reinhold, Carlos O [ORNL; Burgdorfer, J. [Vienna University of Technology, Austria; Wyker, B. [Rice University; Ye, S. [Rice University; Dunning, F. B. [Rice University

    2011-01-01

    We demonstrate that circular wave packets in high Rydberg states generated using a pulsed electric field applied to extreme Stark states are characterized by a position-dependent energy gradient that leads to a correlation between the principal quantum number n and the spatial coordinate. This correlation is rather insensitive to the initial state and can be seen even in an incoherent mix of states such as is generated experimentally allowing information to be placed into, and extracted from, such wavepackets. We show that detailed information on the spatial distribution of a circular wave packet can be extracted by analyzing the complex phase of its expansion coefficient.

  19. Observer-based H∞ control over packet dropping networks

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A new controller design problem of networked control systems with packet dropping is proposed. Depending on the place that the observer is put in the system, the network control systems with packet dropping are modeled as stochastic systems with the random variables satisfying the Bernoulli random binary distribution. The observer-based controller is designed to stabilize the networked system in the sense of mean square, and the prescribed H∞ disturbance attenuation level is achieved. The controller design problem is formulated as the feasibility of the convex optimization problem, which can be solved by a linear matrix inequality (LMI) approach. Numerical examples illustrate the effectiveness of the proposed methods.

  20. Wave packets and initial conditions in quantum cosmology

    CERN Document Server

    Gousheh, S S

    2000-01-01

    We discuss the construction of wave packets resulting from the solutions of a class of Wheeler-DeWitt equations in Robertson-Walker type cosmologies. We present an ansatz for the initial conditions which leads to a unique determination of the expansion coefficients in the construction of the wave packets with probability distributions which, in an interesting contrast to some of the earlier works, agree well with all possible classical paths. The possible relationship between these initial conditions and signature transition in the context of classical cosmology is also discussed.

  1. Multicasting in a WDM-upgraded Resilient Packet Ring

    Science.gov (United States)

    Scheutzow, Michael; Seeling, Patrick; Maier, Martin; Reisslein, Martin

    2007-05-01

    The recently approved IEEE 802.17 Resilient Packet Ring (RPR) network deteriorates under multicast traffic to legacy ring technologies that do not support spatial reuse. We extend our multicast approach with spatial reuse from a currently single-channel RPR to WDM-upgraded multichannel RPR networks, where each node can transmit packets on all wavelengths and receive on one wavelength, and analyze their multicast capacity. Our analysis provides a convenient method for evaluating the multicast and reception capacities of WDM-upgraded RPR networks for a wide range of uniform unicast, multicast, and broadcast traffic scenarios.

  2. Symmetry and conservation laws in semiclassical wave packet dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Ohsawa, Tomoki, E-mail: tomoki@utdallas.edu [Department of Mathematical Sciences, The University of Texas at Dallas, 800 W Campbell Rd., Richardson, Texas 75080-3021 (United States)

    2015-03-15

    We formulate symmetries in semiclassical Gaussian wave packet dynamics and find the corresponding conserved quantities, particularly the semiclassical angular momentum, via Noether’s theorem. We consider two slightly different formulations of Gaussian wave packet dynamics; one is based on earlier works of Heller and Hagedorn and the other based on the symplectic-geometric approach by Lubich and others. In either case, we reveal the symplectic and Hamiltonian nature of the dynamics and formulate natural symmetry group actions in the setting to derive the corresponding conserved quantities (momentum maps). The semiclassical angular momentum inherits the essential properties of the classical angular momentum as well as naturally corresponds to the quantum picture.

  3. Short-time Chebyshev wave packet method for molecular photoionization

    Science.gov (United States)

    Sun, Zhaopeng; Zheng, Yujun

    2016-08-01

    In this letter we present the extended usage of short-time Chebyshev wave packet method in the laser induced molecular photoionization dynamics. In our extension, the polynomial expansion of the exponential in the time evolution operator, the Hamiltonian operator can act on the wave packet directly which neatly avoids the matrix diagonalization. This propagation scheme is of obvious advantages when the dynamical system has large Hamiltonian matrix. Computational simulations are performed for the calculation of photoelectronic distributions from intense short pulse ionization of K2 and NaI which represent the Born-Oppenheimer (BO) model and Non-BO one, respectively.

  4. An Improved Dynamic Probabilistic Packet Marking for IP Traceback

    Directory of Open Access Journals (Sweden)

    Qiao Yan

    2010-12-01

    Full Text Available An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can locate and attack a source rapidly and accurately, but also can reduce the marking overhead of routers near the attackers, which is its greatest contribution given by our technique. In contrast to previous work, the challenge of weakest node and weakest link is solved with the price of a little more numbers of packets to reconstruct the attack path. Theoretical analysis and NS2 simulation results in IPv4 and IPv6 testify that the approach is feasible and efficient respectively.

  5. Electron acceleration by Landau resonance with whistler mode wave packets

    Science.gov (United States)

    Gurnett, D. A.; Reinleitner, L. A.

    1983-01-01

    Recent observations of electrostatic waves associated with whistler mode chorus emissions provide evidence that electrons are being trapped by Landau resonance interactions with the chorus. In this paper, the trapping, acceleration and escape of electrons in Landau resonance with a whistler mode wave packet are discussed. It is shown that acceleration can occur by both inhomogeneous and dispersive effects. The maximum energy gained is controlled by the points where trapping and escape occur. Large energy changes are possible if the frequency of the wave packet or the magnetic field strength increase between the trapping and escape points. Various trapping and escape mechanisms are discussed.

  6. Consistency argued students of fluid

    Science.gov (United States)

    Viyanti; Cari; Suparmi; Winarti; Slamet Budiarti, Indah; Handika, Jeffry; Widyastuti, Fatma

    2017-01-01

    Problem solving for physics concepts through consistency arguments can improve thinking skills of students and it is an important thing in science. The study aims to assess the consistency of the material Fluid student argmentation. The population of this study are College students PGRI Madiun, UIN Sunan Kalijaga Yogyakarta and Lampung University. Samples using cluster random sampling, 145 samples obtained by the number of students. The study used a descriptive survey method. Data obtained through multiple-choice test and interview reasoned. Problem fluid modified from [9] and [1]. The results of the study gained an average consistency argmentation for the right consistency, consistency is wrong, and inconsistent respectively 4.85%; 29.93%; and 65.23%. Data from the study have an impact on the lack of understanding of the fluid material which is ideally in full consistency argued affect the expansion of understanding of the concept. The results of the study as a reference in making improvements in future studies is to obtain a positive change in the consistency of argumentations.

  7. Synchronization, retiming and OTDM of an asynchronous 10 Gigabit Ethernet NRZ packet using a time lens for Terabit Ethernet

    DEFF Research Database (Denmark)

    Hu, Hao; Laguardia Areal, Janaina; Mulvad, Hans Christian Hansen;

    2011-01-01

    An asynchronous 10G Ethernet packet is synchronized and retimed to a master clock using a time lens. The NRZ packet is converted into an RZ packet and multiplexed with a serial 1.28 Tb/s signal.......An asynchronous 10G Ethernet packet is synchronized and retimed to a master clock using a time lens. The NRZ packet is converted into an RZ packet and multiplexed with a serial 1.28 Tb/s signal....

  8. 160 Gbit/s optical packet switching using a silicon chip

    DEFF Research Database (Denmark)

    Hu, Hao; Ji, Hua; Galili, Michael;

    2012-01-01

    We have successfully demonstrated 160 Gbit/s all-optical packet switching based on cross-phase modulation using a silicon chip. Error free performance is achieved for the 4-to-1 switched 160 Gbit/s packet....

  9. Massachusetts Bay - Internal Wave Packets Digitized from SAR Imagery and Intersected with Bathymetry

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This feature class contains internal wave packets digitized from SAR imagery and intersected with bathymetry for Massachusetts Bay. The internal wave packets were...

  10. Massachusetts Bay - Internal Wave Packets Digitized from SAR Imagery and Intersected with Tidal Zones

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This feature class contains internal wave packets digitized from SAR imagery and intersected with tidal zones for Massachusetts Bay. The internal wave packets were...

  11. A multi-ring optical packet and circuit integrated network with optical buffering.

    Science.gov (United States)

    Furukawa, Hideaki; Shinada, Satoshi; Miyazawa, Takaya; Harai, Hiroaki; Kawasaki, Wataru; Saito, Tatsuhiko; Matsunaga, Koji; Toyozumi, Tatuya; Wada, Naoya

    2012-12-17

    We newly developed a 3 × 3 integrated optical packet and circuit switch-node. Optical buffers and burst-mode erbium-doped fiber amplifiers with the gain flatness are installed in the 3 × 3 switch-node. The optical buffer can prevent packet collisions and decrease packet loss. We constructed a multi-ring optical packet and circuit integrated network testbed connecting two single-ring networks and a client network by the 3 × 3 switch-node. For the first time, we demonstrated 244 km fiber transmission and 5-node hopping of multiplexed 14-wavelength 10 Gbps optical paths and 100 Gbps optical packets encapsulating 10 Gigabit Ethernet frames on the testbed. Error-free (frame error rate < 1 × 10(-4)) operation was achieved with optical packets of various packet lengths. In addition, successful avoidance of packet collisions by optical buffers was confirmed.

  12. Research and improvement on packet capture mechanism in linux for high-speed network

    Institute of Scientific and Technical Information of China (English)

    YANG Wu; FANG Bin-xing; YUN Xiao-chun; ZHANG Hong-li

    2005-01-01

    With the increasing enlargement of network scale and the rapid development of network techniques,large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a highspeed network.

  13. CCNA Experimental Environment Simulation with Cisco Packet Tracer%使用Cisco Packet Tracer模拟CCNA实验环境

    Institute of Scientific and Technical Information of China (English)

    王金恒; 王煜林

    2010-01-01

    Cisco Packet Tracer是一款由Cisco公司发布的网络辅助学习工具,它能够给思科课程爱好者提供一个设计、配置网络及排除网络故障的网络模拟环境.根据的实验需求,在Cisco Packet Tracer模拟器上设计了两个实用的CCNA实验拓朴,让思科学习者能够更好地学习网络.

  14. Consistent model driven architecture

    Science.gov (United States)

    Niepostyn, Stanisław J.

    2015-09-01

    The goal of the MDA is to produce software systems from abstract models in a way where human interaction is restricted to a minimum. These abstract models are based on the UML language. However, the semantics of UML models is defined in a natural language. Subsequently the verification of consistency of these diagrams is needed in order to identify errors in requirements at the early stage of the development process. The verification of consistency is difficult due to a semi-formal nature of UML diagrams. We propose automatic verification of consistency of the series of UML diagrams originating from abstract models implemented with our consistency rules. This Consistent Model Driven Architecture approach enables us to generate automatically complete workflow applications from consistent and complete models developed from abstract models (e.g. Business Context Diagram). Therefore, our method can be used to check practicability (feasibility) of software architecture models.

  15. Optical frame synchronizer for 10 G Ethernet packets aiming at 1 Tb/s OTDM Ethernet

    DEFF Research Database (Denmark)

    Hu, Hao; Palushani, Evarist; Laguardia Areal, Janaina;

    2010-01-01

    Synchronization of 10 G Ethernet packets to a local clock was demonstrated using a phase modulator and a SMF as retiming elements. Error free performances for the synchronized packets with different lengths were achieved.......Synchronization of 10 G Ethernet packets to a local clock was demonstrated using a phase modulator and a SMF as retiming elements. Error free performances for the synchronized packets with different lengths were achieved....

  16. Packet loss characteristics of IPTV-like traffic on residential links

    OpenAIRE

    2010-01-01

    Packet loss is one of the principal threats to quality of experience for IPTV systems. However, the packet loss characteristics of the residential access networks which carry IPTV are not widely understood. We present packet level measurements of streaming IPTV-like traffic over four residential access links, and describe the extent and nature of packet loss we encountered. We discuss the likely impact of these losses for IPTV traffic, and outline steps which can ameliorate this.

  17. Modeling and performance analysis of IP access interface in optical transmission networks with packet switching

    OpenAIRE

    Lackovic, Marko; Bungarzeanu, Cristian

    2006-01-01

    The article analyzes the influence of the Internet Protocol (IP) access interface on the packet loss probability and delay times in the optical packet switched network. The network and node model have been proposed, and the structure of the IP access interface, including assembler and holder, have been included in the analysis. It has been shown that the increase of the maximum optical packet sizes, as well as use of the holding feature as contention resolution mechanism, decrease the packet ...

  18. Designs and algorithms for packet and content inspection

    NARCIS (Netherlands)

    Sourdis, I.

    2007-01-01

    This dissertation deals with essential issues pertaining to high performance processing for network security and deep packet inspection. The proposed solutions keep pace with the increasing number and complexity of known attack descriptions providing multi-Gbps processing rates. We advocate the use

  19. Construction of Multivariate Tight Framelet Packets Associated with Dilation Matrix

    Institute of Scientific and Technical Information of China (English)

    Firdous A Shah; Abdullah

    2015-01-01

    In this paper, we present a method for constructing multivariate tight framelet packets associated with an arbitrary dilation matrix using unitary extension principles.We also prove how to construct various tight frames for L2(Rd) by replac-ing some mother framelets.

  20. Fast Packet forwarding Engine Based on Software Circuits

    NARCIS (Netherlands)

    Makkes, M.X.; Varabanescu, A.; Laat, C. de; Meijer, R.J.

    2015-01-01

    Forwarding packets is part of the performance critical path of routing devices, and affects the network performance at any scale. This operation is typically performed by dedicated routing boxes, which are fast, but expensive and inflexible. Recent work has shown that in many cases commodity

  1. Weisskopf-Wigner model for wave packet excitation

    CERN Document Server

    Paloviita, A; Stenholm, S; Paloviita, Asta; Suominen, Kalle-Antti; Stenholm, Stig

    1997-01-01

    We consider a laser induced molecular excitation process as a decay of a single energy state into a continuum. The analytic results based on Weisskopf-Wigner approach and perturbation calculations are compared with numerical wave packet results. We find that the decay model describes the excitation process well within the expected parameter region.

  2. Application of Cellular Automata to Detection of Malicious Network Packets

    Science.gov (United States)

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  3. Hardware packet pacing using a DMA in a parallel computer

    Science.gov (United States)

    Chen, Dong; Heidelberger, Phillip; Vranas, Pavlos

    2013-08-13

    Method and system for hardware packet pacing using a direct memory access controller in a parallel computer which, in one aspect, keeps track of a total number of bytes put on the network as a result of a remote get operation, using a hardware token counter.

  4. PACKET ROUTING ALGORITHM FOR LEO SATELLITE CONSTELLATION NETWORK

    Institute of Scientific and Technical Information of China (English)

    Wang Kaidong; Tian Bin; Yi Kechu

    2005-01-01

    A novel distributed packet routing algorithm for Low Earth Orbit (LEO) satellite networks based on spiderweb topology is presented. The algorithm gives the shortest path with very low computational complexity and without on-board routing tables, which is suitable and practical for on-board processing. Simulation results show its practicability and feasibility.

  5. Green partial packet recovery in wireless sensor networks

    KAUST Repository

    Daghistani, Anas

    2015-08-18

    Partial packet recovery is well known for increasing network throughput and reducing frame retransmissions. However, partial packet recovery methods in the literature are not energy-aware and hence they are not suitable for the battery powered wireless sensor motes. We propose Green-Frag, a novel adaptive partial packet recovery mechanism that is energy friendly. It can help prolonging the battery life of wireless sensor motes that are usually resource constrained. It dynamically partitions the frame into smaller blocks to avoid dropping the whole frame due to a single bit error. Also, Green-Frag is able to tolerate high interference and save energy by varying the transmit power based on channel quality and interference pattern. We experimentally evaluate the energy efficiency as well as goodput and delay of Green-Frag using our TelosB sensor mote testbed. We find that Green-Frag reduces energy consumption by 33% on average compared to the state of the art partial packet recovery scheme in the literature in the presence of Wi-Fi interference. In the worst case, this reduction in energy consumption comes at the cost of 10% reduction in goodput. Finally, Green-Frag reduces the latency by 22% on average compared to other static frame fragmentation schemes.

  6. Analysis and implementation of packet preemption for Time Sensitive Networks

    DEFF Research Database (Denmark)

    Zhou, Zifan; Yan, Ying; Ruepp, Sarah Renée

    2017-01-01

    level simulation in Riverbed Modeler. The simulation is complemented by numerical analysis which provides the average queuing delay for both types of traffic (preemptable and express). Furthermore, the paper describes an approach to implement the packet preemption solution on an FPGA in VHDL, which...

  7. Time-lens based optical packet pulse compression and retiming

    DEFF Research Database (Denmark)

    Laguardia Areal, Janaina; Hu, Hao; Palushani, Evarist;

    2010-01-01

    This paper presents a new optical circuit that performs both pulse compression and frame synchronization and retiming. Our design aims at directly multiplexing several 10G Ethernet data packets (frames) to a high-speed OTDM link. This scheme is optically transparent and does not require clock...

  8. A CURRICULUM FOR ENGLISH, STUDENT PACKET, GRADE 7.

    Science.gov (United States)

    Nebraska Univ., Lincoln. Curriculum Development Center.

    THE SEVENTH-GRADE STUDENT PACKET, PRODUCED BY THE NEBRASKA CURRICULUM DEVELOPMENT CENTER, BEGINS WITH THE UNIT ENTITLED "THE MAKING OF STORIES" IN WHICH STUDENTS CONSIDER WRITERS' AUDIENCES AND METHODS OF COMPOSITION AND PRESENTATION. SUCH MATERIAL AS "A CHRISTMAS CAROL" AND SELECTIONS FROM "THE ODYSSEY,""BEOWULF,""HYMN TO HERMES," AND GRIMM'S…

  9. The Effect of Double Buffer Management in Packet Analysis of ...

    African Journals Online (AJOL)

    ISSN 1816-3378. The Effect of Double Buffer Management in Packet Analysis of Adhoc .... Temporary memory. 1 GBofRAM. NIC ... A URL is always a single, unbroken line of text with no spaces. Web browser ..... Files, data, music and video.

  10. Generic Multi–Packet Communication through Object Serialization

    NARCIS (Netherlands)

    Evers, L.; Lijding, M.E.M.; Kuper, J.

    2008-01-01

    Wireless sensor networks communication protocols and abstractions have remained fairly simple until now, dealing only with payloads the size of individual network packets. A method to transparently communicate variably sized data in a platform-agnostic manner may ease building energy-efficient and rob

  11. Application of Cellular Automata to Detection of Malicious Network Packets

    Science.gov (United States)

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  12. Propagation of gravity wave packet near critical level

    Institute of Scientific and Technical Information of China (English)

    YUE Xianchang; YI Fan

    2005-01-01

    A couple of two-dimensional linear and fully nonlinear numerical models for compressible atmosphere are used to numerically study the propagation of the gravity wave packet into a mean wind shear. For a linear propagation wave packet, the critical level interactions are in good agreement with the linear critical level theory. The dynamically and convectively unstable regions are formed due to the critical level interaction of a finite-amplitude wave packet, but they would not break. The free exchange of potential energy with kinetic energy in the background atmosphere at rest ceases after entering the mean wind shear. However, it still goes on in the nonlinear propagation. It is shown that the nonlinear effects modify the mean flow markedly, reduce the momentum and energy propagation velocity and drop the elevation of the critical level.The gravity wave packet becomes unstable and breaks down into smaller scales in some regions. It expends much more kinetic energy than potential energy in the early phase of the breakdown. This means that the wave breakdown sets up due to the action of the shear instability rather than a convective one.

  13. An Efficient Conflict Detection Algorithm for Packet Filters

    Science.gov (United States)

    Lee, Chun-Liang; Lin, Guan-Yu; Chen, Yaw-Chung

    Packet classification is essential for supporting advanced network services such as firewalls, quality-of-service (QoS), virtual private networks (VPN), and policy-based routing. The rules that routers use to classify packets are called packet filters. If two or more filters overlap, a conflict occurs and leads to ambiguity in packet classification. This study proposes an algorithm that can efficiently detect and resolve filter conflicts using tuple based search. The time complexity of the proposed algorithm is O(nW+s), and the space complexity is O(nW), where n is the number of filters, W is the number of bits in a header field, and s is the number of conflicts. This study uses the synthetic filter databases generated by ClassBench to evaluate the proposed algorithm. Simulation results show that the proposed algorithm can achieve better performance than existing conflict detection algorithms both in time and space, particularly for databases with large numbers of conflicts.

  14. "Macbeth." A Play Packet To Accompany "Elementary, My Dear Shakespeare."

    Science.gov (United States)

    Engen, Barbara; Campbell, Joy

    Intended for use by elementary school teachers as a supplement to the book, "Elementary, My Dear Shakespeare," or for use by itself to produce one Shakespeare play, this play packet contains ready-to-reproduce materials for the production of "Macbeth." Materials include: staging suggestions for scenery, props, lighting, and…

  15. Energy Crisis: Libya's and Nigeria's Role. Resource Packet.

    Science.gov (United States)

    African-American Inst., New York, NY. School Services Div.

    This resource packet contains practical suggestions and resource materials to help secondary teachers teach about Libya's and Nigeria's roles in the energy crisis. Students become acquainted with the governments and cultures of the two countries, examine their social problems, and learn how the Libyan and Nigerian governments are using money from…

  16. Fast Packet forwarding Engine Based on Software Circuits

    NARCIS (Netherlands)

    Makkes, M.X.; Varabanescu, A.; Laat, C. de; Meijer, R.J.

    2015-01-01

    Forwarding packets is part of the performance critical path of routing devices, and affects the network performance at any scale. This operation is typically performed by dedicated routing boxes, which are fast, but expensive and inflexible. Recent work has shown that in many cases commodity hardwar

  17. Analysis Of Packets Delay In Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Krivchenkov Aleksandr

    2015-12-01

    Full Text Available The networks with wireless links for automation control applications traffic transmission when packets have small size and application payload is predictable are under consideration. Analytical model for packets delay on their propagation path through the network is proposed. Estimations for network architectures based on WiFi and Bluetooth wireless technologies are made. The specifications for physical layer 802.11 a/b/g/n and 802.15.1 are under consideration. Analytical and experimental results for delivered network bandwidth for different network architecture, traffic structure and wireless technologies were compared to validate that basic mechanisms are correctly taken into account in the model. It is shown that basic effects are taken into account and further accuracy “improvement” of the model will give not more than 5%. As a result that is important for automation control applications we have reliably received the lowest possible level for packets delay in one wireless link. For 802.11 it is of order of 0.2 ms, for 802.15.1 it is 1.25 ms and is true when application packet can be transferred by one data frame.

  18. Chirp dependence of wave packet motion in oxazine 1.

    Science.gov (United States)

    Malkmus, Stephan; Dürr, Regina; Sobotta, Constanze; Pulvermacher, Horst; Zinth, Wolfgang; Braun, Markus

    2005-11-24

    The motion of vibrational wave packets in the system oxazine 1 in methanol is investigated by spectrally resolved transient absorption spectroscopy. The spectral properties of the probe pulse from 600 to 700 nm were chosen to cover the overlap region where ground-state bleach and stimulated emission signals are detected. The spectral phase of the pump pulse was manipulated by a liquid crystal display based pulse-shaping setup. Chirped excitation pulses of negative and positive chirp can be used to excite vibrational modes predominantly in the ground or excited state, respectively. To distinguish the observed wave packets in oxazine 1 moving in the ground or excited state, spectrally resolved transient absorption experiments are performed for various values of the linear chirp of the pump pulses. The amplitudes of the wave packet motion show an asymmetric behavior with an optimum signal for a negative chirp of -0.75 +/- 0.2 fs/nm, which indicates that predominantly ground-state wave packets are observed.

  19. On the Effects of Heterogeneous Packet Lengths on Network Coding

    DEFF Research Database (Denmark)

    Compta, Pol Torres; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2014-01-01

    Random linear network coding (RLNC) has been shown to provide increased throughput, security and robustness for the transmission of data through the network. Most of the analysis and the demonstrators have focused on the study of data packets with the same size (number of bytes). This constitutes...

  20. Packet track and traceback mechanism against denial of service attacks

    Institute of Scientific and Technical Information of China (English)

    LI Li; SHEN Su-bin

    2008-01-01

    The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and traceback mechanism is proposed, which features rapid response and high accuracy. In this scheme, routers apply packet marking scheme and send traceback messages, which enables the victim to design the path tree in peace time. During attack times the victim can trace attackers back within the path tree and perform rapid packet filtering using the marking in each packet. Traceback messages overcome Pi's limitation, wherein too much path information is lost in path identifiers; whereas path identifiers can be used to expedite the design of the path-tree, which reduces the high overhead in iTrace. Therefore, our scheme not only synthesizes the advantages but also compromises the disadvantages of the above two methods. Simulation results with NS-2 show the validity of our scheme.

  1. Energy Crisis: Libya's and Nigeria's Role. Resource Packet.

    Science.gov (United States)

    African-American Inst., New York, NY. School Services Div.

    This resource packet contains practical suggestions and resource materials to help secondary teachers teach about Libya's and Nigeria's roles in the energy crisis. Students become acquainted with the governments and cultures of the two countries, examine their social problems, and learn how the Libyan and Nigerian governments are using money from…

  2. Teacher Education Packet for Illinois Core Curriculum in Agriculture.

    Science.gov (United States)

    Hemp, Paul; Pepple, Jerry

    Developed for use by teacher educators or state staff, this teaching packet provides preservice or inservice training to teachers and prospective teachers on how to use the Illinois Core Curriculum in Agriculture. (It is recommended that copies of the Illinois core materials be available to the students.) Three problem areas are included:…

  3. Fast Packet forwarding Engine Based on Software Circuits

    NARCIS (Netherlands)

    Makkes, M.X.; Varabanescu, A.; Laat, C. de; Meijer, R.J.

    2015-01-01

    Forwarding packets is part of the performance critical path of routing devices, and affects the network performance at any scale. This operation is typically performed by dedicated routing boxes, which are fast, but expensive and inflexible. Recent work has shown that in many cases commodity hardwar

  4. Non-linear wave packet dynamics of coherent states

    Indian Academy of Sciences (India)

    J Banerji

    2001-02-01

    We have compared the non-linear wave packet dynamics of coherent states of various symmetry groups and found that certain generic features of non-linear evolution are present in each case. Thus the initial coherent structures are quickly destroyed but are followed by Schrödinger cat formation and revival. We also report important differences in their evolution.

  5. "Macbeth." A Play Packet To Accompany "Elementary, My Dear Shakespeare."

    Science.gov (United States)

    Engen, Barbara; Campbell, Joy

    Intended for use by elementary school teachers as a supplement to the book, "Elementary, My Dear Shakespeare," or for use by itself to produce one Shakespeare play, this play packet contains ready-to-reproduce materials for the production of "Macbeth." Materials include: staging suggestions for scenery, props, lighting, and costumes; a short…

  6. Scalable In-Band Optical Notch-Filter Labeling for Ultrahigh Bit Rate Optical Packet Switching

    DEFF Research Database (Denmark)

    Medhin, Ashenafi Kiros; Galili, Michael; Oxenløwe, Leif Katsuo

    2014-01-01

    with only 0.9-dB power penalty to achieve BER of 1E-9. Using the proposed labeling scheme, optical packet switching of 640 Gb/s data packets is experimentally demonstrated in which two data packets are labeled by making none and one spectral hole using a notch filter and are switched using a LiNbO$_3...

  7. Wave packet autocorrelation functions for quantum hard-disk and hard-sphere billiards in the high-energy, diffraction regime

    OpenAIRE

    Goussev, Arseni; Dorfman, J. Robert

    2006-01-01

    We consider the time evolution of a wave packet representing a quantum particle moving in a geometrically open billiard that consists of a number of fixed hard-disk or hard-sphere scatterers. Using the technique of multiple collision expansions we provide a first-principle analytical calculation of the time-dependent autocorrelation function for the wave packet in the high-energy diffraction regime, in which the particle's de Broglie wave length, while being small compared to the size of the ...

  8. No consistent bimetric gravity?

    CERN Document Server

    Deser, S; Waldron, A

    2013-01-01

    We discuss the prospects for a consistent, nonlinear, partially massless (PM), gauge symmetry of bimetric gravity (BMG). Just as for single metric massive gravity, ultimate consistency of both BMG and the putative PM BMG theory relies crucially on this gauge symmetry. We argue, however, that it does not exist.

  9. Efficient Packet Forwarding in Mesh Network

    OpenAIRE

    Soumen Kanrar

    2012-01-01

    Wireless Mesh Network (WMN) is a multi hop low cost, with easy maintenance robust network providing reliable service coverage. WMNs consist of mesh routers and mesh clients. In this architecture, while static mesh routers form the wireless backbone, mesh clients access the network through mesh routers as well as directly meshing with each other. Different from traditional wireless networks, WMN is dynamically self-organized and self-configured. In other words, the nodes in the mesh network au...

  10. Prizes for consistency

    Energy Technology Data Exchange (ETDEWEB)

    Hiscock, S.

    1986-07-01

    The importance of consistency in coal quality has become of increasing significance recently, with the current trend towards using coal from a range of sources. A significant development has been the swing in responsibilities for coal quality. The increasing demand for consistency in quality has led to a re-examination of where in the trade and transport chain the quality should be assessed and where further upgrading of inspection and preparation facilities are required. Changes are in progress throughout the whole coal transport chain which will improve consistency of delivered coal quality. These include installation of beneficiation plant at coal mines, export terminals, and on the premises of end users. It is suggested that one of the keys to success for the coal industry will be the ability to provide coal of a consistent quality.

  11. Consistent sets contradict

    CERN Document Server

    Kent, A

    1996-01-01

    In the consistent histories formulation of quantum theory, the probabilistic predictions and retrodictions made from observed data depend on the choice of a consistent set. We show that this freedom allows the formalism to retrodict several contradictory propositions which correspond to orthogonal commuting projections and which all have probability one. We also show that the formalism makes contradictory probability one predictions when applied to generalised time-symmetric quantum mechanics.

  12. Adaptive Packet Buffering Algorithm Based on Priority and Traffic Throughput for Reducing Packet Loss in Fast Handover for Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Anesa Maolod Omar Al-Najeh

    2012-07-01

    Full Text Available The packet loss has become an important issue to the research community, which needs to be addressed. In FMIPv6, Packet losses are significantly related to the handover latency and buffer size used for packet buffering. In the case of increased handover latency or decreased buffer size, packet losses will be increased. To solve the problem, we propose an adaptive packet buffering (APT algorithm based on priority of packets and traffic throughput in layer 3 (L3 were the packets are buffered by the predefined rule in the new access point during handover. This algorithm is designed to reduce packet loss in FMIPv6 and high level of throughput and low delay can be achieved through the proposed technique. To achieve a fair comparison with Adaptive Buffer Limit Tuning (ALT algorithm, we have implemented the APT algorithm in Omnet++ along with the FMIPv6 to develop the model and the algorithm. The results of the simulation study show that the proposed algorithm can reduce the packet loss as well as the delay.

  13. 1×4 Optical packet switching of variable length 640 Gbit/s data packets using in-band optical notch-filter labeling

    DEFF Research Database (Denmark)

    Medhin, Ashenafi Kiros; Kamchevska, Valerija; Galili, Michael;

    2014-01-01

    We experimentally perform 1×4 optical packet switching of variable length 640 Gbit/s OTDM data packets using in-band notch-filter labeling with only 2.7-dB penalty. Up to 8 notches are employed to demonstrate scalability of the labeling scheme to 1×256 switching operation.......We experimentally perform 1×4 optical packet switching of variable length 640 Gbit/s OTDM data packets using in-band notch-filter labeling with only 2.7-dB penalty. Up to 8 notches are employed to demonstrate scalability of the labeling scheme to 1×256 switching operation....

  14. Energy and Information Transfer Via Coherent Exciton Wave Packets

    Science.gov (United States)

    Zang, Xiaoning

    Electronic excitons are bound electron-hole states that are generated when light interacts with matter. Such excitations typically entangle with phonons and rapidly decohere; the resulting electronic state dynamics become diffusive as a result. However, if the exciton-phonon coupling can be reduced, it may be possible to construct excitonic wave packets that offer a means of efficiently transmitting information and energy. This thesis is a combined theory/computation investigation to design condensed matter systems which support the requisite coherent transport. Under the idealizing assumption that exciton-phonon entanglement could be completely suppressed, the majority of this thesis focuses on the creation and manipulation of exciton wave packets in quasi-one-dimensional systems. While each site could be a silicon quantum dot, the actual implementation focused on organic molecular assemblies for the sake of computational simplicity, ease of experimental implementation, potential for coherent transport, and promise because of reduced structural uncertainty. A laser design was derived to create exciton wave packets with tunable shape and speed. Quantum interference was then exploited to manipulate these packets to block, pass, and even dissociate excitons based on their energies. These developments allow exciton packets to be considered within the arena of quantum information science. The concept of controllable excitonic wave packets was subsequently extended to consider molecular designs that allow photons with orbital angular momentum to be absorbed to create excitons with a quasi-angular momentum of their own. It was shown that a well-defined measure of topological charge is conserved in such light-matter interactions. Significantly, it was also discovered that such molecules allow photon angular momenta to be combined and later emitted. This amounts to a new way of up/down converting photonic angular momentum without relying on nonlinear optical materials. The

  15. Wavelet packet based feature extraction and recognition of license plate characters

    Institute of Scientific and Technical Information of China (English)

    HUANG Wei; LU Xiaobo; LING Xiaojing

    2005-01-01

    To study the characteristics of license plate characters recognition, this paper proposes a method for feature extraction of license plate characters based on two-dimensional wavelet packet. We decompose license plate character images with two dimensional-wavelet packet and search for the optimal wavelet packet basis. This paper presents a criterion of searching for the optimal wavelet packet basis, and a practical algorithm. The obtained optimal wavelet packet basis is used as the feature of license plate character, and a BP neural network is used to classify the character.The testing results show that the proposed method achieved higher recognition rate than the traditional methods.

  16. Feasibility Study of Encoding Operational Mission Metadata into IPv6 Packet Headers

    Science.gov (United States)

    2008-03-01

    2tu tim e = ptf + ptu 2nd node transmits update and then packet onto next node update update update update update packet3 tim e = 2tf + tu tim e = 2tf...ptf + ptu 2nd node transmits update and then packet onto next node update update update update update packet3 tim e = 2tf + tu tim e = 2tf + 2tu...tim e = 0 tim e = tf tim e = tf + tu tim e = 2tf + tu tim e = ptf + (p-1)tu tim e = 2tf + 2tu tim e = ptf + ptu Intermediate node transmits packet

  17. Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection

    Science.gov (United States)

    2014-03-27

    packet is completely inspected the finished state is only cleared through a reset by the CPU. The Packet FIFO is the only non-custom designed hardware...Packet FIFO . This signal is provided to the core by the software running on the PowerPC CPU. After start goes high (logic ’1’) the block transitions...the block transitions to the Decode state. In this state, it reads the first 62 bytes of the packet from the Packet FIFO two bytes at a time. This takes

  18. Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam-For

    2017-01-01

    Overhead network packets are a big challenge for intrusion detection systems (IDSs), which may increase system burden, degrade system performance, and even cause the whole system collapse, when the number of incoming packets exceeds the maximum handling capability. To address this issue, packet...... filtration is considered as a promising solution, and our previous research efforts have proven that designing a trust-based packet filter was able to refine unwanted network packets and reduce the workload of a local IDS. With the development of Internet cooperation, collaborative intrusion detection...... compromised by insider attacks. In this paper, we adopt the existing CIDN framework and aim to apply a collaborative trust-based approach to reduce unwanted packets. More specifically, we develop a collaborative trust-based packet filter, which can be deployed in collaborative networks and be robust against...

  19. Network Consistent Data Association.

    Science.gov (United States)

    Chakraborty, Anirban; Das, Abir; Roy-Chowdhury, Amit K

    2016-09-01

    Existing data association techniques mostly focus on matching pairs of data-point sets and then repeating this process along space-time to achieve long term correspondences. However, in many problems such as person re-identification, a set of data-points may be observed at multiple spatio-temporal locations and/or by multiple agents in a network and simply combining the local pairwise association results between sets of data-points often leads to inconsistencies over the global space-time horizons. In this paper, we propose a Novel Network Consistent Data Association (NCDA) framework formulated as an optimization problem that not only maintains consistency in association results across the network, but also improves the pairwise data association accuracies. The proposed NCDA can be solved as a binary integer program leading to a globally optimal solution and is capable of handling the challenging data-association scenario where the number of data-points varies across different sets of instances in the network. We also present an online implementation of NCDA method that can dynamically associate new observations to already observed data-points in an iterative fashion, while maintaining network consistency. We have tested both the batch and the online NCDA in two application areas-person re-identification and spatio-temporal cell tracking and observed consistent and highly accurate data association results in all the cases.

  20. Enhanced real-time ECG coder for packetized telecardiology applications.

    Science.gov (United States)

    Alesanco, Alvaro; Olmos, Salvador; Istepanian, Robert S H; García, José

    2006-04-01

    A new real-time compression method for electrocardiogram (ECG) signals has been developed based on the wavelet transform approach. The method is specifically adaptable for packetized telecardiology applications. The signal is segmented into beats and a beat template is subtracted from them, producing a residual signal. Beat templates and residual signals are coded with a wavelet expansion. Compression is achieved by selecting a subset of wavelet coefficients. The number of selected coefficients depends on a threshold which has different definitions depending on the operational mode of the coder. Compression performance has been tested using a subset of ECG records from MIT-BIH Arrhythmia database. This method has been designed for real-time packetized telecardiology scenarios both in wired and wireless environments.

  1. Packet routing algorithm for polar orbit LEO satellite constellation network

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Broadband satellite networks are capable of providing global coverage and support various services. The networks constructed by Low Earth Orbit (LEO) satellite constellations have attracted great interests because of their short round-trip delays and wide bandwidths. A challenging problem is to develop a simple and efficient packet routing algorithm for the LEO satellite constellation network. This paper presents a SpiderWeb Topological Network (SWTN) and a distributed packet routing algorithm for the LEO satellite constellation network based on the SWTN. The algorithm gives the minimum propagation delay paths with low computational complexity and requires no routing tables, which is practical for on-board processing. The performance of the algorithm is demonstrated through simulations.

  2. Traffic analysis and signal processing in optical packet switched networks

    DEFF Research Database (Denmark)

    Fjelde, Tina

    2002-01-01

    Gbit/s demultiplexing and 2x10 to 20 Gbit/s multiplexing. Lastly, the IWC’s capabilities as an optical logic gate for enabling more complex signal processing are demonstrated and four applications hereof are discussed. Logic OR and AND are verified in full at 10 Gbit/s using PRBS sequences coupled......This thesis focuses on functionalities that are important for the realisation of future all-optical packet switched networks, and which may be implemented using the interferometric wavelength converter. The European IST research project DAVID, with the aim of demonstrating the feasibility of a Tbit....../s optical packet switched network exploiting the best of optics and electronics, is used as a thread throughout the thesis. An overview of the DAVID network architecture is given, focussing on the MAN and WAN architecture as well as the MPLS-based network hierarchy. Subsequently, the traffic performance...

  3. Wave packet dynamics in the optimal superadiabatic approximation

    CERN Document Server

    Betz, Volker; Manthe, Uwe

    2016-01-01

    We explain the concept of superadiabatic approximations and show how in the context of the Born- Oppenheimer approximation they lead to an explicit formula that can be used to predict transitions at avoided crossings. Based on this formula, we present a simple method for computing wave packet dynamics across avoided crossings. Only knowledge of the adiabatic electronic energy levels near the avoided crossing is required for the computation. In particular, this means that no diabatization procedure is necessary, the adiabatic energy levels can be computed on the fly, and they only need to be computed to higher accuracy when an avoided crossing is detected. We test the quality of our method on the paradigmatic example of photo-dissociation of NaI, finding very good agreement with results of exact wave packet calculations.

  4. Modelling of packet traffic with matrix analytic methods

    DEFF Research Database (Denmark)

    Andersen, Allan T.

    1995-01-01

    scenario was modelled using Markovian models. The Ordinary Differential Equations arising from these models were solved numerically. The results obtained seemed very similar to those obtained using a different method in previous work by Akinpelu & Skoog 1985. Recent measurement studies of packet traffic...... process. A heuristic formula for the tail behaviour of a single server queue fed by a superposition of renewal processes has been evaluated. The evaluation was performed by applying Matrix Analytic methods. The heuristic formula has applications in the Call Admission Control (CAC) procedure of the future...... network services i.e. 800 and 900 calls and advanced mobile communication services. The Markovian Arrival Process (MAP) has been used as a versatile tool to model the packet arrival process. Applying the MAP facilitates the use of Matrix Analytic methods to obtain performance measures associated...

  5. Stochastic Acceleration of Ions Driven by Pc1 Wave Packets

    Science.gov (United States)

    Khazanov, G. V.; Sibeck, D. G.; Tel'nikhin, A. A.; Kronberg, T. K.

    2015-01-01

    The stochastic motion of protons and He(sup +) ions driven by Pc1 wave packets is studied in the context of resonant particle heating. Resonant ion cyclotron heating typically occurs when wave powers exceed 10(exp -4) nT sq/Hz. Gyroresonance breaks the first adiabatic invariant and energizes keV ions. Cherenkov resonances with the electrostatic component of wave packets can also accelerate ions. The main effect of this interaction is to accelerate thermal protons to the local Alfven speed. The dependencies of observable quantities on the wave power and plasma parameters are determined, and estimates for the heating extent and rate of particle heating in these wave-particle interactions are shown to be in reasonable agreement with known empirical data.

  6. Particle-like wave packets in complex scattering systems

    CERN Document Server

    Gérardin, Benoît; Ambichl, Philipp; Prada, Claire; Rotter, Stefan; Aubry, Alexandre

    2016-01-01

    A wave packet undergoes a strong spatial and temporal dispersion while propagating through a complex medium. This wave scattering is often seen as a nightmare in wave physics whether it be for focusing, imaging or communication purposes. Controlling wave propagation through complex systems is thus of fundamental interest in many areas, ranging from optics or acoustics to medical imaging or telecommunications. Here, we study the propagation of elastic waves in a cavity and a disordered waveguide by means of laser interferometry. We demonstrate how the direct experimental access to the information stored in the scattering matrix of these systems allows us to selectively excite scattering states and wave packets that travel along individual classical trajectories. Due to their limited dispersion, these particle-like scattering states will be crucially relevant for all applications involving selective wave focusing and efficient information transfer through complex media.

  7. The Formation of Packets of Hairpins in Shear Flows

    Science.gov (United States)

    Cohen, Jacob; Karp, Michael; Shukhman, Ilia

    2009-11-01

    In the present work we utilize a recently developed new method in an attempt to understand the generation of packets of hairpin vortices from a pair of counter rotating streamwise vortices embedded in uniform shear flow. This analytical-based solution method is capable of following (numerically) the evolution of finite-amplitude localized vortical disturbances embedded in shear flows. Due to their localization in space, the surrounding base flow is assumed to have homogeneous shear to leading order. The method can solve in a novel way the interaction between a general family of unbounded planar homogeneous shear flows and any localized disturbance. The solution is carried out using Lagrangian variables in Fourier space which is convenient and enables fast computations. The revealed mechanism for generation of packets of hairpins seems to be universal and has been observed in the past both in fully developed wall-bounded shear flows as well as in wall-bounded transitional shear flows.

  8. Improved Multiple Descriptions Sinusoidal Coder Adaptive to Packet Loss Rate

    Institute of Scientific and Technical Information of China (English)

    LANG Yue; WANG Jing; ZHAO Sheng-hui; KUANG Jing-ming

    2008-01-01

    To make the multiple descriptions codec adaptive to the packet loss rate, which can minimize the final distortion, a novel adaptive multiple descriptions sinusoidal coder (AMDSC) is proposed, which is based on a sinusoidal model and a noise model. Firstly, the sinusoidal parameters are extracted in the sinusoidal model, and ordered in a decrease manner. Odd indexed and even indexed parameters are divided into two descriptions. Secondly, the output vector from the noise model is split vector quantized. And the two sub-vectors are placed into two descriptions too. Finally, the number of the extracted parameters and the redundancy between the two descriptions are adjusted according to the packet loss rate of the network. Analytical and experimental results show that the proposed AMDSC outperforms existing MD speech coders by taking network loss characteristics into account. Therefore, it is very suitable for unreliable channels.

  9. Service Time Analysis for Secondary Packet Transmission with Adaptive Modulation

    KAUST Repository

    Wang, Wen-Jing

    2017-05-12

    Cognitive radio communications can opportunistically access underutilized spectrum for emerging wireless applications. With interweave cognitive implementation, secondary user transmits only if primary user does not occupy the channel and waits for transmission otherwise. Therefore, secondary packet transmission involves both transmission time and waiting time. The resulting extended delivery time (EDT) is critical to the throughput analysis of secondary system. In this paper, we study the EDT of secondary packet transmission with adaptive modulation under interweave implementation to facilitate the delay and throughput analysis of such cognitive radio system. In particular, we propose an analytical framework to derive the probability density functions of EDT considering random-length transmission and waiting slots. We also present selected numerical results to illustrate the mathematical formulations and to verify our analytical approach.

  10. Reconfigurable Data Communications Packet-Switch Emulation Test Bed Demonstrated

    Science.gov (United States)

    Chu, Pong P.; Jones, Robert E.

    1999-01-01

    The Communications Technology Division at the NASA Lewis Research Center has an ongoing program to develop advanced switching and routing technology concepts for future satellite onboard processing systems. Through a university grant as a part of this research, the Cleveland State University is using a flexible reconfigurable data communications packet switch emulation test bed to investigate packet switching techniques. Because of the switching speed and protocol complexity, implementing a data communications network is a tremendous task. Various alternatives should be carefully studied and evaluated in the development stage so that the optimal system configuration can be obtained and implemented later. Therefore, it is desirable to predict the performance of the network before it is actually constructed. This is especially true in the case of satellite systems. In the past, theoretical analysis, software simulation, and prototyping were used to evaluate performance. However, each method has its drawback. There are basic tradeoffs among accuracy, cost, and required evaluation time. No method is completely satisfactory.

  11. Wavelet packet transform-based robust video watermarking technique

    Indian Academy of Sciences (India)

    Gaurav Bhatnagar; Balasubrmanian Raman

    2012-06-01

    In this paper, a wavelet packet transform (WPT)-based robust video watermarking algorithm is proposed. A visible meaningful binary image is used as the watermark. First, sequent frames are extracted from the video clip. Then, WPT is applied on each frame and from each orientation one sub-band is selected based on block mean intensity value called robust sub-band. Watermark is embedded in the robust sub-bands based on the relationship between wavelet packet coefficient and its 8-neighbour $(D_8)$ coefficients considering the robustness and invisibility. Experimental results and comparison with existing algorithms show the robustness and the better performance of the proposed algorithm.

  12. Evaluation of packet loss impairment on streaming video

    Institute of Scientific and Technical Information of China (English)

    RUI Hua-xia; LI Chong-rong; QIU Sheng-ke

    2006-01-01

    Video compression technologies are essential in video streaming application because they could save a great amount of network resources. However compressed videos are also extremely sensitive to packet loss which is inevitable in today's best effort IP network. Therefore we think accurate evaluation of packet loss impairment on compressed video is very important. In this work, we develop an analytic model to describe these impairments without the reference of the original video (NR) and propose an impairment metric based on the model, which takes into account both impairment length and impairment strength. To evaluate an impaired frame or video, we design a detection and evaluation algorithm (DE algorithm) to compute the above metric value. The DE algorithm has low computational complexity and is currently being implemented in the real-time monitoring module of our HDTV over IP system. The impairment metric and DE algorithm could also be used in adaptive system or be used to compare diffeient error concealment strategies.

  13. SDN architecture for optical packet and circuit integrated networks

    Science.gov (United States)

    Furukawa, Hideaki; Miyazawa, Takaya

    2016-02-01

    We have been developing an optical packet and circuit integrated (OPCI) network, which realizes dynamic optical path, high-density packet multiplexing, and flexible wavelength resource allocation. In the OPCI networks, a best-effort service and a QoS-guaranteed service are provided by employing optical packet switching (OPS) and optical circuit switching (OCS) respectively, and users can select these services. Different wavelength resources are assigned for OPS and OCS links, and the amount of their wavelength resources are dynamically changed in accordance with the service usage conditions. To apply OPCI networks into wide-area (core/metro) networks, we have developed an OPCI node with a distributed control mechanism. Moreover, our OPCI node works with a centralized control mechanism as well as a distributed one. It is therefore possible to realize SDN-based OPCI networks, where resource requests and a centralized configuration are carried out. In this paper, we show our SDN architecture for an OPS system that configures mapping tables between IP addresses and optical packet addresses and switching tables according to the requests from multiple users via a web interface. While OpenFlow-based centralized control protocol is coming into widespread use especially for single-administrative, small-area (LAN/data-center) networks. Here, we also show an interworking mechanism between OpenFlow-based networks (OFNs) and the OPCI network for constructing a wide-area network, and a control method of wavelength resource selection to automatically transfer diversified flows from OFNs to the OPCI network.

  14. Performance Characteristics of a Kernel-Space Packet Capture Module

    Science.gov (United States)

    2010-03-01

    a simple sniffer. Mar- tin Roesch first created Snort to gain experience with cross-platform libpcap development and to more easily see the...lightweight N2d capabil- ity. Also written by Martin Roesch , DaemonLogger is a libpcap-based capture service with an extremely straightforward and...space, libpcap-based packet capture applica- tion written by Martin Roesch —author of the Snort Intrusion Detection Sys- tem. DaemonLogger provides a

  15. High Performance Fairness Algorithm for Resilient Packet Ring

    Institute of Scientific and Technical Information of China (English)

    Kangbok; Lee; Sangyeoun; Lee; Heyungsub; Lee; Hyeongho; Lee

    2003-01-01

    Resilient Packet Ring (RPR) is MAN technology with two counter-rotating rings that multiple stations share the bandwidth. The stations on ring must negotiate the allowed rate that they can transmit fairness eligible traffic based on the total amount of uncommitted bandwidth. RPR draft employs distributed bandwidth control algorithm in order to assure global fairness. In this paper, we suggest a new fairness control algorithm termed Congestion Distributed Fairness Algorithm (CDFA) that exhibits better pe...

  16. Lossless Compression of Data into Fixed-Length Packets

    Science.gov (United States)

    Kiely, Aaron B.; Klimesh, Matthew A.

    2009-01-01

    A computer program effects lossless compression of data samples from a one-dimensional source into fixed-length data packets. The software makes use of adaptive prediction: it exploits the data structure in such a way as to increase the efficiency of compression beyond that otherwise achievable. Adaptive linear filtering is used to predict each sample value based on past sample values. The difference between predicted and actual sample values is encoded using a Golomb code.

  17. Measurement and Evaluation Studies of Packet Radio Telecommunications Systems

    Science.gov (United States)

    2014-01-07

    terminals. Finite buffer space and FIFO transmission order are assumed at the repeaters. When there is a packet in its buffer for...against the FIFO algorithm in previous CAP protocol specifications C12D. The impact of network configuration is embedded in the specification of...scheduling algorithm can be parametrical1y selected as FIFO (CAP4)» CAP4.9 cyclic. or CAPS. The linear-backoff retransmission algorithm specified in

  18. Optical Packet Switching Scheme Using Multi-optical-code Labels

    Institute of Scientific and Technical Information of China (English)

    LI Shu-wen; ZHANG Qi; YU Chong-xiu; XIN Xiang-jun; XIONG Fei

    2009-01-01

    Proposed is a novel optical code(OC) label switching scheme in which an optical label is constructed by multiple parallel optical codes. The performances of splitting loss and BER are simulated and analyzed. Simulation results show that the proposed label can be correctly recognized to perform packet switching. Compared with reported schemes using one OC as a label, the splitting loss in our proposal is lowered.

  19. The performance analysis of linux networking - packet receiving

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Wenji; Crawford, Matt; Bowden, Mark; /Fermilab

    2006-11-01

    The computing models for High-Energy Physics experiments are becoming ever more globally distributed and grid-based, both for technical reasons (e.g., to place computational and data resources near each other and the demand) and for strategic reasons (e.g., to leverage equipment investments). To support such computing models, the network and end systems, computing and storage, face unprecedented challenges. One of the biggest challenges is to transfer scientific data sets--now in the multi-petabyte (10{sup 15} bytes) range and expected to grow to exabytes within a decade--reliably and efficiently among facilities and computation centers scattered around the world. Both the network and end systems should be able to provide the capabilities to support high bandwidth, sustained, end-to-end data transmission. Recent trends in technology are showing that although the raw transmission speeds used in networks are increasing rapidly, the rate of advancement of microprocessor technology has slowed down. Therefore, network protocol-processing overheads have risen sharply in comparison with the time spent in packet transmission, resulting in degraded throughput for networked applications. More and more, it is the network end system, instead of the network, that is responsible for degraded performance of network applications. In this paper, the Linux system's packet receive process is studied from NIC to application. We develop a mathematical model to characterize the Linux packet receiving process. Key factors that affect Linux systems network performance are analyzed.

  20. Inclusion of quantum fluctuations in wave packet dynamics

    CERN Document Server

    Ohnishi, A

    1996-01-01

    We discuss a method by which quantum fluctuations can be included in microscopic transport models based on wave packets that are not energy eigenstates. By including the next-to-leading order term in the cumulant expansion of the statistical weight, which corresponds to the wave packets having Poisson energy distributions, we obtain a much improved global description of the quantum statistical properties of the many-body system. In the case of atomic nuclei, exemplified by 12C and 40Ca, the standard liquid-drop results are reproduced at low temperatures and a phase transformation to a fragment gas occurs as the temperature is raised. The treatment can be extended to dynamical scenarios by means of a Langevin force emulating the transitions between the wave packets. The general form of the associated transport coefficients is derived and it is shown that the appropriate microcanonical equilibrium distribution is achieved in the course of the time evolution. Finally, invoking Fermi's golden rule, we derive spec...

  1. Modelling Packet Departure Times using a Known PDF

    Directory of Open Access Journals (Sweden)

    Stanislav Klucik

    2014-01-01

    Full Text Available This paper deals with IPTV traffic source modelling and describes a packet generator based on a known probability density function which is measured and formed from a histogram. Histogram based probability density functions destroy an amount of information, because classes used to form the histogram often cover significantly more events than one. In this work, we propose an algorithm to generate far more output states of random variable X than the input probability distribution function is made from. In this generator is assumed that all IPTV packets of the same video stream are the same length. Therefore, only packet times are generated. These times are generated using the measured normalized histogram that is converted to a cumulative distribution function which acts as a finite number of states that can be addressed. To address these states we use an ON/OFF model that is driven by an uniform random number generator in (0, 1. When a state is chosen then the resulting value is equal to a histogram class. To raise the number of possible output states of the random variable X, we propose to use an uniform random number generator that generates numbers within the range of the chosen histogram class. This second uniform random number generator assures that the number of output states is far more larger than the number of histogram classes.

  2. An Adaptive Power Efficient Packet Scheduling Algorithm for Wimax Networks

    CERN Document Server

    Prasad, R Murali

    2010-01-01

    Admission control schemes and scheduling algorithms are designed to offer QoS services in 802.16/802.16e networks and a number of studies have investigated these issues. But the channel condition and priority of traffic classes are very rarely considered in the existing scheduling algorithms. Although a number of energy saving mechanisms have been proposed for the IEEE 802.16e, to minimize the power consumption of IEEE 802.16e mobile stations with multiple real-time connections has not yet been investigated. Moreover, they mainly consider non real- time connections in IEEE 802.16e networks. In this paper, we propose to design an adaptive power efficient packet scheduling algorithm that provides a minimum fair allocation of the channel bandwidth for each packet flow and additionally minimizes the power consumption. In the adaptive scheduling algorithm, packets are transmitted as per allotted slots from different priority of traffic classes adaptively, depending on the channel condition. Suppose if the buffer s...

  3. Hardware Accelerators Targeting a Novel Group Based Packet Classification Algorithm

    Directory of Open Access Journals (Sweden)

    O. Ahmed

    2013-01-01

    Full Text Available Packet classification is a ubiquitous and key building block for many critical network devices. However, it remains as one of the main bottlenecks faced when designing fast network devices. In this paper, we propose a novel Group Based Search packet classification Algorithm (GBSA that is scalable, fast, and efficient. GBSA consumes an average of 0.4 megabytes of memory for a 10 k rule set. The worst-case classification time per packet is 2 microseconds, and the preprocessing speed is 3 M rules/second based on an Xeon processor operating at 3.4 GHz. When compared with other state-of-the-art classification techniques, the results showed that GBSA outperforms the competition with respect to speed, memory usage, and processing time. Moreover, GBSA is amenable to implementation in hardware. Three different hardware implementations are also presented in this paper including an Application Specific Instruction Set Processor (ASIP implementation and two pure Register-Transfer Level (RTL implementations based on Impulse-C and Handel-C flows, respectively. Speedups achieved with these hardware accelerators ranged from 9x to 18x compared with a pure software implementation running on an Xeon processor.

  4. HTTP Packet Inspection Policy for Improvising Internal Network Security

    Directory of Open Access Journals (Sweden)

    Kuldeep Tomar

    2014-10-01

    Full Text Available Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security breaches have also increased. Data on a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are lots of mechanisms available but still they are not good enough because of dynamic environment. Such kind of attacks can be countered by applying appropriate policies on network edge devices like Adaptive Security Appliance, firewalls, web servers, router etc. Also the packets which are transferred between networks, they should deeply inspect for malicious or any insecure contents. In this paper firstly we would study Network security issues and available mechanism to counter them our focus would be on inspecting the HTTP packets deeply by applying policies on ASA. Finally we would use Graphical Network Simulator (GNS3 to test such a policy.

  5. Energy-Delay Considerations in Coded Packet Flows

    CERN Document Server

    Lucani, Daniel E

    2011-01-01

    We consider a line of terminals which is connected by packet erasure channels and where random linear network coding is carried out at each node prior to transmission. In particular, we address an online approach in which each terminal has local information to be conveyed to the base station at the end of the line and provide a queueing theoretic analysis of this scenario. First, a genie-aided scenario is considered and the average delay and average transmission energy depending on the link erasure probabilities and the Poisson arrival rates at each node are analyzed. We then assume that all nodes cannot send and receive at the same time. The transmitting nodes in the network send coded data packets before stopping to wait for the receiving nodes to acknowledge the number of degrees of freedom, if any, that are required to decode correctly the information. We analyze this problem for an infinite queue size at the terminals and show that there is an optimal number of coded data packets at each node, in terms o...

  6. Electron Rydberg wave packets in one-dimensional atoms

    Indian Academy of Sciences (India)

    Supriya Chatterjee; Amitava Choudhuri; Aparna Saha; B Talukdar

    2010-09-01

    An expression for the transition probability or form factor in one-dimensional Rydberg atom irradiated by short half-cycle pulse was constructed. In applicative contexts, our expression was found to be more useful than the corresponding result given by Landau and Lifshitz. Using the new expression for the form factor, the motion of a localized quantum wave packet was studied with particular emphasis on its revival and super-revival properties. Closed form analytical expressions were derived for expectation values of the position and momentum operators that characterized the widths of the position and momentum distributions. Transient phase-space localization of the wave packet produced by the application of a single impulsive kick was explicitly demonstrated. The undulation of the uncertainty product as a function of time was studied in order to visualize how the motion of the wave packet in its classical trajectory spreads throughout the orbit and the system becomes nonclassical. The process, however, repeats itself such that the atom undergoes a free evolution from a classical, to a nonclassical, and back to a classical state.

  7. Efficient incremental relaying for packet transmission over fading channels

    KAUST Repository

    Fareed, Muhammad Mehboob

    2014-07-01

    In this paper, we propose a novel relaying scheme for packet transmission over fading channels, which improves the spectral efficiency of cooperative diversity systems by utilizing limited feedback from the destination. Our scheme capitalizes on the fact that relaying is only required when direct transmission suffers deep fading. We calculate the packet error rate for the proposed efficient incremental relaying (EIR) scheme with both amplify and forward and decode and forward relaying. We compare the performance of the EIR scheme with the threshold-based incremental relaying (TIR) scheme. It is shown that the efficiency of the TIR scheme is better for lower values of the threshold. However, the efficiency of the TIR scheme for higher values of threshold is outperformed by the EIR. In addition, three new threshold-based adaptive EIR are devised to further improve the efficiency of the EIR scheme. We calculate the packet error rate and the efficiency of these new schemes to provide the analytical insight. © 2014 IEEE.

  8. Reporting consistently on CSR

    DEFF Research Database (Denmark)

    Thomsen, Christa; Nielsen, Anne Ellerup

    2006-01-01

    of a case study showing that companies use different and not necessarily consistent strategies for reporting on CSR. Finally, the implications for managerial practice are discussed. The chapter concludes by highlighting the value and awareness of the discourse and the discourse types adopted......This chapter first outlines theory and literature on CSR and Stakeholder Relations focusing on the different perspectives and the contextual and dynamic character of the CSR concept. CSR reporting challenges are discussed and a model of analysis is proposed. Next, our paper presents the results...... in the reporting material. By implementing consistent discourse strategies that interact according to a well-defined pattern or order, it is possible to communicate a strong social commitment on the one hand, and to take into consideration the expectations of the shareholders and the other stakeholders...

  9. A Magnetic Consistency Relation

    CERN Document Server

    Jain, Rajeev Kumar

    2012-01-01

    If cosmic magnetic fields are indeed produced during inflation, they are likely to be correlated with the scalar metric perturbations that are responsible for the Cosmic Microwave Background anisotropies and Large Scale Structure. Within an archetypical model of inflationary magnetogenesis, we show that there exists a new simple consistency relation for the non-Gaussian cross correlation function of the scalar metric perturbation with two powers of the magnetic field in the squeezed limit where the momentum of the metric perturbation vanishes. We emphasize that such a consistency relation turns out to be extremely useful to test some recent calculations in the literature. Apart from primordial non-Gaussianity induced by the curvature perturbations, such a cross correlation might provide a new observational probe of inflation and can in principle reveal the primordial nature of cosmic magnetic fields.

  10. Consistency in Distributed Systems

    OpenAIRE

    Kemme, Bettina; Ramalingam, Ganesan; Schiper, André; Shapiro, Marc; Vaswani, Kapil

    2013-01-01

    International audience; In distributed systems, there exists a fundamental trade-off between data consistency, availability, and the ability to tolerate failures. This trade-off has significant implications on the design of the entire distributed computing infrastructure such as storage systems, compilers and runtimes, application development frameworks and programming languages. Unfortunately, it also has significant, and poorly understood, implications for the designers and developers of en...

  11. Geometrically Consistent Mesh Modification

    KAUST Repository

    Bonito, A.

    2010-01-01

    A new paradigm of adaptivity is to execute refinement, coarsening, and smoothing of meshes on manifolds with incomplete information about their geometry and yet preserve position and curvature accuracy. We refer to this collectively as geometrically consistent (GC) mesh modification. We discuss the concept of discrete GC, show the failure of naive approaches, and propose and analyze a simple algorithm that is GC and accuracy preserving. © 2010 Society for Industrial and Applied Mathematics.

  12. Consistent wind Facilitates Vection

    Directory of Open Access Journals (Sweden)

    Masaki Ogawa

    2011-10-01

    Full Text Available We examined whether a consistent haptic cue suggesting forward self-motion facilitated vection. We used a fan with no blades (Dyson, AM01 providing a wind of constant strength and direction (wind speed was 6.37 m/s to the subjects' faces with the visual stimuli visible through the fan. We used an optic flow of expansion or contraction created by positioning 16,000 dots at random inside a simulated cube (length 20 m, and moving the observer's viewpoint to simulate forward or backward self-motion of 16 m/s. we tested three conditions for fan operation, which were normal operation, normal operation with the fan reversed (ie, no wind, and no operation (no wind and no sound. Vection was facilitated by the wind (shorter latency, longer duration and larger magnitude values with the expansion stimuli. The fan noise did not facilitate vection. The wind neither facilitated nor inhibited vection with the contraction stimuli, perhaps because a headwind is not consistent with backward self-motion. We speculate that the consistency between multi modalities is a key factor in facilitating vection.

  13. Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Loss in the Voice over IP (VoIP Transmission

    Directory of Open Access Journals (Sweden)

    Hamza Kheddar

    2015-03-01

    Full Text Available The work consists first of making improvements of a MELP coder running at 2.4 kbps by the implementation of packets lost concealment techniques based on the receiver. These techniques consist of interleaving information frames, then, we conducted a comparative study of several interlacing methods. For this, we used the evaluation technique standardized by ITU-T called PESQ (Perceptual Evaluation of Speech Quality.

  14. A Better Memoryless Online Algorithm for FIFO Buffering Packets with Two Values

    CERN Document Server

    Li, Fei

    2010-01-01

    We consider scheduling weighted packets in a capacity-bounded buffer. In this model, there is a buffer with a limited capacity B such that at any time, the buffer cannot accommodate more than B packets. Packets arrive over time. Each packet has a non-negative real value. Packets do not expire and they leave the buffer only because either we send them or we drop them. The packets that have left the buffer will not be reconsidered for delivery any more. In each time step, at most one packet in the buffer can be sent. The order in which the packets are sent should comply with the order of their arriving time. The objective is to maximize the total value of the packets sent in an online manner. In this paper, we study a variant of this model in which packets have value 1 or alpha > 1. We present a deterministic memoryless 1.305-competitive algorithm, improving the previously best known result 1.544 (Kesselman and Mansour. Journal of Algorithms 2003). In designing our algorithm, we apply a few new ideas. We do not...

  15. Design of a Multicast Optical Packet Switch Based on Fiber Bragg Grating Technology for Future Networks

    Science.gov (United States)

    Cheng, Yuh-Jiuh; Yeh, Tzuoh-Chyau; Cheng, Shyr-Yuan

    2011-09-01

    In this paper, a non-blocking multicast optical packet switch based on fiber Bragg grating technology with optical output buffers is proposed. Only the header of optical packets is converted to electronic signals to control the fiber Bragg grating array of input ports and the packet payloads should be transparently destined to their output ports so that the proposed switch can reduce electronic interfaces as well as the bit rate. The modulation and the format of packet payloads may be non-standard where packet payloads could also include different wavelengths for increasing the volume of traffic. The advantage is obvious: the proposed switch could transport various types of traffic. An easily implemented architecture which can provide multicast services is also presented. An optical output buffer is designed to queue the packets if more than one incoming packet should reach to the same destination output port or including any waiting packets in optical output buffer that will be sent to the output port at a time slot. For preserving service-packet sequencing and fairness of routing sequence, a priority scheme and a round-robin algorithm are adopted at the optical output buffer. The fiber Bragg grating arrays for both input ports and output ports are designed for routing incoming packets using optical code division multiple access technology.

  16. Infanticide and moral consistency.

    Science.gov (United States)

    McMahan, Jeff

    2013-05-01

    The aim of this essay is to show that there are no easy options for those who are disturbed by the suggestion that infanticide may on occasion be morally permissible. The belief that infanticide is always wrong is doubtfully compatible with a range of widely shared moral beliefs that underlie various commonly accepted practices. Any set of beliefs about the morality of abortion, infanticide and the killing of animals that is internally consistent and even minimally credible will therefore unavoidably contain some beliefs that are counterintuitive.

  17. The Rucio Consistency Service

    CERN Document Server

    Serfon, Cedric; The ATLAS collaboration

    2016-01-01

    One of the biggest challenge with Large scale data management system is to ensure the consistency between the global file catalog and what is physically on all storage elements. To tackle this issue, the Rucio software which is used by the ATLAS Distributed Data Management system has been extended to automatically handle lost or unregistered files (aka Dark Data). This system automatically detects these inconsistencies and take actions like recovery or deletion of unneeded files in a central manner. In this talk, we will present this system, explain the internals and give some results.

  18. When is holography consistent?

    Energy Technology Data Exchange (ETDEWEB)

    McInnes, Brett, E-mail: matmcinn@nus.edu.sg [National University of Singapore (Singapore); Ong, Yen Chin, E-mail: yenchin.ong@nordita.org [Nordita, KTH Royal Institute of Technology and Stockholm University, Roslagstullsbacken 23, SE-106 91 Stockholm (Sweden)

    2015-09-15

    Holographic duality relates two radically different kinds of theory: one with gravity, one without. The very existence of such an equivalence imposes strong consistency conditions which are, in the nature of the case, hard to satisfy. Recently a particularly deep condition of this kind, relating the minimum of a probe brane action to a gravitational bulk action (in a Euclidean formulation), has been recognized; and the question arises as to the circumstances under which it, and its Lorentzian counterpart, is satisfied. We discuss the fact that there are physically interesting situations in which one or both versions might, in principle, not be satisfied. These arise in two distinct circumstances: first, when the bulk is not an Einstein manifold and, second, in the presence of angular momentum. Focusing on the application of holography to the quark–gluon plasma (of the various forms arising in the early Universe and in heavy-ion collisions), we find that these potential violations never actually occur. This suggests that the consistency condition is a “law of physics” expressing a particular aspect of holography.

  19. Consistent quantum measurements

    Science.gov (United States)

    Griffiths, Robert B.

    2015-11-01

    In response to recent criticisms by Okon and Sudarsky, various aspects of the consistent histories (CH) resolution of the quantum measurement problem(s) are discussed using a simple Stern-Gerlach device, and compared with the alternative approaches to the measurement problem provided by spontaneous localization (GRW), Bohmian mechanics, many worlds, and standard (textbook) quantum mechanics. Among these CH is unique in solving the second measurement problem: inferring from the measurement outcome a property of the measured system at a time before the measurement took place, as is done routinely by experimental physicists. The main respect in which CH differs from other quantum interpretations is in allowing multiple stochastic descriptions of a given measurement situation, from which one (or more) can be selected on the basis of its utility. This requires abandoning a principle (termed unicity), central to classical physics, that at any instant of time there is only a single correct description of the world.

  20. Determining the wavelength of Langmuir wave packets at the Earth's bow shock

    CERN Document Server

    Krasnoselskikh, V V; Bale, S D; 10.5194/angeo-29-613-2011

    2011-01-01

    The propagation of Langmuir waves in plasmas is known to be sensitive to density fluctuations. Such fluctuations may lead to the coexistence of wave pairs that have almost opposite wave-numbers in the vicinity of their reflection points. Using high frequency electric field measurements from the WIND satellite, we determine for the first time the wavelength of intense Langmuir wave packets that are generated upstream of the Earth's electron foreshock by energetic electron beams. Surprisingly, the wavelength is found to be 2 to 3 times larger than the value expected from standard theory. These values are consistent with the presence of strong inhomogeneities in the solar wind plasma rather than with the effect of weak beam instabilities.

  1. Storage-efficient 16-Bit Hybrid IP traceback with Single Packet.

    Science.gov (United States)

    Yang, Ming Hour

    2014-01-01

    Since adversaries may spoof their source IPs in the attacks, traceback schemes have been proposed to identify the attack source. However, some of these schemes' storage requirements increase with packet numbers. Some even have false positives because they use an IP header's fragment offset for marking. Thus, we propose a 16-bit single packet hybrid IP traceback scheme that combines packet marking and packet logging with high accuracy and low storage requirement. The size of our log tables can be bounded by route numbers. We also set a threshold to determine whether an upstream interface number is stored in a log table or in a marking field, so as to balance the logging frequency and our computational loads. Because we store user interface information on small-degree routers, compared with current single packet traceback schemes, ours can have the lowest storage requirements. Besides, our traceback achieves zero false positive/negative rates and guarantees reassembly of fragmented packets at the destination.

  2. A Probabilistic Scheme for Reducing the Packet Loss in Mobile IPv6

    Directory of Open Access Journals (Sweden)

    Kabir Md. Humayun

    2012-12-01

    Full Text Available Mobile IPv6 allows a Mobile Node to remain reachable by a Correspondent Node while roaming from one network to another network. In Mobile IPv6, a Mobile Node directly updates its current location information to a Correspondent Node using a route optimization method. Route optimization helps to culminate the packet delay incurred due to suboptimal route traversed by the packets from a Correspondent Node to a Mobile Node in Mobile IPv4. However, it introduces packet losses during Mobile Node's transition from one network to another network. This packet loss increases as the mobility of the node increases. In this paper, we propose a probabilistic scheme to reduce this packet loss. Our solution is based on the Mobile Node's mobility prediction at the Correspondent Node and a buffering mechanism at the Home Agent. Simulation results prove the effectiveness of our scheme in case of reducing the packet loss problem besetting the Mobile IPv6.

  3. Implementation of a data packet generator using pattern matching for wearable ECG monitoring systems.

    Science.gov (United States)

    Noh, Yun Hong; Jeong, Do Un

    2014-07-15

    In this paper, a packet generator using a pattern matching algorithm for real-time abnormal heartbeat detection is proposed. The packet generator creates a very small data packet which conveys sufficient crucial information for health condition analysis. The data packet envelopes real time ECG signals and transmits them to a smartphone via Bluetooth. An Android application was developed specifically to decode the packet and extract ECG information for health condition analysis. Several graphical presentations are displayed and shown on the smartphone. We evaluate the performance of abnormal heartbeat detection accuracy using the MIT/BIH Arrhythmia Database and real time experiments. The experimental result confirm our finding that abnormal heart beat detection is practically possible. We also performed data compression ratio and signal restoration performance evaluations to establish the usefulness of the proposed packet generator and the results were excellent.

  4. AUTOMATING SELECTION OF OPTIMAL PACKET SCHEDULING DURING VOIP-TRAFFIC TRANSMISSION

    Directory of Open Access Journals (Sweden)

    Yuliya A. Balakshina

    2016-11-01

    Full Text Available The usage of various packet scheduling disciplines in computer networking devices as a mechanism to ensure the quality of service is described. Stages for selection of necessary parameters values of packet scheduling during VoIP-traffic transmission in computer networks are defined. VoIP-traffic was set as a research object because there are strict requirements of VoIP-applications to the network transmission parameters. With the aid of training and experimental simulation system the numerous experiments for parameters selection of the most common packet scheduling disciplines were carried out (FIFO, WFQ, non-preemptive priority queueing. The example that illustrates the ability to adjust the weighting coefficients of WFQ packet scheduling discipline is presented. Approximate analytical dependences are obtained and they will significantly reduce system administrators’ efforts to assess and modify the parameters of packet scheduling in network devices. A method of automating selection of the optimal packet scheduling discipline is formulated.

  5. Multiple-input multiple-output wavelet packet modulation based software-defined radio transceiver design

    OpenAIRE

    Cribbs, Michael R.

    2015-01-01

    Approved for public release; distribution is unlimited In this thesis, a software-defined radio (SDR) transmitter and receiver is developed using GNU Radio. The designed SDR multiplexes orthogonal subcarriers using wavelet packet modulation (WPM). WPM achieves subcarrier orthogonality by employing the inverse discrete wavelet packet transform (IDWPT) for the transmitter and discrete wavelet packet transform (DWPT) for the receiver. Realization concerns for the IDWPT and DWPT are discussed ...

  6. Efficient multi-field packet classification for QoS purposes

    OpenAIRE

    Borg, Niklas; Svanberg, Emil; Schelén, Olov

    1999-01-01

    Mechanisms for service differentiation in datagram networks, such as the Internet, rely on packet classification in routers to provide appropriate service. Classification involves matching multiple packet header fields against a possibly large set of filters identifying the different service classes. In this paper, we describe a packet classifier based on tries and binomial trees and we investigate its scaling properties in three QoS scenarios that are likely to occur in the Internet. One sce...

  7. Monitor Network Traffic with Packet Capture (pcap) on an Android Device

    Science.gov (United States)

    2015-09-01

    ARL-TN-0650 ● SEP 2015 US Army Research Laboratory Monitor Network Traffic with Packet Capture (pcap) on an Android Device by...Do not return it to the originator. ARL-TN-0650 ● SEP 2015 US Army Research Laboratory Monitor Network Traffic with Packet...Sep 2015 2. REPORT TYPE Final 3. DATES COVERED (From - To) 4/15/14–9/1/14 4. TITLE AND SUBTITLE Monitor Network Traffic with Packet Capture (pcap

  8. All optical contention detection and resolution for asynchronous variable length optical packets switching

    Science.gov (United States)

    Farhat, Rim; Farhat, Amel; Menif, Mourad

    2016-04-01

    We proposed a novel 2×2 all optical packet switching router architecture supporting asynchronous, labelled and variablelength packet. A proof of concept through Matlab Simulink simulation is validated. Then we discussed the three possible scenarios to demonstrate the contention resolution technique based on deflection routing. We have showing that the contending packet is detected and forwarded according FIFO (First In First Out) strategy to another output.

  9. Spreading of wave packets, Uncertainty Relations and the de Broglie Frequency

    CERN Document Server

    Caldas, H C G

    1998-01-01

    The spreading of quantum mechanical wave packets are studied in two cases. Firstly we look at the time behavior of the packet width of a free particle confined in the observable Universe. Secondly, by imposing the conservation of the time average of the packet width of a particle driven by a harmonic oscillator potential, we find a zero-point energy which frequency is the de Broglie frequency.

  10. When Is Holography Consistent?

    CERN Document Server

    McInnes, Brett

    2015-01-01

    Holographic duality relates two radically different kinds of theory: one with gravity, one without. The very existence of such an equivalence imposes strong consistency conditions which are, in the nature of the case, hard to satisfy. Recently a particularly deep condition of this kind, relating the minimum of a probe brane action to a gravitational bulk action (in a Euclidean formulation), has been recognised; and the question arises as to the circumstances under which it, and its Lorentzian counterpart, are satisfied. We discuss the fact that there are physically interesting situations in which one or both versions might, in principle, \\emph{not} be satisfied. These arise in two distinct circumstances: first, when the bulk is not an Einstein manifold, and, second, in the presence of angular momentum. Focusing on the application of holography to the quark-gluon plasma (of the various forms arising in the early Universe and in heavy-ion collisions), we find that these potential violations never actually occur...

  11. Influences of clock resolution of bandwidth measurement on packet pair algorithm

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The packet pair algorithm[1],proposed by VanTacobsonand,was employed to measure the bottle-neck(link)bandwidth of a net work route by Carterand Crovella.The packet pair algorithm was provedcorrect theoretically by Lai and Baker[2].However,the definition of the packet pair algortithn is basedon ideal net work environments.The factors in thereal net work environments,such as queuing[3]andtraffic interference[4],are not considered.Themeasurements using the packet pair algorithm arenot accurate and stable.In th...

  12. Entropy Based Detection of DDoS Attacks in Packet Switching Network Models

    Science.gov (United States)

    Lawniczak, Anna T.; Wu, Hao; di Stefano, Bruno

    Distributed denial-of-service (DDoS) attacks are network-wide attacks that cannot be detected or stopped easily. They affect “natural” spatio-temporal packet traffic patterns, i.e. “natural distributions” of packets passing through the routers. Thus, they affect “natural” information entropy profiles, a sort of “fingerprints”, of normal packet traffic. We study if by monitoring information entropy of packet traffic through selected routers one may detect DDoS attacks or anomalous packet traffic in packet switching network (PSN) models. Our simulations show that the considered DDoS attacks of “ping” type cause shifts in information entropy profiles of packet traffic monitored even at small sets of routers and that it is easier to detect these shifts if static routing is used instead of dynamic routing. Thus, network-wide monitoring of information entropy of packet traffic at properly selected routers may provide means for detecting DDoS attacks and other anomalous packet traffics.

  13. Time behavior of a Gaussian wave packet accompanying the generalized coherent state for the inverted oscillator

    Science.gov (United States)

    Maamache, Mustapha; Bouguerra, Yacine; Choi, Jeong Ryeol

    2016-06-01

    A Gaussian wave packet of the inverted oscillator is investigated using the invariant operator method together with the unitary transformation method. A simple wave packet directly derived from the eigenstates of the invariant operator of the system corresponds to a plane wave that is fully delocalized. However, we can construct a weighted wave packet in terms of such plane waves, which corresponds to a Gaussian wave. This wave packet is associated with the generalized coherent state, which can be crucially utilized for investigating the classical limit of quantum wave mechanics. Various quantum properties of the system, such as fluctuations of the canonical variables, the uncertainty product, and the motion of the wave packet or quantum particle, are analyzed by means of this wave packet. We have confirmed that the time behavior of such a wave packet is very similar to the counterpart classical state. The wave packet runs away from the origin in the positive or negative direction in the 1D coordinate depending on the condition of the initial state. We have confirmed that this wave packet not only moves acceleratively but also spreads out during its propagation.

  14. A New Stateless Packet Classification and Filter against DoS Attacks

    Directory of Open Access Journals (Sweden)

    Guang Jin

    2014-02-01

    Full Text Available Capabilities is a typical scheme of stateless filtering. In order to classify and filter packets effectively, a novel scheme of packet classification and filter based on capabilities is proposed in this paper. In our scheme, a new classifier module is added and a new filter structure is designed. We employ capabilities as verification and introduce new authorization in the communications. All these innovations make packet classification owning good effects in attacking scenario. The experimental results based on large-scale topology datasets and NS2 show that our scheme is better than traditional packet classification algorithms, especially under complex cyber environment.

  15. Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping

    CERN Document Server

    Alhabeeb, M A; Le, P D

    2010-01-01

    Denial of service attacks (DoS) can cause significant financial damages. Flooding and Malicious packets are two kinds of DoS attacks. This paper presents a new security approach which stops malicious packets and prevents flooding in the critical systems. New concepts of packet stamp a dynamic-multi-communication-point mechanism has been identified for this proposed approach to make the prevention of flooding attacks easier and the performing of malicious packet attacks harder. In addition, dynamic key encryption technique has been adapted as a part of the proposed approach to enhance its functionality.

  16. Time delay of wave packets during their tunnelling through a quantum diode

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, N A; Skalozub, V V [Dnipropetrovsk National University Oles Honchar (Ukraine)

    2014-04-28

    A modified saddle-point method is used to investigate the process of propagation of a wave packet through a quantum diode. A scattering matrix is constructed for the structure in question. The case of tunnelling of a packet with a Gaussian envelope through the diode is considered in detail. The time delay and the shape of the wave packet transmitted are calculated. The dependence of the delay time on the characteristics of the input packet and the internal characteristics of the quantum diode is studied. Possible applications of the results obtained are discussed. (laser applications and other topics in quantum electronics)

  17. Sampled-Data Consensus of Linear Multi-agent Systems With Packet Losses.

    Science.gov (United States)

    Zhang, Wenbing; Tang, Yang; Huang, Tingwen; Kurths, Jurgen

    2016-08-17

    In this paper, the consensus problem is studied for a class of multi-agent systems with sampled data and packet losses, where random and deterministic packet losses are considered, respectively. For random packet losses, a Bernoulli-distributed white sequence is used to describe packet dropouts among agents in a stochastic way. For deterministic packet losses, a switched system with stable and unstable subsystems is employed to model packet dropouts in a deterministic way. The purpose of this paper is to derive consensus criteria, such that linear multi-agent systems with sampled-data and packet losses can reach consensus. By means of the Lyapunov function approach and the decomposition method, the design problem of a distributed controller is solved in terms of convex optimization. The interplay among the allowable bound of the sampling interval, the probability of random packet losses, and the rate of deterministic packet losses are explicitly derived to characterize consensus conditions. The obtained criteria are closely related to the maximum eigenvalue of the Laplacian matrix versus the second minimum eigenvalue of the Laplacian matrix, which reveals the intrinsic effect of communication topologies on consensus performance. Finally, simulations are given to show the effectiveness of the proposed results.

  18. Field structure of collapsing wave packets in 3D strong Langmuir turbulence

    Science.gov (United States)

    Newman, D. L.; Robinson, P. A.; Goldman, M. V.

    1989-01-01

    A simple model is constructed for the electric fields in the collapsing wave packets found in 3D simulations of driven and damped isotropic strong Langmuir turbulence. This model, based on a spherical-harmonic decomposition of the electrostatic potential, accounts for the distribution of wave-packet shapes observed in the simulations, particularly the predominance of oblate wave packets. In contrast with predictions for undamped and undriven subsonic collapse of scalar fields, oblate vector-field wave packets do not flatten during collapse but, instead, remain approximately self-similar and rigid.

  19. A SCHEDULING ALGORITHM USING COMPENSATING ROUND ROBIN IN PACKET-SWTICHING BROADBAND NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Lan Julong; Wang Binqiang; Li Ou; Wu Jiangxing

    2002-01-01

    A new approximation of fair queuing called Compensating Round Robin (CRR)is presented in this paper. The algorithm uses packet-by-packet scheduler with a compensating measure. It achieves good fairness in terms of throughput, requires only O(1) time complexity to process a packet, and is simple enough to be implemented in hardware. After the performances are analyzed, the fairness and packet loss rate of the algorithm are simulated. Simulation results show that the CRR can effectively isolate the effects of contending sources.

  20. On the Packet Loss Correlation in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Cabrera Guerrero, Juan Alberto; Roetter, Daniel Enrique Lucani

    2014-01-01

    State-of-the-art analysis and protocols in wireless mesh networks typically assume an independent packet loss channel for each receiver of a transmission. Although this is usually transparent for single-path protocol design, this assumption may severely degrade the performance of opportunistic and....../or multi-path routing approaches as well as network coding (NC) subgraph selection problems (routing in NC). This paper proposes simple channel models to incorporate the effect of correlation between receivers in a parametric fashion and supports them with a measurement campaign that leverages various...

  1. Riemann zeta function from wave-packet dynamics

    DEFF Research Database (Denmark)

    Mack, R.; Dahl, Jens Peder; Moya-Cessa, H.

    2010-01-01

    is governed by the temperature of the thermal phase state and tau is proportional to t. We use the JWKB method to solve the inverse spectral problem for a general logarithmic energy spectrum; that is, we determine a family of potentials giving rise to such a spectrum. For large distances, all potentials...... index of JWKB. We compare and contrast exact and approximate eigenvalues of purely logarithmic potentials. Moreover, we use a numerical method to find a potential which leads to exact logarithmic eigenvalues. We discuss possible realizations of Riemann zeta wave-packet dynamics using cold atoms...

  2. Simulation of the Physical Performance of Optical Packet Switching Nodes

    Institute of Scientific and Technical Information of China (English)

    王春华; 李力; 等

    2002-01-01

    A graphical and visual simulation system for the study of optical packet switching(OPS)nodes is accomplished.With the simulation system,the effect on physical performance-bit error rate(BER)due to a variety of factors such as the crosstalk parameters of OPS nodes,number of cascaded OPS nodes,length of optical output buffer,traffic load and fluctuation of amplitude of optical signals are evaluated.Reliability of the simulation system is proved by the analytical results obtained in all the above cases.

  3. Packetisation in Optical Packet Switch Fabrics using adaptive timeout values

    DEFF Research Database (Denmark)

    Mortensen, Brian Bach

    2006-01-01

    to the inter arrival rate at the individual VOQs. The remaining thresholds applies to the optical slot level inter arrival rate at the input and output line cards. If any measurements are beyond a given threshold, the higher timeout value is used. The proposed method can be used to make a trade-off between...... either because the timer reaches a specific timeout value, or because the optical packet is completely filled with segments. Only two distinct values of the timeout value are used. Which of the two timeout values to use, is selected by 3 different control thresholds. The first threshold level applies...

  4. High Performance Fairness Algorithm for Resilient Packet Ring

    Institute of Scientific and Technical Information of China (English)

    Kangbok Lee; Sangyeoun Lee; Heyungsub Lee; Hyeongho Lee

    2003-01-01

    Resilient Packet Ring (RPR) is MAN technology with two counter-rotating rings that multiple stations share the bandwidth. The stations on ring must negotiate the allowed rate that they can transmit fairness eligible traffic based on the total amount of uncommitted bandwidth. RPR draft employs distributed bandwidth control algorithm in order to assure global fairness. In this paper, we suggest a new fairness control algorithm termed Congestion Distributed Fairness Algorithm (CDFA) that exhibits better performance than RPR fairness algorithm. It attributes all stations on ring to have a regular transmission rate even though heavy congestion occurs in a station.

  5. ANALYSIS AND DESIGN OF THE STABLE PARALLEL PACKET SWITCH

    Institute of Scientific and Technical Information of China (English)

    Dong Yuguo; Li Zupeng; Guo Yunfei; Wu Jiangxin

    2005-01-01

    This paper analyzes the Parallel Packet Switch(PPS) architecture and studies how to guarantee its performance. Firstly a model of Stable PPS (SPPS) is proposed. The constraints of traffic scheduling algorithms, the number of switching layers and internal speedup, for both bufferless and buffered SPPS architecture, are theoretically analyzed. Based on these results, an example of designing a scalable SPPS with 1.28T capacity is presented, and practical considerations on implementing the scheduling algorithm are discussed. Simulations are carried out to investigate the validity and delay performance of the SPPS architecture.

  6. Satellite link augmentation of ground based packet switched data networks

    Science.gov (United States)

    Farrell, J. B.; McLane, P. J.; Campbell, L. L.

    Use of satellite link augmentation to improve the performance of a packet switched data network is considered. Particular attention is paid to the analysis of two queues in series from the standpoint of time delay. A finite state machine model is used to aid the analysis. The results from the analysis are then used in a flow deviation routing algorithm. This algorithm is applied to study the performance improvement when satellite links are used to augment the Canadian DATAPAC network. The results are backed up by extensive simulations on a digital computer.

  7. Development and fabrication of monolithically integrated optical packet switches

    Science.gov (United States)

    Yanson, Dan A.; Silver, Mark; Vassalli, Omar; Campbell, Margaret; Masterton, Graeme; McDougall, Stewart D.; Marsh, John H.

    2007-02-01

    We report development activities towards realization of fully integrated 1x2, 2x2, and 4x4 cross-point optical switches for WDM-packet-based data networking. Two enabling technologies, quantum-well intermixing and etched turning mirrors, are developed and demonstrated in InGaAs/InAlGaAs InP-based material at a wavelength of 1.55 μm. We describe the use of both technologies to fabricate switch chips with different port counts.

  8. Informative conditions for the data set in an MIMO networked control system with delays, packet dropout and transmission scheduling

    Science.gov (United States)

    Zhang, Cong; Xiong, Zhihua; Ye, Hao

    2014-07-01

    In system identification, a data set needs to be informative to guarantee that the identification criterion has a unique global minimum asymptotically and the parameter estimation is consistent. In this paper, we study the informativity of the data set in a multiple-input and multiple-output (MIMO) networked control system (NCS), which contains possible network-induced delays, packet dropout, transmission scheduling, or a combination of these factors in network transmission. Moreover, to guarantee the data set of this MIMO NCS to be informative, a group of conditions for network transmission and controller's proportional term are developed. Finally, simulation studies are given to illustrate the result.

  9. Design for PC-based Internet Measurement System on OC-3 and 48 Packet over SONET Link

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A measurement system for packet over SONET which we have been developing is presented. The system consists of PC-based hardware and POS line interface card up to OC-48.By using PC-based platform, the system could be accomplished with an affordable cost,and can be deployed in global region. Also, this system will enable complicated measurement with a combination of other applications,i.e,passive and/or active routing control,and the real world network applications running on the same host.

  10. Wave packet molecular dynamics simulations of warm dense hydrogen

    CERN Document Server

    Knaup, M; Toepffer, C; Zwicknagel, G

    2003-01-01

    Recent shock-wave experiments with deuterium in a regime where a plasma phase-transition has been predicted and their theoretical interpretation are the matter of a controversial discussion. In this paper, we apply 'wave packet molecular dynamics' (WPMD) simulations to investigate warm dense hydrogen. The WPMD method was originally used by Heller for a description of the scattering of composite particles such as simple atoms and molecules; later it was applied to Coulomb systems by Klakow et al. In the present version of our model the protons are treated as classical point-particles, whereas the electrons are represented by a completely anti-symmetrized Slater sum of periodic Gaussian wave packets. We present recent results for the equation of state of hydrogen at constant temperature T = 300 K and of deuterium at constant Hugoniot E - E sub 0 + 1/2(1/n - 1/n sub 0)(p + p sub 0) = 0, and compare them with the experiments and several theoretical approaches.

  11. Preventing Real-Time Packet Classification Using Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    N.Vasumathi

    2014-03-01

    Full Text Available Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Typically, jamming has been addressed under an external threat model. Adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The problem of selective jamming attacks in wireless networks is addressed in this work. In these attacks, the adversary is active only for a short period of time, specifically targeting messages of high importance. The advantages of selective jamming in terms of network performance degradation and adversary effort is illustrated by presenting two case studies; one is selective attack on TCP and another is on routing. The selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To avoid these attacks, four schemes are developed such as All Or Nothing Transformation-Hiding Scheme (AONT-HS - pseudo message is added with message before transformation and encryption, Strong Hiding Commitment Scheme(SHCS - off-the-shelf symmetric encryption is done, Puzzle Based Hiding Scheme(PBHS- time lock and hash puzzle and Nonce based Authenticated Encryption Scheme(N-AES-Nonce is used for encryption, that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes.

  12. A Packet Scheduling Strategy in Sensor Networks with SGMH Protocol

    CERN Document Server

    Cherian, Mary

    2011-01-01

    Data communication in sensor networks can have timing constraints like end to end deadlines. If the deadlines are not met either a catastrophe can happen in hard real time systems or performance deterioration can occur in soft real time systems. In real time sensor networks, the recovery of data through retransmission should be minimized due to the stringent requirements on the worst case time delays. This paper presents the application of Stop and Go Multihop protocol (SGMH) at node level in wireless sensor networks for scheduling and hence to meet the hard real time routing requirements. SGMH is a distributed multihop packet delivery algorithm. The fractions of the total available bandwidth on each channel is assigned to several traffic classes by which the time it takes to traverse each of the hops from the source to the destination is bounded. It is based on the notion of time frames (Tfr). In sensor networks packets can have different delay guarantees. Multiple frame sizes can be assigned for different t...

  13. Wireless Local Area Networks with Multiple-Packet Reception Capability

    CERN Document Server

    Zhang, Ying Jun; Liew, Soung Chang

    2007-01-01

    Thanks to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station causes the destruction of all packets involved. By exploiting recent advances in PHY-layer multiuser detection (MUD) techniques, it is possible for a receiver to receive multiple packets simultaneously. This paper argues that such multipacket reception (MPR) capability can greatly enhance the capacity of future WLANs. In addition, it provides the MAC-layer and PHY-layer designs needed to achieve the improved capacity. First, to demonstrate MUD/MPR as a powerful capacity-enhancement technique, we prove a "super-linearity" result, which states that the system throughput per unit cost increases as the MPR capability increases. Second, we show that the commonly...

  14. Parametric packet-based audiovisual quality model for IPTV services

    CERN Document Server

    Garcia, Marie-Neige

    2014-01-01

    This volume presents a parametric packet-based audiovisual quality model for Internet Protocol TeleVision (IPTV) services. The model is composed of three quality modules for the respective audio, video and audiovisual components. The audio and video quality modules take as input a parametric description of the audiovisual processing path, and deliver an estimate of the audio and video quality. These outputs are sent to the audiovisual quality module which provides an estimate of the audiovisual quality. Estimates of perceived quality are typically used both in the network planning phase and as part of the quality monitoring. The same audio quality model is used for both these phases, while two variants of the video quality model have been developed for addressing the two application scenarios. The addressed packetization scheme is MPEG2 Transport Stream over Real-time Transport Protocol over Internet Protocol. In the case of quality monitoring, that is the case for which the network is already set-up, the aud...

  15. EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Sharvani G S

    2011-01-01

    Full Text Available A wireless ad-hoc network is a collection of nodes which are selfconfiguring, connected by wireless links. The nodes are free to move randomly and organize themselves arbitrarily; thus, the network's topology may change rapidly and unpredictably. These kinds of networks are very flexible and they do not require any existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary communication links. The biggest challenge in these kinds of networks is to find a path between the communication end points of nodes that are mobile. Due to the limited transmission range of wireless interfaces, the communication traffic has to be relayed over several intermediate nodes to enable the communication between two nodes. Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The proposed model is designed to improve the problems of real-time event-based communication. It improves the packet delivery ratio by prior prediction and reduces end-to-end packet delay. This in turn improves performance of the routing process significantly and increases the Quality of Service (QoS.

  16. Packet Drop Avoidance for High-speed network transmission protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  17. The Noble Path: Buddhist Art of South Asia and Tibet. Teacher's Packet.

    Science.gov (United States)

    Sierra Community Coll., Rocklin, CA. Mathematics Dept.

    A teaching packet was developed in association with the exhibition, "The Noble Path: Buddhist Art of South Asia and Tibet," held at the Arthur M. Sackler Gallery, Smithsonian Institution, Washington, D.C., from October 1, 1989 to March 31, 1990. The packet aims to provide students in middle and secondary schools with introductory…

  18. New efficiency algorithm for flooding the packet in wireless ad hoc networks

    Science.gov (United States)

    Lee, Kyuhwan; Ma, Joongsoo

    2002-08-01

    This paper proposes a novel flooding algorithm based on an existing IEEE 802.11 MAC protocol in wireless ad hoc networks. Currently when we use the multi-hop routing algorithm, such as the Ad hoc On-demand Distance Vector (AODV) algorithm, the Cluster-Based Routing Protocol (CBRP) and so on, we frequently use the broadcast packet in order to get the topology information. At this time all nodes receiving the packet try to forward the received packet to other nodes. If a number of nodes are located in the sender's coverage, the channel is busy due to the delivery of the received packet. With respect to the coverage of the IEEE 802.11, the utilization factor of the wireless network is decreased because of occupying the channel to distribute the received packet. Thus we propose the new algorithm to resolve this problem. In this algorithm, each node maintains a table of immediate neighbors as well as each neighbor's neighbors. When each node receiving broadcast packets in the sender's coverage forwards the packets, it decides whether to forward them or not by comparing the neighbor list of receiver with that of sender. The proposed algorithm can increase the network efficiency due to the decrease in frequency of broadcast packets in the multi-hop routing protocol. Finally, we evaluate the improved performance through the simulation.

  19. Ripples in Communication: Reconfigurable and Adaptive Wireless Communication Systems based on Wavelet Packet Modulators

    NARCIS (Netherlands)

    Lakshmanan, M.K.

    2011-01-01

    Wavelet Packet Modulation (WPM) is a multi-carrier transmission technique that uses orthogonal wavelet packet bases to combine a collection of information bits into a single composite signal. This system can be considered as a viable alternative, for wide-band communication, to the popular

  20. The pump-probe coupling of matter wave packets to remote lattice states

    DEFF Research Database (Denmark)

    Sherson, Jacob F; Park, Sung Jong; Pedersen, Poul Lindholm;

    2012-01-01

    containing a Bose–Einstein condensate. The evolution of these wave packets is monitored in situ and their six-photon reflection at a band gap is observed. In direct analogy with pump–probe spectroscopy, a probe pulse allows for the resonant de-excitation of the wave packet into states localized around...

  1. Sensitivity Analysis of the Optimal Parameter Settings of an LTE Packet Scheduler

    NARCIS (Netherlands)

    Fernandez Diaz, I.; Litjens, R.; Berg, J.L. van den; Dimitrova, D.C.; Spaey, K.

    2010-01-01

    Advanced packet scheduling schemes in 3G/3G+ mobile networks provide one or more parameters to optimise the trade-off between QoS and resource efficiency. In this paper we study the sensitivity of the optimal parameter setting for packet scheduling in LTE radio networks with respect to various traff

  2. A multi-function IEC 61850 packet generator based on FPGA

    Science.gov (United States)

    Wei, Wei; Li, Hong-bin; Cheng, Han-miao

    2016-07-01

    An IEC 61850 packet generator is used to produce IEC 61850-9-2 packets by simulating the merging unit and testing the IEC 61850 digital device. While the existing IEC packet generator can produce ideal digital without any noise, it does not take into account the fact that the merging unit output signal packets will be inevitably superimposed with noise. Since the International Electrical Commission standard of the electronic current transformer specifies the minimum output signal-to-noise ratio of the merging unit to be 30 dB, and the signal superimposed with noise will influence the operation performance of the digital device, it is necessary to design a multi-function IEC 61850-9-2 packet generator for a digital device test. Therefore, in this paper, a multi-function IEC 61850 packet generator has been developed, which not only can output various IEC 61850-9-2 packets, but also can add white Gaussian noise to the signal for digital device testing. By testing three digital electricity meters from different manufacturers, we showed that the error of the digital electricity meter is significantly larger when the signal packet is superimposed with noise. Also when the signal-to-noise ration is 30 dB, the error of one of the meters exceeds the allowed range of the accuracy class. This indicates that the noise testing and the noise setting function of the system has an important role in the testing of a digital device.

  3. The Elegant Art of Thailand. A Teacher Workshop on January 22, 1994. Teacher's Packet.

    Science.gov (United States)

    Schardt, Molly; And Others

    This packet accompanies a slide series that introduces students to the art of Thailand. The packet includes maps, a chronology of Southeast Asian history, an essay introduction to the influences on Thai art, a 15-item bibliography for further research, illustrations of Thai ceramics, the slide list, slide descriptions, and slide script. (EH)

  4. A Scheduling Algorithm for Time Bounded Delivery of Packets on the Internet

    NARCIS (Netherlands)

    I. Vaishnavi (Ishan)

    2008-01-01

    htmlabstractThis thesis aims to provide a better scheduling algorithm for Real-Time delivery of packets. A number of emerging applications such as VoIP, Tele-immersive environments, distributed media viewing and distributed gaming require real-time delivery of packets. Currently the scheduling

  5. Novel Scheme for Packet Forwarding without Header Modifications in Optical Networks

    DEFF Research Database (Denmark)

    Wessing, Henrik; Christiansen, Henrik Lehrmann; Fjelde, Tina

    2002-01-01

    We present a novel scheme for packet forwarding in optical packet-switched networks and we further demonstrate its good scalability through simulations. The scheme requires neither header modification nor any label distribution protocol, thus reducing component cost while simplifying network...

  6. Joint Connection and Packet level Analysis in W-CDMA Radio Interface

    DEFF Research Database (Denmark)

    Benetis, Vilius; Popova, Larissa; Iversen, Villy Bæk

    2007-01-01

    This work introduces a new analytical method for performance evaluation of wireless packet-oriented networks. Unlike traditional call admission control procedures commonly used for performance evaluation of wireless networks, this paper deals with the problem of coupling connection and packet lev...

  7. A Fuzzy Logic Classification of Incoming Packet for VoIP

    Directory of Open Access Journals (Sweden)

    Suardinata

    2010-08-01

    Full Text Available The Voice over Internet Protocol (VoIP technology is cheaper and does not need new infrastructure because it has available in the global computer (IP network. Unfortunately, transition from PSTN to VoIP networks have emerged new problems in voice quality. Furthermore, the transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion affects the Quality of Service (QoS such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as: unstable voice packet delivery, packet jitter, packet loss and echo. Priority Queuing (PQ algorithm is a popular technique used in the VoIP network to reduce delays. But, the method can result in repetition. This recursive leads to the next queue starved. To solving problems, there are three phases namely queuing, classifying and scheduling. It will be applied to the fuzzy inference system to classify the queuing incoming packet (voice, video and text. To justify the research of the improved PQ algorithm be compared against the algorithm existing.

  8. Multiwavelet packet entropy and its application in transmission line fault recognition and classification.

    Science.gov (United States)

    Liu, Zhigang; Han, Zhiwei; Zhang, Yang; Zhang, Qiaoge

    2014-11-01

    Multiwavelets possess better properties than traditional wavelets. Multiwavelet packet transformation has more high-frequency information. Spectral entropy can be applied as an analysis index to the complexity or uncertainty of a signal. This paper tries to define four multiwavelet packet entropies to extract the features of different transmission line faults, and uses a radial basis function (RBF) neural network to recognize and classify 10 fault types of power transmission lines. First, the preprocessing and postprocessing problems of multiwavelets are presented. Shannon entropy and Tsallis entropy are introduced, and their difference is discussed. Second, multiwavelet packet energy entropy, time entropy, Shannon singular entropy, and Tsallis singular entropy are defined as the feature extraction methods of transmission line fault signals. Third, the plan of transmission line fault recognition using multiwavelet packet entropies and an RBF neural network is proposed. Finally, the experimental results show that the plan with the four multiwavelet packet energy entropies defined in this paper achieves better performance in fault recognition. The performance with SA4 (symmetric antisymmetric) multiwavelet packet Tsallis singular entropy is the best among the combinations of different multiwavelet packets and the four multiwavelet packet entropies.

  9. Ripples in Communication: Reconfigurable and Adaptive Wireless Communication Systems based on Wavelet Packet Modulators

    NARCIS (Netherlands)

    Lakshmanan, M.K.

    2011-01-01

    Wavelet Packet Modulation (WPM) is a multi-carrier transmission technique that uses orthogonal wavelet packet bases to combine a collection of information bits into a single composite signal. This system can be considered as a viable alternative, for wide-band communication, to the popular Orthogona

  10. Simulation on the electronic wave packet cyclotron motion in a Weyl semimetal slab.

    Science.gov (United States)

    Yao, Haibo; Zhu, Mingfeng; Jiang, Liwei; Zheng, Yisong

    2017-04-20

    We perform a numerical simulation on the time evolution of an electronic wave packet in a Weyl semimetal (WSM) slab driven by a magnetic field. We find that the evolution trajectory of the wave packet depends sensitively on its initial spin state. Only with initial spin state identical to that of the Fermi arc state at the surface it localized, does the wave packet evolution demonstrate the characteristic cyclotron orbit of WSM previously predicted from a semiclassical viewpoint. By analyzing the eigen-expansion of the electronic wave packet, we find the chiral Landau levels (LLs) of the WSM slab, as ingredients of the wave packet, to be responsible for establishing the characteristic WSM cyclotron orbit. In contrast, the nonchiral LLs contribute irregular oscillations to the wave packet evolution, going against the formation of a well-defined cyclotron orbit. In addition, the tilted magnetic field does not affect the motion of the electronic wave packet along the Fermi arcs in the momentum space. It does, however, alter the evolution trajectory of the electronic wave packet in real space and spin space. Finally, the energy disalignment of the Weyl nodes results in a 3D cyclotron orbit in real space.

  11. ZTE Partners with KPN Group Belgium to Deploy Packet-Switched Core Network

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    27 August 2012--ZTE Corporation has signed a deal on a packet-switched core network (CN) for KPN Group Belgium (KPNGB). KPNGB will deploy ZTE's packet-switched CN equipment, which supports unified radio access. The contract is the second of its kind between ZTE and KPNfollows from a construction project with KPN Germany (E-Plus) that was completed in September 2010.

  12. The United States History = Lich Su Hoa Ky. [34 Self-Learning Packets for Vietnamese Students.

    Science.gov (United States)

    Nhi, Do Dien; And Others

    Designed primarily for Indochinese students in grades 9-12, 34 United States history self-learning packets are presented in eight sections. The publication could be used by mainstream teachers who have a number of limited English proficient (LEP) Vietnamese students in their classes or by parents to tutor their children. The packets were adapted…

  13. MULTI-OBJECTIVE OPTIMIZATION OF MULTIMEDIA PACKET SCHEDULING FOR AD HOC NETWORKS THROUGH HYBRIDIZED GENETIC ALGORITHM

    Directory of Open Access Journals (Sweden)

    R.Muthu Selvi

    2015-10-01

    Full Text Available This paper presents a new approach to optimize the schedule of the variable length multimedia packets in Ad hoc networks using hybridized Genetic Algorithm (HGA.Existing algorithm called Virtual Deadline Scheduling (VDS attempts to guarantee m out of k job instances (consecutive packets in a real-time stream by their deadlines are serviced. VDS is capable of generating a feasible window constrained schedule that utilizes 100% of resources. However, when VDS either services a packet or switches to a new request period, it must update the corresponding virtual deadline. Updating the service constraints is a bottleneck for the algorithm which increases the time complexity. HGA overcomes the problem of updating the service constraints that leads to the increased time complexity. The packet length and the number of packets to be serviced are the two conflicting criteria which are affecting the throughput of scheduling. Using HGA, a trade off can be achieved between the packet length and the number of packets to be serviced. HGA produces an optimized schedule for the multimedia packets. Journals.

  14. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  15. Estimation of Frame Independent and Enhancement Components for Speech Communication over Packet Networks

    DEFF Research Database (Denmark)

    Giacobello, Daniele; Murthi, Manohar N.; Christensen, Mads Græsbøll;

    2010-01-01

    In this paper, we describe a new approach to cope with packet loss in speech coders. The idea is to split the information present in each speech packet into two components, one to independently decode the given speech frame and one to enhance it by exploiting interframe dependencies. The scheme...... is based on sparse linear prediction and a redefinition of the analysis-by-synthesis process. We present Mean Opinion Scores for the presented coder with different degrees of packet loss and show that it performs similarly to frame dependent coders for low packet loss probability and similarly to frame...... independent coders for high packet loss probability. We also present ideas on how to make the coder work synergistically with the channel loss estimate....

  16. Magnetic helicity conservation and inverse energy cascade in electron magnetohydrodynamic wave packets.

    Science.gov (United States)

    Cho, Jungyeon

    2011-05-13

    Electron magnetohydrodynamics (EMHD) provides a fluidlike description of small-scale magnetized plasmas. An EMHD wave propagates along magnetic field lines. The direction of propagation can be either parallel or antiparallel to the magnetic field lines. We numerically study propagation of three-dimensional (3D) EMHD wave packets moving in one direction. We obtain two major results. (1) Unlike its magnetohydrodynamic (MHD) counterpart, an EMHD wave packet is dispersive. Because of this, EMHD wave packets traveling in one direction create opposite-traveling wave packets via self-interaction and cascade energy to smaller scales. (2) EMHD wave packets traveling in one direction clearly exhibit inverse energy cascade. We find that the latter is due to conservation of magnetic helicity. We compare inverse energy cascade in 3D EMHD turbulence and two-dimensional (2D) hydrodynamic turbulence.

  17. IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem

    Directory of Open Access Journals (Sweden)

    Y. Bhavani

    2015-06-01

    Full Text Available Probabilistic Packet Marking algorithm suggests a methodology to identify all the participated routers of the attack path by probabilistically marking the packets. In this approach, these marked packets contain partial information regarding the routers of the attack path. At receiver, to get the complete information of every router, it requires more number of marked packets and hence more combinations and more false positives. To overcome this drawback we have presented a novel idea in finding the exact IP address of the routers in the attack path by applying Chinese Remainder Theorem. The result of our implementation reveals that our idea requires less number of marked packets and takes no time in constructing the attack path. The same idea is true even in the case of multiple attackers.

  18. Packet transfer delay analysis of the RPR rings in the store-and-forward architecture

    Science.gov (United States)

    Yang, Yi; Cao, Mingcui; Huang, Ping

    2005-02-01

    RRP has two means to transmit data: store-and-forward and cut-through. In this paper, the high and low priority packet transfer delay of the N nodes Resilient Packet Rings (RPR) in store-and-forward architecture is analyzed based on the queuing theory. According to queuing theory, we set up the nodes model and analyzed the factors that influenced the packet transfer delay in a constrained condition. By calculation and simulation, the result indicates that both high priority and low priority packets" delay increase with the node number N of the RPR rings. The high priority traffic has less packet delay than the low priority traffic at the same node number N. The increase of the low priority transfer delay is much larger than the high priority traffic with the increase of the node number.

  19. Packet Skipping and Network Coding for Delay-Sensitive Network Communication

    CERN Document Server

    Aoun, Marc; Argyriou, Antonios; Denteneer, Dee; van der Stok, Peter

    2012-01-01

    We provide an analytical study of the impact of packet skipping and opportunistic network coding on the timely communication of messages through a single network element. In a first step, we consider a single-server queueing system with Poisson arrivals, exponential service times, and a single buffer position. Packets arriving at a network node have a fixed deadline before which they should reach the destination. To preserve server capacity, we introduce a thresholding policy, based on remaining time until deadline expiration, to decide whether to serve a packet or skip its service. The obtained goodput improvement of the system is derived, as well as the operating conditions under which thresholding can enhance performance. Subsequently, we focus our analysis on a system that supports network coding instead of thresholding. We characterize the impact of network coding at a router node on the delivery of packets associated with deadlines. We model the router node as a queueing system where packets arrive from...

  20. Toward Massive, Ultrareliable, and Low-Latency Wireless Communication With Short Packets

    DEFF Research Database (Denmark)

    Durisi, Giuseppe; Koch, Tobias; Popovski, Petar

    2016-01-01

    Most of the recent advances in the design of high-speed wireless systems are based on information-theoretic principles that demonstrate how to efficiently transmit long data packets. However, the upcoming wireless systems, notably the fifth-generation (5G) system, will need to support novel traffic...... types that use short packets. For example, short packets represent the most common form of traffic generated by sensors and other devices involved in machine-to-machine (M2M) communications. Furthermore, there are emerging applications in which small packets are expected to carry critical information...... that should be received with low latency and ultrahigh reliability. Current wireless systems are not designed to support short-packet transmissions. For example, the design of current systems relies on the assumption that the metadata (control information) is of negligible size compared to the actual...

  1. Improving Packet Processing Efficiency on Multi-core Architectures with Single Input Queue

    Directory of Open Access Journals (Sweden)

    Peter Orosz

    2012-06-01

    Full Text Available Generic purpose multi-core PC architectures are facing performance challenges of high rate packet reception on gigabit per second and higher speed network interfaces. In order to assign a CPU core to a networking softIRQ, the single input queue design of the low-level packet processing subsystem relies on the kernel's Symmetric Multiprocessing (SMP scheduler, which does not perform load balancing of the softIRQ instances between the CPU cores. In practice, when single receive queue is used all of the softIRQs are assigned to a single CPU core. This typical arrangement could easily drive to CPU resource exhaustion and high packet loss ratio on high bandwidth interfaces. The non-steady state of the system is triggered by the high arrival rate of the packets. This work presents a proposal for improving the packet processing efficiency in single input queue multi-core systems.

  2. An Efficient Approach for Generalized Load Balancing in Multipath Packet Switched Networks

    CERN Document Server

    Ali, G G Md Nawaz; Alam, Md Shihabul; Chan, Edward; 10.5121/ijcnc.2010.2211

    2010-01-01

    This paper is a quantitative analysis on packet switched network with a view to generalize load balancing and determination of appropriate routing algorithm in multipath environment. Several routing algorithms have been introduced for routing of packets from source to destination. Some of them route packets accurately with increased workload and some of them drastically cut down the workload. A few of them can find out a minimum workload deviation for both UDP and TCP packets. We simulated these approaches in a well defined simulator, analyzed and evaluated their performance. After expanding our analysis with varying weights and number of paths we found that the recently proposed routing algorithm Mixed Weighted Fair Routing (MWFR) outperforms the existing routing algorithms by reducing the routing and network overhead and saving the scarce bandwidth as well as CPU consumption for packet switching networks.

  3. Statistical Mechanics-Inspired Modeling of Heterogeneous Packet Transmission in Communication Networks.

    Science.gov (United States)

    Sarkar, S; Mukherjee, K; Ray, A; Srivastav, A; Wettergren, T A

    2012-08-01

    This paper presents the qualitative nature of communication network operations as abstraction of typical thermodynamic parameters (e.g., order parameter, temperature, and pressure). Specifically, statistical mechanics-inspired models of critical phenomena (e.g., phase transitions and size scaling) for heterogeneous packet transmission are developed in terms of multiple intensive parameters, namely, the external packet load on the network system and the packet transmission probabilities of heterogeneous packet types. Network phase diagrams are constructed based on these traffic parameters, and decision and control strategies are formulated for heterogeneous packet transmission in the network system. In this context, decision functions and control objectives are derived in closed forms, and the pertinent results of test and validation on a simulated network system are presented.

  4. Dispatching packets on a global combining network of a parallel computer

    Science.gov (United States)

    Almasi, Gheorghe; Archer, Charles J.

    2011-07-19

    Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.

  5. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Daehee Kim

    2016-07-01

    Full Text Available Code dissemination in wireless sensor networks (WSNs is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.

  6. Magnetic Helicity Conservation and Inverse Energy Cascade in Electron Magnetohydrodynamic Wave Packets

    CERN Document Server

    Cho, Jungyeon

    2011-01-01

    Electron magnetohydrodynamics (EMHD) provides a fluid-like description of small-scale magnetized plasmas. An EMHD wave (also known as whistler wave) propagates along magnetic field lines. The direction of propagation can be either parallel or anti-parallel to the magnetic field lines. We numerically study propagation of 3-dimensional (3D) EMHD wave packets moving in one direction. We obtain two major results: 1. Unlike its magnetohydrodynamic (MHD) counterpart, an EMHD wave packet is dispersive. Because of this, EMHD wave packets traveling in one direction create opposite traveling wave packets via self-interaction and cascade energy to smaller scales. 2. EMHD wave packets traveling in one direction clearly exhibit inverse energy cascade. We find that the latter is due to conservation of magnetic helicity. We compare inverse energy cascade in 3D EMHD turbulence and 2-dimensional (2D) hydrodynamic turbulence.

  7. Test particle simulation study of whistler wave packets observed near Comet Giacobini-Zinner

    Science.gov (United States)

    Kaya, N.; Matsumoto, H.; Tsurutani, B. T.

    1989-01-01

    Nonlinear interactions of water group ions with large-amplitude whistler wave packets detected at the leading edge of steepened magnetosonic waves observed near Comet Giacobini-Zinner (GZ) are studied using test particle simulations of water-ion interactions with a model wave based on GZ data. Some of the water ions are found to be decelerated in the steepened portion of the magnetosonic wave to the resonance velocity with the whistler wave packets. Through resonance and related nonlinear interaction with the large-amplitude whistler waves, the water ions become trapped by the packet. An energy balance calculation demonstrates that the trapped ions lose their kinetic energy during the trapped motion in the packet. Thus, the nonlinear trapping motion in the wave structure leads to effective energy transfer from the water group ions to the whistler wave packets in the leading edge of the steepened MHD waves.

  8. Round robin based Secure-Aware Packet Scheduling in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Arun Raj

    2013-03-01

    Full Text Available Packet scheduling algorithms enhances the packet delivery rate effectively in wireless networks; it helps to improve the quality of service of the wireless networks. Many algorithms had been deployed in the area of packet scheduling in wireless networks but less attention is paid to security. Some algorithms which offer security often compromise performances such as schedulability, this is not desirable. This performance problem will become worse when the system is under heavy load. In this paper we propose Round robin based Secure- Aware Packet Scheduling algorithm (RSAPS for wireless networks which focuses on secure scheduling. RSAPS is an adaptive algorithm which gives priority to scheduling when system is under heavy load. Under light load RSAPS provide maximum security for the incoming packets. Simulation has been performed using the proposed method and compared with existing algorithms SPSS and ISPAS. And it is found that RSAPS shows excellent scheduling quality holding the security levels.

  9. E-model MOS Estimate Improvement through Jitter Buffer Packet Loss Modelling

    Directory of Open Access Journals (Sweden)

    Adrian Kovac

    2011-01-01

    Full Text Available Proposed article analyses dependence of MOS as a voice call quality (QoS measure estimated through ITU-T E-model under real network conditions with jitter. In this paper, a method of jitter effect is proposed. Jitter as voice packet time uncertainty appears as increased packet loss caused by jitter memory buffer under- or overflow. Jitter buffer behaviour at receiver’s side is modelled as Pareto/D/1/K system with Pareto-distributed packet interarrival times and its performance is experimentally evaluated by using statistic tools. Jitter buffer stochastic model is then incorporated into E-model in an additive manner accounting for network jitter effects via excess packet loss complementing measured network packet loss. Proposed modification of E-model input parameter adds two degrees of freedom in modelling: network jitter and jitter buffer size.

  10. A Denoising Algorithm for Noisy Chaotic Signals Based on the Higher Order Threshold Function in Wavelet-Packet

    Institute of Scientific and Technical Information of China (English)

    DENG Ke; ZHANG Lu; LUO Mao-Kang

    2011-01-01

    @@ Aiming at the shortage of conventional threshold function in wavelet noise reduction of chaotic signals, we propose a wavelet-packet noise reduction method of chaotic signals based on a new higher order threshold function.The method retains the useful high-frequency information, and the threshold function is continuous and derivable, therefore it is more consistent with the characteristics of the continuous signal.Contrast simulation experiment shows that the effect of noise reduction and the precision of noise reduction of chaotic signals both are improved.%Aiming at the shortage of conventional threshold function in wavelet noise reduction of chaotic signals, we propose a wavelet-packet noise reduction method of chaotic signals based on a new higher order threshold function. The method retains the useful high-frequency information, and the threshold function is continuous and derivable,therefore it is more consistent with the characteristics of the continuous signal. Contrast simulation experiment shows that the effect of noise reduction and the precision of noise reduction of chaotic signals both are improved.

  11. Routing Diverse Evacuees with the Cognitive Packet Network Algorithm

    Directory of Open Access Journals (Sweden)

    Huibo Bi

    2014-04-01

    Full Text Available Regarding mobility, health conditions and personal preferences, evacuees can be categorized into different classes in realistic environments. Previous emergency navigation algorithms that direct evacuees with a single decision rule cannot fulfil civilians’ distinct service requirements and increase the likelihood of inducing destructive crowd behaviours, such as clogging, pushing and trampling, due to diverse mobility. This paper explores a distributed emergency navigation algorithm that employs the cognitive packet network concept to tailor different quality of service needs to different categories of evacuees. In addition, a congestion-aware algorithm is presented to predict the future congestion degree of a path with respect to the observed population density, arrival rate and service rate of each route segment. Experiments are implemented in a simulated environment populated with autonomous agents. Results show that our algorithm can increase the number of survivors while providing improved quality of service.

  12. Flavor entanglement in neutrino oscillations in the wave packet description

    Science.gov (United States)

    Blasone, Massimo; Dell'Anno, Fabio; De Siena, Silvio; Illuminati, Fabrizio

    2015-10-01

    The wave packet approach to neutrino oscillations provides an enlightening description of quantum decoherence induced, during propagation, by localization effects. Within this approach, we show that a deeper insight into the dynamical aspects of particle mixing can be obtained if one investigates the behavior of quantum correlations associated to flavor oscillations. By identifying the neutrino three-flavor modes with (suitably defined) three-qubit modes, the exploitation of tools of quantum information theory for mixed states allows a detailed analysis of the dynamical behavior of flavor entanglement during free propagation. This provides further elements leading to a more complete understanding of the phenomenon of neutrino oscillations, and a basis for possible applicative implementations. The analysis is carried out by studying the distribution of the flavor entanglement; to this aim, we perform combined investigations of the behaviors of the two-flavor concurrence and of the logarithmic negativities associated with specific bipartitions of the three flavors.

  13. Detection and Isolation of Packet Dropping Attacker in MANETs

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed Abdalla

    2013-05-01

    Full Text Available Several approaches have been proposed for Intrusion Detection Systems (IDS in Mobile Ad hoc Networks (MANETs. Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM. DIPDAM mechanism based on three ID messages Path Validation Message (PVM , Attacker Finder Message (AFM and Attacker Isolation Message (AIM. DIPDAM mechanism based on End-to-End (E2E communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.

  14. Integrated Fractional Load and Packet Scheduling for OFDMA Systems

    DEFF Research Database (Denmark)

    Monghal, Guillaume Damien; Kumar, S.; Pedersen, Klaus I.

    2009-01-01

    This paper study the performance of an orthogonal frequency division multiple access (OFDMA) system under fractional load based in long term evolution (LTE) downlink. Fractional load is defined by a situation where only a fraction of the bandwidth is used for transmission due to lack of traffic....... This type of situation should result in a global increase of signal to interference and noise ratio (SINR) conditions in the network. We propose different methods integrating the transmission pattern selection to the packet scheduling functionality of the enode-B depending only on the channel quality...... indicator (CQI) reports from the user equipments. Fractional load handling is operated without inter eNode-B coordination. We conclude that the system can operate under fractional load conditions if the CQI is calculated with wideband interference. Further gain can be obtained if the CQI is calculated...

  15. Nonlinear single Compton scattering of an electron wave-packet

    CERN Document Server

    Angioi, A; Di Piazza, A

    2016-01-01

    In the presence of a sufficiently intense electromagnetic laser field, an electron can absorb on average a large number of photons from the laser and emit a high-energy one (nonlinear single Compton scattering). The case of nonlinear single Compton scattering by an electron with definite initial momentum has been thoroughly investigated in the literature. Here, we consider a more general initial state of the electron and use a wave-packet obtained as a superposition of Volkov wave functions. In particular, we investigate the energy spectrum of the emitted radiation at fixed observation direction and show that in typical experimental situations the sharply peaked structure of nonlinear single Compton scattering spectra of an electron with definite initial energy is almost completely washed out. Moreover, we show that at comparable uncertainties, the one in the momentum of the incoming electron has a larger impact on the photon spectra at a fixed observation direction than the one on the laser frequency, relate...

  16. Packet flow analysis in IP networks via abstract interpretation

    CERN Document Server

    Komondoor, Raghavan; Seetharam, Deva P; Balodia, Sudha

    2011-01-01

    Static analysis (aka offline analysis) of a model of an IP network is useful for understanding, debugging, and verifying packet flow properties of the network. There have been static analysis approaches proposed in the literature for networks based on model checking as well as graph reachability. Abstract interpretation is a method that has typically been applied to static analysis of programs. We propose a new, abstract-interpretation based approach for analysis of networks. We formalize our approach, mention its correctness guarantee, and demonstrate its flexibility in addressing multiple network-analysis problems that have been previously solved via tailor-made approaches. Finally, we investigate an application of our analysis to a novel problem -- inferring a high-level policy for the network -- which has been addressed in the past only in the restricted single-router setting.

  17. DESIGN OF WAVELET PACKET BASED MODEL FOR MULTI CARRIER MODULATION

    Directory of Open Access Journals (Sweden)

    MIHIR NARAYAN MOHANTY

    2012-04-01

    Full Text Available In current scenario Multi-Carrier modulation (MCM is considered an effective technique for both wire and wireless communications. It divides the entire bandwidth into several parallel sub-channels. This splitting is by dividing the transmit data into several parallel low-bit-rate data streams and then to modulate the carrierscorresponding to those sub-channels. Though MCM technique uses Orthogonal Frequency Division Multiplexing (OFDM model, it is very sensitive to Carrier Frequency Offset (CFO, that leads to a severedistortion in subcarrier orthogonality and causes inter channel interference (ICI. In this paper, Wavelet Packet Transform is designed for the model of MCM as a novel alternative to the most exiting Orthogonal Frequency Division Multiplexing (OFDM technique, because of its time frequency representation and lower side lobes intransmitted signals, that reduces inter carrier interference (ICI, and inter symbol interference (ISI. Performance analysis is investigated for such model. Simulation results show a significant enhancement in terms of spectral efficiency.

  18. High-speed packet switching network to link computers

    CERN Document Server

    Gerard, F M

    1980-01-01

    Virtually all of the experiments conducted at CERN use minicomputers today; some simply acquire data and store results on magnetic tape while others actually control experiments and help to process the resulting data. Currently there are more than two hundred minicomputers being used in the laboratory. In order to provide the minicomputer users with access to facilities available on mainframes and also to provide intercommunication between various experimental minicomputers, CERN opted for a packet switching network back in 1975. It was decided to use Modcomp II computers as switching nodes. The only software to be taken was a communications-oriented operating system called Maxcom. Today eight Modcomp II 16-bit computers plus six newer Classic minicomputers from Modular Computer Services have been purchased for the CERNET data communications networks. The current configuration comprises 11 nodes connecting more than 40 user machines to one another and to the laboratory's central computing facility. (0 refs).

  19. Information Geometry of Quantum Entangled Gaussian Wave-Packets

    CERN Document Server

    Kim, D -H; Cafaro, C; Mancini, S

    2011-01-01

    Describing and understanding the essence of quantum entanglement and its connection to dynamical chaos is of great scientific interest. In this work, using information geometric (IG) techniques, we investigate the effects of micro-correlations on the evolution of maximal probability paths on statistical manifolds induced by systems whose microscopic degrees of freedom are Gaussian distributed. We use the statistical manifolds associated with correlated and non-correlated Gaussians to model the scattering induced quantum entanglement of two spinless, structureless, non-relativistic particles, the latter represented by minimum uncertainty Gaussian wave-packets. Knowing that the degree of entanglement is quantified by the purity P of the system, we express the purity for s-wave scattering in terms of the micro-correlation coefficient r - a quantity that parameterizes the correlated microscopic degrees of freedom of the system; thus establishing a connection between entanglement and micro-correlations. Moreover, ...

  20. Recovery time in quantum dynamics of wave packets

    Energy Technology Data Exchange (ETDEWEB)

    Strekalov, M. L., E-mail: strekalov@kinetics.nsc.ru [Russian Academy of Sciences, Voevodskii Institute of Chemical Kinetics and Combustion, Siberian Branch (Russian Federation)

    2017-01-15

    A wave packet formed by a linear superposition of bound states with an arbitrary energy spectrum returns arbitrarily close to the initial state after a quite long time. A method in which quantum recovery times are calculated exactly is developed. In particular, an exact analytic expression is derived for the recovery time in the limiting case of a two-level system. In the general case, the reciprocal recovery time is proportional to the Gauss distribution that depends on two parameters (mean value and variance of the return probability). The dependence of the recovery time on the mean excitation level of the system is established. The recovery time is the longest for the maximal excitation level.

  1. Psychoacoustic Music Analysis Based on the Discrete Wavelet Packet Transform

    Directory of Open Access Journals (Sweden)

    Xing He

    2008-01-01

    Full Text Available Psychoacoustical computational models are necessary for the perceptual processing of acoustic signals and have contributed significantly in the development of highly efficient audio analysis and coding. In this paper, we present an approach for the psychoacoustic analysis of musical signals based on the discrete wavelet packet transform. The proposed method mimics the multiresolution properties of the human ear closer than other techniques and it includes simultaneous and temporal auditory masking. Experimental results show that this method provides better masking capabilities and it reduces the signal-to-masking ratio substantially more than other approaches, without introducing audible distortion. This model can lead to greater audio compression by permitting further bit rate reduction and more secure watermarking by providing greater signal space for information hiding.

  2. Denoising in Wavelet Packet Domain via Approximation Coefficients

    Directory of Open Access Journals (Sweden)

    Zahra Vahabi

    2012-01-01

    Full Text Available In this paper we propose a new approach in the wavelet domain for image denoising. In recent researches wavelet transform has introduced a time-Frequency transform for computing wavelet coefficient and eliminating noise. Some coefficients have effected smaller than the other's from noise, so they can be use reconstruct images with other subbands. We have developed Approximation image to estimate better denoised image. Naturally noiseless subimage introduced image with lower noise. Beside denoising we obtain a bigger compression rate. Increasing image contrast is another advantage of this method. Experimental results demonstrate that our approach compares favorably to more typical methods of denoising and compression in wavelet domain.100 images of LIVE Dataset were tested, comparing signal to noise ratios (SNR,soft thresholding was %1.12 better than hard thresholding, POAC was %1.94 better than soft thresholding and POAC with wavelet packet was %1.48 better than POAC.

  3. Optimal Packet Scheduling on an Energy Harvesting Fading Channel

    CERN Document Server

    Ozcelik, F Mehmet; Uysal-Biyikoglu, Elif

    2012-01-01

    An offline transmission completion time minimization problem for an energy harvesting transmitter is considered. Specifically, optimal power and rate allocation for data packets arriving at arbitrary but known instances is studied. Communication takes place under a fading channel and transmitter is restricted with a limited energy storage capability. An optimal policy takes into account the channel state as well as the state of energy and data buffers. Moreover, the solution needs to strike a tradeoff between energy efficiency and delay. By exhibiting an equivalent convex problem, the unique optimal scheduling solution is obtained through an iterative convex optimization technique, sequential unconstrained minimization. The optimal solution under finite and infinite energy storage is examined on problem instances.

  4. Experimental evaluation of the impact of packet capturing tools for web services.

    Energy Technology Data Exchange (ETDEWEB)

    Choe, Yung Ryn; Mohapatra, Prasant (University of California, Davis, CA); Chuah, Chen-Nee (University of California, Davis, CA); Chen, Chao-Chih (University of California, Davis, CA)

    2011-10-01

    Network measurement is a discipline that provides the techniques to collect data that are fundamental to many branches of computer science. While many capturing tools and comparisons have made available in the literature and elsewhere, the impact of these packet capturing tools on existing processes have not been thoroughly studied. While not a concern for collection methods in which dedicated servers are used, many usage scenarios of packet capturing now requires the packet capturing tool to run concurrently with operational processes. In this work we perform experimental evaluations of the performance impact that packet capturing process have on web-based services; in particular, we observe the impact on web servers. We find that packet capturing processes indeed impact the performance of web servers, but on a multi-core system the impact varies depending on whether the packet capturing and web hosting processes are co-located or not. In addition, the architecture and behavior of the web server and process scheduling is coupled with the behavior of the packet capturing process, which in turn also affect the web server's performance.

  5. Optical node for fast packet-switching networks in the KEOPS project: structure and performance aspects

    Science.gov (United States)

    Chiaroni, Dominique; Lavigne, Bruno; Tran, Tri; Hamon, Laure; Jourdan, Amaury

    1998-10-01

    The future telecommunication network will have to face the dramatic increase of subscribers as well as the increase of the user bandwidth through new services. All-optical packet switching techniques can become a strategic objective to offer on an unique technology a service-transparent network. In this paper, we will describe in detail the structure of an optical packet switching node developed in the framework of the ACTS 043 KEOPS project. An analysis of the key functions will be reported to fulfill system requirements including cascadability. In particular the input synchronization, the Broadcast-and-select switching matrix and the output regenerative interface will be described and physical performance will be assessed through theoretical analysis: quality of the signal, packet jitter and packet power fluctuation. The electronic circuitry for the control of the components of each sub-block will be described. Finally, experimental validations of a 160 Gbit/s throughput node will be reported. In order to complete the analysis, the logical performance in a Bernoulli-type traffic will be regarded. In particular an optimized buffer including a recirculation loop will be studied. Logical performance exhibiting a packet loss rate lower than 10-9 for a 0.8 load and mean packet delay as low as 3 packet slots will be illustrated, thereby demonstrating full compatibility with ATM constraints. Finally, new perspectives in terms of throughput potential through cascading will be drawn.

  6. Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification

    Directory of Open Access Journals (Sweden)

    Muhammad Shafiq

    2017-01-01

    Full Text Available Accurate network traffic classification at early stage is very important for 5G network applications. During the last few years, researchers endeavored hard to propose effective machine learning model for classification of Internet traffic applications at early stage with few packets. Nevertheless, this essential problem still needs to be studied profoundly to find out effective packet number as well as effective machine learning (ML model. In this paper, we tried to solve the above-mentioned problem. For this purpose, five Internet traffic datasets are utilized. Initially, we extract packet size of 20 packets and then mutual information analysis is carried out to find out the mutual information of each packet on n flow type. Thereafter, we execute 10 well-known machine learning algorithms using crossover classification method. Two statistical analysis tests, Friedman and Wilcoxon pairwise tests, are applied for the experimental results. Moreover, we also apply the statistical tests for classifiers to find out effective ML classifier. Our experimental results show that 13–19 packets are the effective packet numbers for 5G IM WeChat application at early stage network traffic classification. We also find out effective ML classifier, where Random Forest ML classifier is effective classifier at early stage Internet traffic classification.

  7. Propagation of General Wave Packets in Some Classical and Quantum Systems

    Institute of Scientific and Technical Information of China (English)

    LIN Qiong-Gui

    2006-01-01

    In quantum mechanics the center of a wave packet is precisely defined as the center of probability. The center-of-probability velocity describes the entire motion of the wave packet. In classical physics there is no precise counterpart to the center-of-probability velocity of quantum mechanics, in spite of the fact that there exist in the literature at least eight different velocities for the electromagnetic wave. We propose a center-of-energy velocity to describe the entire motion of general wave packets in classical physical systems. It is a measurable quantity, and is well defined for both continuous and discrete systems. For electromagnetic wave packets it is a generalization of the velocity of energy transport. General wave packets in several classical systems are studied and the center-of-energy velocity is calculated and expressed in terms of the dispersion relation and the Fourier coefficients. These systems include string subject to an external force, monatomic chain and diatomic chain in one dimension, and classical Heisenberg model in one dimension. In most cases the center-of-energy velocity reduces to the group velocity for quasi-monochromatic wave packets. Thus it also appears to be the generalization of the group velocity. Wave packets of the relativistic Dirac equation are discussed briefly.

  8. MULTI-OBJECTIVE OPTIMIZATION OF MULTIMEDIA PACKET SCHEDULING FOR AD HOC NETWORKS THROUGH HYBRIDIZED GENETIC ALGORITHM

    Directory of Open Access Journals (Sweden)

    R.Muthu Selvi

    2011-09-01

    Full Text Available This paper presents a new approach to optimize the schedule of the variable length multimedia packets inAd hoc networks using hybridized Genetic Algorithm (HGA.Existing algorithm called Virtual DeadlineScheduling (VDS attempts to guarantee m out of k job instances (consecutive packets in a real-timestream by their deadlines are serviced. VDS is capable of generating a feasible window constrainedschedule that utilizes 100% of resources. However, when VDS either services a packet or switches to a newrequest period, it must update the corresponding virtual deadline. Updating the service constraints is abottleneck for the algorithm which increases the time complexity. HGA overcomes the problem of updatingthe service constraints that leads to the increased time complexity. The packet length and the number ofpackets to be serviced are the two conflicting criteria which are affecting the throughput of scheduling.Using HGA, a trade off can be achieved between the packet length and the number of packets to beserviced. HGA produces an optimized schedule for the multimedia packets. Journals

  9. Smokers' recall of Australian graphic cigarette packet warnings & awareness of associated health effects, 2005-2008

    Directory of Open Access Journals (Sweden)

    Quester Pascale G

    2011-04-01

    Full Text Available Abstract Background In 2006, Australia introduced graphic cigarette packet warnings. The new warnings include one of 14 pictures, many depicting tobacco-related pathology. The warnings were introduced in two sets; Set A in March and Set B from November. This study explores their impact on smokers' beliefs about smoking related illnesses. This study also examines the varying impact of different warnings, to see whether warnings with visceral images have greater impact on smokers' beliefs than other images. Methods Representative samples of South Australian smokers were interviewed in four independent cross-sectional omnibus surveys; in 2005 (n = 504, 2006 (n = 525, 2007 (n = 414 and 2008 (n = 464. Results Unprompted recall of new graphic cigarette warnings was high in the months following their introduction, demonstrating that smokers' had been exposed to them. Smokers also demonstrated an increase in awareness about smoking-related diseases specific to the warning messages. Warnings that conveyed new information and had emotive images demonstrated greater impact on recall and smokers' beliefs than more familiar information and less emotive images. Conclusions Overall graphic pack warnings have had the intended impact on smokers. Some have greater impact than others. The implications for policy makers in countries introducing similar warnings are that fresh messaging and visceral images have the greatest impact.

  10. 160-Gb/s Silicon All-Optical Packet Switch for Buffer-less Optical Burst Switching

    DEFF Research Database (Denmark)

    Hu, Hao; Ji, Hua; Pu, Minhao;

    2015-01-01

    We experimentally demonstrate a 160-Gb/s Ethernet packet switch using an 8.6-mm-long silicon nanowire for optical burst switching, based on cross phase modulation in silicon. One of the four packets at the bit rate of 160 Gb/s is switched by an optical control signal using a silicon based 1 × 1 all......-optical packet switch. Error free performance (BER switched packet. The use of optical burst switching protocols could eliminate the need for optical buffering in silicon packet switch based optical burst switching, which might be desirable for high-speed interconnects within a short...

  11. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  12. Wave-packet treatment of neutrino oscillations and its implications on determining the neutrino mass hierarchy

    CERN Document Server

    Chan, Yat-Long; Tsui, Ka Ming; Wong, Chan Fai; Xu, Jianyi

    2015-01-01

    We derive the neutrino flavor transition probabilities with the neutrino treated as a wave packet. The decoherence and dispersion effects from the wave-packet treatment show up as damping and phase-shifting of the plane-wave neutrino oscillation patterns. If the energy uncertainty in the initial neutrino wave packet is larger than around 0.01 of the neutrino energy, the decoherence and dispersion effects would degrade the sensitivity of reactor neutrino experiments to mass hierarchy measurement to lower than 3 $\\sigma$ confidence level.

  13. Wave packet approach to the Jayne-Cummings and Rabi models

    CERN Document Server

    Larson, J

    2006-01-01

    This paper numerically studies the Jaynes-Cummings model with and without the rotating wave approximation in a non-standard way. Expressing the models with field quadrature operators, instead of the typically used boson ladder operators, a wave packet propagation approach is applied. The obtained evolved wave packets are then used to calculate various quantities, such as, Rabi oscillations, squeezing and entanglement. Many of the phenomenon can be explained from the wave packet evolution, either in the adiabatic or diabatic frames. Different behaviours of the two models are discussed.

  14. Influences of clock resolution of bandwidth measurement on packet pair algorithm

    Institute of Scientific and Technical Information of China (English)

    Wu Weiguo; Zhang Wenjie; Qian Depei; Liu Yi

    2007-01-01

    Influences of the clock resolution of bandwidth estimator on the accuracy and stability of the packet pair algorithm was analyzed. A mathematic model has been established to reveal the relationship between the result deviation coefficient and the packet size, clock resolution and real bandwidth(value)of the measured route. A bandwidth self-adapting packet pair algorithm was presented based on the mathematic model to reduce the estimation error resulting from the clock resolution and to improve the accuracy and stability of measurement by adjusting the deviation coefficient. Experimental results have verified the validity and stability of the algorithm.

  15. A Service Ratio-Based Dynamic Fair Queueing Algorithm for Packet Switching Networks

    Institute of Scientific and Technical Information of China (English)

    YIN De-bin; XIE Jian-ying; ZHANG Yan; WU Jian-zhen; SUN Hua-li

    2008-01-01

    A new weighted fair queeetng algodthm is proposed,which uses the novel flow-based service ratio parameters to schedule flows.This solves the main drawback of traditional weighted fair quoneing algorithmsthe packet-based calculation of the weight parameters.In addition,this paper proposes a novel service ratio calculation method and a queue management techaology.The former adjusts the service ratio parameters adaptively based on the dynamics of the packet lengths and then solves the unfairness problem induced by the variable packet length.The latter impgoves the utilization of the server's queue buffeg and reduces the delay jitter throegh restricting the buffer length for each flow.

  16. Three Packets of Minerals of the Periodic Table of Chemical Elements and Chemical Compounds

    OpenAIRE

    Labushev, Mikhail M.

    2013-01-01

    The concepts of alpha- and beta-packets of the periodic table of chemical elements and chemical compounds are defined. The first of the 47 minerals alpha-packets is composed. In it all minerals are arranged in increasing Iav index of proportionality of atomic weights of composing chemical elements, the same way as chemical elements are located in increasing atomic weights in the Periodic table. The packet includes 93 known minerals and two compounds - N2O5 and CO2 - being actually minerals. B...

  17. Oak Ridge Environmental Information System (ORIES) site workstation information packet for OREIS V1. 2

    Energy Technology Data Exchange (ETDEWEB)

    Voorhees, L.D.; McCord, R.A.; Durfee, R.C.; Land, M.L.; Olson, R.J.; Palmer, M.R.; Thomas, J.K.; Tinnel, E.P.; Zygmunt, B.C.

    1993-02-01

    The OREIS site workstation information packet was developed to accompany the OREIS site workstations, which are being delivered to the Environmental Restoration programs at the five DOE-OR sites. The packet is written specifically for the Site ER program staff at each of the five Sites who have been designated the OREIS contact by their ER program manager, and is not intended for general distribution. The packet provides an overview of the components of OREIS, points to more detailed information provided in the accompanying vendor and OREIS developed manuals, and includes information on training opportunities and user support.

  18. Throughput performance analysis of multirate, multiclass S-ALOHA OFFH-CDMA packet networks

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Borges, Ben Hur V

    2015-01-01

    In this paper, we propose a new throughput expression for multirate, multiclass slotted-ALOHA optical fast frequency hopping code-division multiple-access (OFFH-CDMA) packet networks considering a Poisson distribution for packet composite arrivals. We analyze the packet throughput performance...... of a three-class OFFH-CDMA network, where multirate transmissions are achieved via manipulation of the user's code parameters. It is shown that users transmitting at low rates interfere considerably in the performance of high rate users. Finally, we perform a validation procedure to demonstrate...

  19. Quantum wave packet dynamics with trajectories: reflections on a downhill ramp potential

    Science.gov (United States)

    Lopreore, Courtney L.; Wyatt, Robert E.

    2000-07-01

    The quantum trajectory method (QTM) for wave packet dynamics involves solving discretized hydrodynamic equations-of-motion in the Lagrangian picture (C. Lopreore, R.E. Wyatt, Phys. Rev. Lett. 82 (1999) 5190). In this Letter, results are presented which illustrate the dynamics of an initial Gaussian wave packet on a downhill ramp potential. Plots are shown for the time evolving probability density, as well as phase space plots and force diagrams. The mechanism, deduced from these plots, surprisingly shows some of the transmitted fluid elements of the wave packet making a U-turn before they head downhill on the ramp potential.

  20. Inversion of an Atomic Wave Packet in a Circularly Polarized Electromagnetic Wave

    Institute of Scientific and Technical Information of China (English)

    ZENG Gao-Jian

    2001-01-01

    We study behavior of an atomic wave packet in a circularly polarized electromagnetic wave, and particularly calculate the atomic inversion of the wave packet. A general method of calculation is presented. The results are interesting. For example, if the wave packet is very narrow or/and the interaction is very strong, no matter the atom is initially in its ground state or excited state, the atomic inversion approaches zero as time approaches infinity. If the atom is initially in its ground state and excited state with the probability 1/2 respectively, and if the momentum density is an even function, then the atomic inversion equals zero at any time.``

  1. Fault Diagnosis of a Turbo-unit Based on Wavelet Packet Theory

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In this paper we studied the fault feature of the generator set and the characteristics of wavelet packet theory for signal de-noising. The vibration signal of the generator set in diffrent states is analyzed by using the signal re-construction technique of the wavelet packet theory. The time domain method is given for the generator set fault diagnosis. The experiment results show that the wavelet packet theory can be used to directly identify the state of the generator set and provide a credible new idea for complex machinery fault diagnosis.

  2. Highly survivable communications: Complementary media packet switched networks

    Science.gov (United States)

    Yavuz, D.; Eken, F.; Karavassilis, N.

    1994-07-01

    The requirement for highly survivable communications (HSC) for essential command functions in military operations does not need any justification. The ability to communicate under extreme jamming levels and adverse propagation conditions, including high altitude nuclear events, is a very important requirement. There are also many natural disaster related requirements that also need such highly survivable communications. The prevalent and in a sense classical, approach to provide highly assured connectivity can be summarized as follows: Take a particular propagation medium and try to obtain the ultimate performance from it. There are many examples of this philosophy some successful, most not. Our approach, on the other hand, is to use complementary multi-media or mixed-media where communication links utilizing essentially commercial-off-the-shelf (COTS) equipment are integrated using packet radio (PR) techniques. There is also, in our view, an even more fundamental, recently discovered consideration why the expectation of continuous incremental refinement of a system using a given single media may be be achievable. This is derived from the theory of 'deterministic uncertainty' or more popularly known as 'theory of CHAOS', systems whose state space behavior has fractal characteristics. We will elaborate on this novel argument. Complementary multi-media approach has been the focus for all HSC communications activities at STC since 1982. The original STC studies and prototypes were in response to requirements of broadcasting (i.e., one-way transmission) information. A high frequency (HF)/meteorburst (MB) system was developed/prototyped/tested demonstrating the cost effectiveness of the approach. These results are reviewed. More recently, in 1992 STC has completed the development/test of an Open Systems Interconnection (OSI) HF packet radio protocol as no such open or non-proprietary protocol exists. This protocol has been fully tested, documented and made available to

  3. The internal consistency of perfect competition

    OpenAIRE

    Jakob Kapeller; Stephan Pühringer

    2010-01-01

    This article surveys some arguments brought forward in defense of the theory of perfect competition. While some critics propose that the theory of perfect competition, and thus also the theory of the firm, are logically flawed, (mainstream) economists defend their most popular textbook model by a series of apparently different arguments. Here it is examined whether these arguments are comparable, consistent and convincing from the point of view of philosophy of science.

  4. MULTIPATH VIRTUAL QUEUE MANAGEMENT SYSTEM FOR EFFECTIVE PACKET SCHEDULING IN MPLS NETWORKS

    Directory of Open Access Journals (Sweden)

    V. Ramachandran

    2012-09-01

    Full Text Available With the rapid development of communication and networking technologies VOIP has become an alternate to traditional telephony. These applications prefer timeliness in packet delivery. To perform load balancing, link utilization and to minimize the packet loss rate Multipath virtual Queue Management System for Effective Packet Scheduling in MPLS networks is proposed. The VoIP flows are dispersed into multiple available label switched paths to perform load balancing and link utilization. Virtual queues are maintained in all output ports to avoid queuing delay and HOL blocking. The proposed system ensures the arrival order of all the packets and plays back in the order of transmission. The performance of the proposed Virtual queuing system is compared with single path CSFQ queuing system with no virtual queue and Simulation results are proposed to show theefficiency of the proposed system.

  5. Statistical behavior of Langmuir wave packets observed inside the electron foreshock of Saturn

    Science.gov (United States)

    Pisa, David; Hospodarsky, George B.; Kurth, Willam S.; Gurnett, Donald A.; Santolik, Ondrej; Soucek, Jan

    2014-05-01

    We present a statistical study of Langmuir wave packets in the Saturnian foreshock using Cassini Wideband Receiver electric field waveforms. We analyzed all foreshock crossings from 2004 to 2012 using an automatic method for the identification of Langmuir wave signatures. Observed waveforms exhibit a shape similar to Langmuir solitons or monochromatic wave packets with a slowly varying envelope. This is in agreement with a variety of previous observations of Langmuir waves in the terrestrial foreshock and associated with Type III radio bursts. We determined the peak amplitude for all wave packets, and found the distributions of amplitude appeared to follow a power law with P(E) ≈ E-2. We confirm that the most intense electron plasma waves are observed near the foreshock boundary. We estimated the energy density ratio to be about one order below previously reported values at Saturn. Finally, we discuss the properties of the Langmuir wave packets at different locations in the foreshock.

  6. Signatures of wave packet revival phenomena in the expectation values of observables

    CERN Document Server

    Sudheesh, C; Balakrishnan, V

    2004-01-01

    Wave packet revivals and fractional revivals are striking quantum interference phenomena that can occur under suitable conditions in a system with a nonlinear spectrum. In the framework of a specific model (the propagation of an initially coherent wave packet in a Kerr-like medium), it is shown that distinctive signatures of these revivals and fractional revivals are displayed by the time evolution of the expectationWave packet revivals and fractional revivals are striking quantum interference phenomena that can occur under suitable conditions in a system with a nonlinear spectrum. In the framework of a specific model (the propagation of an initially coherent wave packet in a Kerr-like medium), it is shown that distinctive signatures of these revivals and fractional revivals are displayed by the time evolution of the expectation values of physical observables and their powers, i.e., by experimentally measurable quantities. Moreover, different fractional revivals can be selectively identified by examining appr...

  7. Sliding Mode Control for Discrete-Time Systems With Markovian Packet Dropouts.

    Science.gov (United States)

    Song, Heran; Chen, Shih-Chi; Yam, Yeung

    2016-07-09

    This paper presents the design of a sliding mode controller for networked control systems subject to successive Markovian packet dropouts. This paper adopts the Gilbert-Elliott channel model to describe the temporal correlation among packet losses, and proposes an update scheme to select the assumed available states for use in a sliding mode control law. A technique used in the theory of discrete-time Markov jump linear systems is applied to tackle the effect of the packet losses. This involves introducing a couple of Lyapunov functions dependent on the indicator functions of the instantaneous packet loss, and proving that the sliding mode controller is able to drive the system state trajectories into the neighborhood of the designed integral sliding surface in mean-square sense given that the corresponding Lyapunov inequalities are satisfied. The system is guaranteed thereafter to remain inside the neighborhood of the sliding surface. Simulated case studies are presented to illustrate the effectiveness of the control law.

  8. Stability and evolution of wave packets in strongly coupled degenerate plasmas

    CERN Document Server

    Misra, A P

    2011-01-01

    We study the nonlinear propagation of electrostatic wave packets in a collisional plasma composed of strongly coupled ions and relativistically degenerate electrons. The equilibrium of ions is maintained by an effective temperature associated with their strong coupling, whereas that of electrons is provided by the relativistic degeneracy pressure. Using a multiple scale technique, a (3+1)-dimensional coupled set of nonlinear Schr\\"{o}dinger-like equations with nonlocal nonlinearity is derived from a generalized viscoelastic hydrodynamic model. These coupled equations, which govern the dynamics of wave packets, are used to study the oblique modulational instability of a Stoke's wave train to a small plane wave perturbation. We show that the wave packets, though stable to the parallel modulation, becomes unstable against oblique modulations. In contrast to the long-wavelength carrier modes, the wave packets with short-wavelengths are shown to be stable in the weakly relativistic case, whereas they can be stable...

  9. Field trial of 160 Gb/s all-optical packet switching

    Science.gov (United States)

    Liu, Y.; Herrera, J.; Raz, O.; Tangdiongga, E.; Marti, J.; Ramos, F.; Maxwell, G.; Poustie, A.; Mulvad, H. C. H.; Hill, M. T.; de Waardt, H.; Khoe, G. D.; Koonen, A. M. J.; Dorren, H. J. S.

    2007-11-01

    We present the results of a transmission experiment, over 110 km of field installed fiber, for an all-optical 160 Gb/s packet switching system. The system uses in-band optical labels which are processed entirely in the optical domain using a narrow-band all-optical filter. The label decision information is stored by an optical flip-flop, which output controls a high-speed wavelength converter based on ultra-fast cross-phase modulation in a single semiconductor optical amplifier. The packet switched node is located in between two different fiber sections, each having a length of 54.3-km. The field installed fibers are located around the city of Eindhoven in the Netherlands. The results show how the all-optical switch can effectively route the packets based on the optical information and that such packets may be transmitted across the fiber with an acceptable penalty level.

  10. Nonlinear dynamics of Airy-Vortex 3D wave packets: Emission of vortex light waves

    CERN Document Server

    Driben, Rodislav

    2014-01-01

    The dynamics of 3D Airy-vortex wave packets is studied under the action of strong self-focusing Kerr nonlinearity. Emissions of nonlinear 3D waves out of the main wave packets with the topological charges were demonstrated. Due to the conservation of the total angular momentum, charges of the emitted waves are equal to those carried by the parental light structure. The rapid collapse imposes a severe limitation on the propagation of multidimensional waves in Kerr media. However, the structure of the Airy beam carrier allows the coupling of light from the leading, most intense peak into neighboring peaks and consequently strongly postpones the collapse. The dependence of the critical input amplitude for the appearance of a fast collapse on the beam width is studied for wave packets with zero and non-zero topological charges. Wave packets carrying angular momentum are found to be much more resistant to the rapid collapse, especially those having small width.

  11. Nonlinear dynamics of Airy-vortex 3D wave packets: emission of vortex light waves.

    Science.gov (United States)

    Driben, Rodislav; Meier, Torsten

    2014-10-01

    The dynamics of 3D Airy-vortex wave packets is studied under the action of strong self-focusing Kerr nonlinearity. Emissions of nonlinear 3D waves out of the main wave packets with the topological charges were demonstrated. Because of the conservation of the total angular momentum, charges of the emitted waves are equal to those carried by the parental light structure. The rapid collapse imposes a severe limitation on the propagation of multidimensional waves in Kerr media. However, the structure of the Airy beam carrier allows the coupling of light from the leading, most intense peak into neighboring peaks and consequently strongly postpones the collapse. The dependence of the critical input amplitude for the appearance of a fast collapse on the beam width is studied for wave packets with zero and nonzero topological charges. Wave packets carrying angular momentum are found to be much more resistant to the rapid collapse.

  12. Hybrid Wavelength Routed and Optical Packet Switched Ring Networks for the Metropolitan Area Network

    DEFF Research Database (Denmark)

    Nord, Martin

    2005-01-01

    Increased data traffic in the metropolitan area network calls for new network architectures. This paper evaluates optical ring architectures based on optical packet switching, wavelength routing, and hybrid combinations of the two concepts. The evaluation includes overall throughput and fairness...

  13. Performance Study on Priority Strategies for WDM Packet Switches under Long-Range Dependent Traffic

    Institute of Scientific and Technical Information of China (English)

    Chia-Wei; Yu; Chao-Chih; Chang; Shou-Kuo; Shao; Jingshown; Wu

    2003-01-01

    The impact of long-range dependent (LRD) traffic on the buffer management schemes for WDM packet switches is studied by simulation. The different priority strategies are compared. The principles of efficient strategy design are also presented.

  14. Features of energy distribution for blast vibration signals based on wavelet packet decomposition

    Institute of Scientific and Technical Information of China (English)

    LING Tong-hua; LI Xi-bing; DAI Ta-gen; PENG Zhen-bin

    2005-01-01

    Blast vibration analysis constitutes the foundation for studying the control of blasting vibration damage and provides the precondition of controlling blasting vibration. Based on the characteristics of short-time nonstationary random signal, the laws of energy distribution are investigated for blasting vibration signals in different blasting conditions by means of the wavelet packet analysis technique. The characteristics of wavelet transform and wavelet packet analysis are introduced. Then, blasting vibration signals of different blasting conditions are analysed by the wavelet packet analysis technique using MATLAB; energy distribution for different frequency bands is obtained. It is concluded that the energy distribution of blasting vibration signals varies with maximum decking charge,millisecond delay time and distances between explosion and the measuring point. The results show that the wavelet packet analysis method is an effective means for studying blasting seismic effect in its entirety, especially for constituting velocity-frequency criteria.

  15. DEVELOPING A COUNTERMEASURES TO USING COVERT CHANNELS IN PACKET-SWITCHED NETWORKS

    Directory of Open Access Journals (Sweden)

    Nazarov I. V.

    2014-05-01

    Full Text Available In the given article a model which allows defining general characteristics of covert channels in packet-switched networks as well as countermeasures to covert channels developed on the basis of the model in question are presented

  16. Implementation and field demonstration of PacketBLAST system for tactical communications

    Science.gov (United States)

    Pidwerbetsky, Alex; Beacken, Marc; Romain, Dennis; Girone, Michael

    2006-05-01

    Multiple Input Multiple Output (MIMO) wireless communications vastly expand the capacity and connectivity of communications for forces operating in challenging environments such as urban or forested terrain. A MIMO architecture called BLAST (Bell Laboratories Layered Space-Time) has been formulated to realize these capacities. We have developed a packet version of BLAST, called PacketBLAST, specifically to support high mobility, ad-hoc, tactical communications on the move in challenging environments. PacketBLAST offers a number of benefits to tactical communications. We have implemented a first-ever, end-to-end mobile, ad-hoc network (MANET) of PacketBLAST nodes and have successfully tested it in a number of field demonstrations.

  17. Annular wave packets at Dirac points and probability oscillation in graphene

    CERN Document Server

    Luo, Ji; Valencia, Daniel

    2011-01-01

    Wave packets in graphene whose central wave vector is at Dirac points are investigated by numerical calculations. Starting from an initial Gaussian function, these wave packets form into annular peaks that propagate to all directions like ripple-rings on water surface. At the beginning, electronic probability alternates between the central peak and the ripple-rings and transient oscillation occurs at the center. As time increases, the ripple-rings propagate at the fixed Fermi speed, and their widths remain unchanged. The axial symmetry of the energy dispersion leads to the circular symmetry of the wave packets. The fixed speed and widths, however, are attributed to the linearity of the energy dispersion. Interference between states that respectively belong to two branches of the energy dispersion leads to multiple ripple-rings and the probability-density oscillation. In a magnetic field, annular wave packets become confined and no longer propagate to infinity. If the initial Gaussian width differs greatly fro...

  18. A scheme for synchronizing clocks connected by a packet communication network

    Science.gov (United States)

    dos Santos, R. V.; Monteiro, L. H. A.

    2012-07-01

    Consider a communication system in which a transmitter equipment sends fixed-size packets of data at a uniform rate to a receiver equipment. Consider also that these equipments are connected by a packet-switched network, which introduces a random delay to each packet. Here we propose an adaptive clock recovery scheme able of synchronizing the frequencies and the phases of these devices, within specified limits of precision. This scheme for achieving frequency and phase synchronization is based on measurements of the packet arrival times at the receiver, which are used to control the dynamics of a digital phase-locked loop. The scheme performance is evaluated via numerical simulations performed by using realistic parameter values.

  19. Damage Detection Methods for Offshore Platforms Based on Wavelet Packet Transform

    Institute of Scientific and Technical Information of China (English)

    LI Dong-sheng; ZHANG Zhao-de; WANG De-yu

    2005-01-01

    The wavelet packet transform is used for the damage detection of offshore platforms. When some damage occurs, the dynamic response parameters of the structure will shift subtly. However, in some cases, the dynamic parameters, such as dynamic response, are not sensitive, and it is very difficult to predict the existence of damage. The present paper aims to describe how to find small damage by the use of wavelet packet transform. As the wavelet packet transform can be used to quickly find the singularity of the response signal on different scales, the acceleration signal of a damaged offshore platform in the time domain is transformed through the wavelet packet. Experimental results show that the Daubechies 4 wavelet transform can be used to detect damage.

  20. WBWTP+: A Packet Scheduling Algorithm for Achieving Proportional Delay Differentiation in IP Networks

    Directory of Open Access Journals (Sweden)

    MELO JR., A.

    2013-06-01

    Full Text Available The Proportional Differentiation Model (PDM is currently one of the main service proposals for the Next Generation Internet. This paper presents a new packet scheduling algorithm for implementing the PDM model using measurement windows and a mechanism of dynamic adjustment of packet delay estimation. Window Based Waiting-Time Priority Plus (WBWTP+, the proposed algorithm, is an evolution of the WBWTP algorithm that adjusts dynamically the relative weights of transmitted and waiting for transmission packets according to the current state of the system. The WBWTP+ delay estimator makes possible to accelerate or to delay the transmission of backlogged packets. Simulations performed to asses the performance of the WBWTP+ show that it presents significant improvement in the attendance of the PDM objective in relation to WBWTP in most scenarios, excepted when the link utilization rate is 100%. Even in that case the performance of WBWTP+ was better than that of WTP and PAD algorithms.

  1. Discrete Packet Analysis for Improved Atmospheric Rejection on Modulated Laser Signals

    Energy Technology Data Exchange (ETDEWEB)

    O& #x27; Neill, M., McKenna, I., DiBenedetto, J., Capelle, G., Trainham, R.

    2012-07-19

    This slide-show discusses how the method of discrete packet analysis improves atmospheric compensation for quasi-CW fluorescence detection methods. This is key to improving remote sensing capabilities.

  2. On the classical limit of Bohmian mechanics for Hagedorn wave packets

    CERN Document Server

    Dürr, Detlef

    2010-01-01

    We consider the classical limit of quantum mechanics in terms of Bohmian trajectories. For wave packets as defined by Hagedorn we show that the Bohmian trajectories converge to Newtonian trajectories in probability.

  3. Goos-Haenchen and Imbert-Fedorov shifts for bounded wave packets of light

    CERN Document Server

    Ornigotti, Marco

    2012-01-01

    We present precise expressions of the spatial and angular Goos-Haenchen and Imbert-Fedorov shifts experienced by a longitudinally and transversally limited beam of light (wave packet) upon reflection from a dielectric interface, as opposed to the well-known case of a monochromatic beam which is bounded in transverse directions but infinitely extended along the direction of propagation. This is done under the assumption that the detector time is longer than the temporal length of the wave packet (wave packet regime). Our results will be applied to the case of a Gaussian wave packet and show that, at the leading order in the Taylor expansion of reflected-field amplitudes, the results are the same of the monochromatic case.

  4. Application Delay Modelling for Variable Length Packets in Single Cell IEEE 802.11 WLANs

    CERN Document Server

    Sunny, Albert; Aggarwal, Saurabh

    2010-01-01

    In this paper, we consider the problem of modelling the average delay experienced by an application packets of variable length in a single cell IEEE 802.11 DCF wireless local area network. The packet arrival process at each node i is assumed to be a stationary and independent increment random process with mean ai and second moment a(2) i . The packet lengths at node i are assumed to be i.i.d random variables Pi with finite mean and second moment. A closed form expression has been derived for the same. We assume the input arrival process across queues to be uncorrelated Poison processes. As the nodes share a single channel, they have to contend with one another for a successful transmission. The mean delay for a packet has been approximated by modelling the system as a 1-limited Random Polling system with zero switchover times. Extensive simulations are conducted to verify the analytical results.

  5. Undecimated Lifting Wavelet Packet Transform with Boundary Treatment for Machinery Incipient Fault Diagnosis

    Directory of Open Access Journals (Sweden)

    Lixiang Duan

    2016-01-01

    Full Text Available Effective signal processing in fault detection and diagnosis (FDD is an important measure to prevent failure and accidents of machinery. To address the end distortion and frequency aliasing issues in conventional lifting wavelet transform, a Volterra series assisted undecimated lifting wavelet packet transform (ULWPT is investigated for machinery incipient fault diagnosis. Undecimated lifting wavelet packet transform is firstly formulated to eliminate the frequency aliasing issue in traditional lifting wavelet packet transform. Next, Volterra series, as a boundary treatment method, is used to preprocess the signal to suppress the end distortion in undecimated lifting wavelet packet transform. Finally, the decomposed wavelet coefficients are trimmed to the original length as the signal of interest for machinery incipient fault detection. Experimental study on a reciprocating compressor is performed to demonstrate the effectiveness of the presented method. The results show that the presented method outperforms the conventional approach by dramatically enhancing the weak defect feature extraction for reciprocating compressor valve fault diagnosis.

  6. Capturing of HTTP Protocol Packets in a Wireless Network

    Directory of Open Access Journals (Sweden)

    Chetan Soni

    2013-05-01

    Full Text Available The word wide revolution in wireless technology is changing our lives in term of the way we learn and use. Wireless Networks fit into this because the technology has been around long enough and can provide various benefits for development in this area.The main objective of this paper is to create a fake access point in a wireless network and transfer the fake ARP (Address Resolution Protocol Packets on the same Wi-Fi Network in which users are connected and the name of fake access point also known as ESSID (Extended Service Set Identification is same as the name of the wireless network. So when a fake access point is created with same wireless network name then the user gets disconnected to original network and connects with the fake access point, so all the traffic goes through out your network and you can hijack the details, important information, and secret credentials of that user which is connected to your fake access point network

  7. Coriolis-coupled wave packet dynamics of H + HLi reaction.

    Science.gov (United States)

    Padmanaban, R; Mahapatra, S

    2006-05-11

    We investigated the effect of Coriolis coupling (CC) on the initial state-selected dynamics of H+HLi reaction by a time-dependent wave packet (WP) approach. Exact quantum scattering calculations were obtained by a WP propagation method based on the Chebyshev polynomial scheme and ab initio potential energy surface of the reacting system. Partial wave contributions up to the total angular momentum J=30 were found to be necessary for the scattering of HLi in its vibrational and rotational ground state up to a collision energy approximately 0.75 eV. For each J value, the projection quantum number K was varied from 0 to min (J, K(max)), with K(max)=8 until J=20 and K(max)=4 for further higher J values. This is because further higher values of K do not have much effect on the dynamics and also because one wishes to maintain the large computational overhead for each calculation within the affordable limit. The initial state-selected integral reaction cross sections and thermal rate constants were calculated by summing up the contributions from all partial waves. These were compared with our previous results on the title system, obtained within the centrifugal sudden and J-shifting approximations, to demonstrate the impact of CC on the dynamics of this system.

  8. Pulse-induced focusing of Rydberg wave packets

    Science.gov (United States)

    Arbó, D. G.; Reinhold, C. O.; Burgdörfer, J.; Pattanayak, A. K.; Stokely, C. L.; Zhao, W.; Lancaster, J. C.; Dunning, F. B.

    2003-06-01

    We demonstrate that strong transient phase-space localization can be achieved by the application of a single impulsive “kick” in the form of a short (600 ps) unidirectional electric-field pulse to a strongly polarized, quasi-one-dimensional Rydberg atom. The underlying classical dynamics is analyzed and it is shown that phase-space localization results from a focusing effect analogous to rainbow scattering. Moreover, it is shown that the essential features of the classical analysis remain valid in a quantum-mechanical treatment of the system in terms of its phase-space Husimi distribution. The degree of phase-space localization is characterized by the coarse-grained Renyi entropy. Transient phase-space localization is demonstrated experimentally using extreme redshifted m=0 potassium Stark states in the n=351 manifold and a short probe pulse. The experimental data are in good agreement with theoretical predictions. The localized state provides an excellent starting point for further control and manipulation of the electron wave packet.

  9. An integrated self-healing algorithm for resilient packet ring

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Resilient Packet Ring (RPR) is a Media Access Control (MAC) layer protocol that operates over a double counter-rotating ring network topology. RPR is designed to enhance Synchronous Digital Hierarchy(SDH) in order to handle data traffic more efficiently. Since Intelligent Protection Switching(IPS) is one of the key technologies in ring networks, RPR provides two intelligent protection algorithms: steering and wrapping. While wrapping in RPR in essence inherits the automatic protection switching(APS) algorithm of SDH, it also wastes the bandwidth on the wrapping ringlets and may result in severe congestion. Whereas steering in RPR provides high bandwidth utilization, its switching speed is low, because it is indeed a high layer's restoration algorithm. In this paper, integrated self-healing(ISH) algorithm as an effective algorithm for RPR is proposed, which synthesizes the merits of the two algorithms by transporting healing signal and computing routing in MAC layer. At last, the performance of ISH algorithm is analyzed and simulated.

  10. Improving Packet Processing Performance in the ATLAS FELIX Project

    CERN Document Server

    Schumacher, Jorn; The ATLAS collaboration; Borga, Andrea; Boterenbrood, Hendrik; Chen, Hucheng; Chen, Kai; Drake, Gary; Francis, David; Gorini, Benedetto; Lanni, Francesco; Lehmann Miotto, Giovanna; Levinson, Lorne; Narevicius, Julia; Roich, Alexander; Ryu, Soo; Schreuder, Frans Philip; Vandelli, Wainer; Zhang, Jinlong; Vermeulen, Jos

    2015-01-01

    Experiments in high-energy physics (HEP) and related fields often impose constraints and challenges on data acquisition systems. As a result, these systems are implemented as unique mixtures of custom and commercial-off-the-shelf electronics (COTS), involving and connecting radiation-hard devices, large high-performance networks, and computing farms. FELIX, the Frontend Link Exchange, is a new PC-based general purpose data routing device for the data-acquisition system of the ATLAS experiment at CERN. Performance is a very crucial point for devices like FELIX, which have to be capable of processing tens of gigabyte of data per second. Thus it is important to understand the performance limitations for typical workloads on modern hardware. We present an analysis of a packet processing algorithm that is used in FELIX, and show how the PC system's memory architecture plays a key factor in the overall data throughput achieved by the application. Finally, we present optimizations that increase the processing throug...

  11. Wavelet Packet Transform Based Driver Distraction Level Classification Using EEG

    Directory of Open Access Journals (Sweden)

    Mousa Kadhim Wali

    2013-01-01

    Full Text Available We classify the driver distraction level (neutral, low, medium, and high based on different wavelets and classifiers using wireless electroencephalogram (EEG signals. 50 subjects were used for data collection using 14 electrodes. We considered for this research 4 distraction stimuli such as Global Position Systems (GPS, music player, short message service (SMS, and mental tasks. Deriving the amplitude spectrum of three different frequency bands theta, alpha, and beta of EEG signals was based on fusion of discrete wavelet packet transform (DWPT and FFT. Comparing the results of three different classifiers (subtractive fuzzy clustering probabilistic neural network, -nearest neighbor was based on spectral centroid, and power spectral features extracted by different wavelets (db4, db8, sym8, and coif5. The results of this study indicate that the best average accuracy achieved by subtractive fuzzy inference system classifier is 79.21% based on power spectral density feature extracted by sym8 wavelet which gave a good class discrimination under ANOVA test.

  12. Improving Packet Processing Performance of a Memory-Bounded Application

    CERN Document Server

    Schumacher, Jorn; The ATLAS collaboration; Borga, Andrea; Boterenbrood, Hendrik; Chen, Hucheng; Chen, Kai; Drake, Gary; Francis, David; Gorini, Benedetto; Lanni, Francesco; Lehmann Miotto, Giovanna; Levinson, Lorne; Narevicius, Julia; Roich, Alexander; Ryu, Soo; Schreuder, Frans Philip; Vandelli, Wainer; Zhang, Jinlong; Vermeulen, Jos

    2015-01-01

    Experiments in high-energy physics (HEP) and related fields often impose constraints and challenges on data acquisition systems. As a result, these systems are implemented as unique mixtures of custom and commercial-off-the-shelf electronics (COTS), involving and connecting radiation-hard devices, large high-performance networks, and computing farms. FELIX, the Frontend Link Exchange, is a new PC-based general purpose data routing device for the data-acquisition system of the ATLAS experiment at CERN. Performance is a very crucial point for devices like FELIX, which have to be capable of processing tens of gigabyte of data per second. Thus it is important to understand the performance limitations for typical workloads on modern hardware. We present an analysis of a packet processing algorithm that is used in FELIX, and show how the PC system's memory architecture plays a key factor in the overall data throughput achieved by the application. Finally, we present optimizations that increase the processing throug...

  13. Specific Applications of Cisco Packet Tracer in Network Teaching%Cisco Packet Tracer在网络教学中的特殊应用

    Institute of Scientific and Technical Information of China (English)

    吴刚

    2011-01-01

    Cisco Packet Tracer不仅可以提供Cisco认证考试的练习环境,在计算机网络教学中也有一些特殊的应用.Cisco Packet Tracer模拟模式可用于仿真PDU转发流程;物理工作区可用于展示现实环境;活动向导可用于技能考评.这些应用可以解决教学中的疑难问题.

  14. New hybrid frequency reuse method for packet loss minimization in LTE network.

    Science.gov (United States)

    Ali, Nora A; El-Dakroury, Mohamed A; El-Soudani, Magdi; ElSayed, Hany M; Daoud, Ramez M; Amer, Hassanein H

    2015-11-01

    This paper investigates the problem of inter-cell interference (ICI) in Long Term Evolution (LTE) mobile systems, which is one of the main problems that causes loss of packets between the base station and the mobile station. Recently, different frequency reuse methods, such as soft and fractional frequency reuse, have been introduced in order to mitigate this type of interference. In this paper, minimizing the packet loss between the base station and the mobile station is the main concern. Soft Frequency Reuse (SFR), which is the most popular frequency reuse method, is examined and the amount of packet loss is measured. In order to reduce packet loss, a new hybrid frequency reuse method is implemented. In this method, each cell occupies the same bandwidth of the SFR, but the total system bandwidth is greater than in SFR. This will provide the new method with a lot of new sub-carriers from the neighboring cells to reduce the ICI which represents a big problem in many applications and causes a lot of packets loss. It is found that the new hybrid frequency reuse method has noticeable improvement in the amount of packet loss compared to SFR method in the different frequency bands. Traffic congestion management in Intelligent Transportation system (ITS) is one of the important applications that is affected by the packet loss due to the large amount of traffic that is exchanged between the base station and the mobile node. Therefore, it is used as a studied application for the proposed frequency reuse method and the improvement in the amount of packet loss reached 49.4% in some frequency bands using the new hybrid frequency reuse method.

  15. Nonlinear dynamics of wave packets in PT-symmetric optical lattices near the phase transition point

    CERN Document Server

    Nixon, Sean; Yang, Jianke

    2012-01-01

    Nonlinear dynamics of wave packets in PT-symmetric optical lattices near the phase-transition point are analytically studied. A nonlinear Klein-Gordon equation is derived for the envelope of these wave packets. A variety of novel phenomena known to exist in this envelope equation are shown to also exist in the full equation including wave blowup, periodic bound states and solitary wave solutions.

  16. Image encryption algorithm based on wavelet packet decomposition and discrete linear canonical transform

    Science.gov (United States)

    Sharma, K. K.; Jain, Heena

    2013-01-01

    The security of digital data including images has attracted more attention recently, and many different image encryption methods have been proposed in the literature for this purpose. In this paper, a new image encryption method using wavelet packet decomposition and discrete linear canonical transform is proposed. The use of wavelet packet decomposition and DLCT increases the key size significantly making the encryption more robust. Simulation results of the proposed technique are also presented.

  17. Combined Power Quality Disturbances Recognition Using Wavelet Packet Entropies and S-Transform

    OpenAIRE

    Zhigang Liu; Yan Cui; Wenhui Li

    2015-01-01

    Aiming at the combined power quality +disturbance recognition, an automated recognition method based on wavelet packet entropy (WPE) and modified incomplete S-transform (MIST) is proposed in this paper. By combining wavelet packet Tsallis singular entropy, energy entropy and MIST, a 13-dimension vector of different power quality (PQ) disturbances including single disturbances and combined disturbances is extracted. Then, a ruled decision tree is designed to recognize the combined disturbance...

  18. 40 Gbit/s NRZ Packet-Length Insensitive Header Extraction for Optical Label Switching Networks

    DEFF Research Database (Denmark)

    Seoane, Jorge; Kehayas, E; Avramopoulos, H.

    2006-01-01

    A simple method for 40 Gbit/s NRZ header extraction based on envelope detection for optical label switching networks is presented. The scheme is insensitive to packet length and spacing and can be single-chip integrated cost-effectively......A simple method for 40 Gbit/s NRZ header extraction based on envelope detection for optical label switching networks is presented. The scheme is insensitive to packet length and spacing and can be single-chip integrated cost-effectively...

  19. Novel Optical Labeling Scheme for Ultra-High Bit Rate Data Packets

    DEFF Research Database (Denmark)

    Medhin, Ashenafi Kiros; Galili, Michael; Oxenløwe, Leif Katsuo

    2013-01-01

    We propose and verify by simulations an optical in-band labeling scheme for ultra-fast optical switching. The scheme is able to label more than 60 different 640-Gbit/s OTDM packets with eye opening penalty <1 dB.......We propose and verify by simulations an optical in-band labeling scheme for ultra-fast optical switching. The scheme is able to label more than 60 different 640-Gbit/s OTDM packets with eye opening penalty

  20. 基于Packet Tracer模拟软件配置路由器ACL

    Institute of Scientific and Technical Information of China (English)

    李晋超

    2011-01-01

    文章简要地介绍了访问控制列表(Access Control Lists)的概念和技术以及Packet Tracer模拟软件的技术特性,较为详细地介绍了如何利用Packet Tracer模拟软件实现路由器标准IP ACL和扩展IP ACL配置,并验证配置结果.

  1. A Generalization of the Mean Size Formula of Wavelet Packets in Lp

    Institute of Scientific and Technical Information of China (English)

    Song LI; Guo Mao WANG; Zhi Song LIU

    2005-01-01

    The purpose of this paper is to investigate the mean size formula of wavelet packets in Lp for 0 < p ≤∞. We generalize a mean size formula of wavelet packets given in terms of the p-norm joint spectral radius and we also give some asymptotic formulas for the Lp-norm or quasi-norm on the subdivision trees. All results will be given in the general setting.

  2. Application of wavelet packet decomposition and its energy spectrum on the coal-rock interface identification

    Institute of Scientific and Technical Information of China (English)

    任芳; 杨兆建; 熊诗波; 梁义维

    2003-01-01

    The theory and method of wavelet packet decomposition and its energy spectrum dealing with the coal-rock Interface Identification are presented in the paper. The characteristic frequency band of the coal-rock signal could be identified by wavelet packet decomposition and its energy spectrum conveniently, at the same time, quantification analysis were performed. The result demonstrates that this method is more advantageous and of practical value than traditional Fourier analysis method.

  3. An Experimental Exploration of the Impact of Network-Level Packet Loss on Network Intrusion Detection

    Science.gov (United States)

    2015-08-01

    be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number PLEASE...4 Fig. 3 Instrumented portion of the 2009 Inter-Service Academy Cyber Defense Exercise network...packet loss is very common on the Internet. The Transmission Control Protocol (TCP) is specifically designed to account for general packet loss and uses

  4. DENOISING AND HARMONIC DETECTION USING NONORTHOGONAL WAVELET PACKETS IN INDUSTRIAL APPLICATIONS

    Institute of Scientific and Technical Information of China (English)

    P. MERCORELLI

    2007-01-01

    New industrial applications call for new methods and new ideas in signal analysis. Wavelet packets are new tools in industrial applications and they have just recently appeared in projects and patents. In training neural networks, for the sake of dimensionality and of ratio of time, compact information is needed. This paper deals with simultaneous noise suppression and signal compression of quasi-harmonic signals. A quasi-harmonic signal is a signal with one dominant harmonic and some more sub harmonics in superposition. Such signals often occur in rail vehicle systems, in vhich noisy signals are present. Typically, they are signals which come from rail overhead power lines and are generated by intermodulation phenomena and radio interferences. An important task is to monitor and recognize them. This paper proposes an algorithm to differentiate discrete signals from their noisy observations using a library of nonorthonormal bases. The algorithm combines the shrinkagetechnique and techniques in regression analysis using Shannon Entropy function and Cross Entropy function to select the best discernable bases. Cosine and sine wavelet bases in wavelet packets are used.The algorithm is totally general and can be used in many industrial applications. The effectiveness of the proposed method consists of using as few as possible samples of the measured signal and in the meantime highlighting the difference between the noise and the desired signal. The problem is a difficult one, but well posed. In fact, compression reduces the level of the measured noise and undesired signals but introduces the well known compression noise. The goal is to extract a coherent signal from the measured signal which will be "well represented" by suitable waveforms and a noisy signal or incoherent signal which cannot be "compressed well" by the waveforms. Recursive residual iterations with cosine and sine bases allow the extraction of elements of the required signal and the noise. The algorithm

  5. Automatic sleep stage classification based on EEG signals by using neural networks and wavelet packet coefficients.

    Science.gov (United States)

    Ebrahimi, Farideh; Mikaeili, Mohammad; Estrada, Edson; Nazeran, Homer

    2008-01-01

    Currently in the world there is an alarming number of people who suffer from sleep disorders. A number of biomedical signals, such as EEG, EMG, ECG and EOG are used in sleep labs among others for diagnosis and treatment of sleep related disorders. The usual method for sleep stage classification is visual inspection by a sleep specialist. This is a very time consuming and laborious exercise. Automatic sleep stage classification can facilitate this process. The definition of sleep stages and the sleep literature show that EEG signals are similar in Stage 1 of non-rapid eye movement (NREM) sleep and rapid eye movement (REM) sleep. Therefore, in this work an attempt was made to classify four sleep stages consisting of Awake, Stage 1 + REM, Stage 2 and Slow Wave Stage based on the EEG signal alone. Wavelet packet coefficients and artificial neural networks were deployed for this purpose. Seven all night recordings from Physionet database were used in the study. The results demonstrated that these four sleep stages could be automatically discriminated from each other with a specificity of 94.4 +/- 4.5%, a of sensitivity 84.2+3.9% and an accuracy of 93.0 +/- 4.0%.

  6. A Novel Queuing Method for DiffServ Traffic over Resilient Packet Ring Networks

    Directory of Open Access Journals (Sweden)

    Hadi Khosravi

    2008-09-01

    Full Text Available Resilient Packet Ring (RPR is a new kind of metropolitan area network which technically provides complete flexibility in defining service classes that can be sold to the end user. On the other side, the IETF Diffserv group has created specific definitions for class based services over IP networks. Hereby, we are going to propose a more effective queuing for RPR which considers the mapping between DiffServ and RPR QOS provisioning mechanisms. This novel method is used to support the requested quality for IP over RPR delivery. Only the standard PHBs have been considered for such a mapping consisting EF (expedited forwarding, AF (assured forwarding, and default PHB. The EF class is preferred to be transmitted via class A, while AF class is more distinctive. AF includes four different flows each including up to three drop precedence. To improve the quality for AF flows, we have proposed a multi-level queuing method considering different levels of drop precedence. The default PHB is also preferred to be mapped as class C traffic. Our proposed method has been investigated using some simulations over NS2. The simulation results have shown superior performance in terms of loss and delay parameters.

  7. Kelvin wave packets and flow acceleration - A comparison of modeling and observations

    Science.gov (United States)

    Coy, L.; Hitchman, M.

    1984-01-01

    Atmospheric Kelvin waves, as revealed by temperatures obtained from the recent Limb Infrared Monitor of the Stratosphere (LIMS) experiment, commonly occur in packets. A simple two-dimensional gravity-wave model is used to study the upward propagation of these packets through different zonal mean wind profiles derived from the LIMS data. The observed prevalence of high frequency waves in the lower mesosphere and low frequency waves in the lower stratosphere can be exlained by dispersion of energy associated with the range of frequencies comprising a packet. Dominant wave frequencies at upper and lower levels are more distinctly separated if the packet propagates through a layer of westerly winds. Due to dispersion and shear effects, a packet of short temporal length at low levels will have a considerably extended impact on a layer of westerly winds at higher levels. Observed and modeled westerly accelerations resulting from packet absorption occur in the same layer, and are similar in magnitude and duration. These results support the theory that Kelvin waves are responsible for the westerly phase of the semiannual oscillation.

  8. Trajectory description of the quantum–classical transition for wave packet interference

    Energy Technology Data Exchange (ETDEWEB)

    Chou, Chia-Chun, E-mail: ccchou@mx.nthu.edu.tw

    2016-08-15

    The quantum–classical transition for wave packet interference is investigated using a hydrodynamic description. A nonlinear quantum–classical transition equation is obtained by introducing a degree of quantumness ranging from zero to one into the classical time-dependent Schrödinger equation. This equation provides a continuous description for the transition process of physical systems from purely quantum to purely classical regimes. In this study, the transition trajectory formalism is developed to provide a hydrodynamic description for the quantum–classical transition. The flow momentum of transition trajectories is defined by the gradient of the action function in the transition wave function and these trajectories follow the main features of the evolving probability density. Then, the transition trajectory formalism is employed to analyze the quantum–classical transition of wave packet interference. For the collision-like wave packet interference where the propagation velocity is faster than the spreading speed of the wave packet, the interference process remains collision-like for all the degree of quantumness. However, the interference features demonstrated by transition trajectories gradually disappear when the degree of quantumness approaches zero. For the diffraction-like wave packet interference, the interference process changes continuously from a diffraction-like to collision-like case when the degree of quantumness gradually decreases. This study provides an insightful trajectory interpretation for the quantum–classical transition of wave packet interference.

  9. Hierarchical trie packet classification algorithm based on expectation-maximization clustering

    Science.gov (United States)

    Bi, Xia-an; Zhao, Junxia

    2017-01-01

    With the development of computer network bandwidth, packet classification algorithms which are able to deal with large-scale rule sets are in urgent need. Among the existing algorithms, researches on packet classification algorithms based on hierarchical trie have become an important packet classification research branch because of their widely practical use. Although hierarchical trie is beneficial to save large storage space, it has several shortcomings such as the existence of backtracking and empty nodes. This paper proposes a new packet classification algorithm, Hierarchical Trie Algorithm Based on Expectation-Maximization Clustering (HTEMC). Firstly, this paper uses the formalization method to deal with the packet classification problem by means of mapping the rules and data packets into a two-dimensional space. Secondly, this paper uses expectation-maximization algorithm to cluster the rules based on their aggregate characteristics, and thereby diversified clusters are formed. Thirdly, this paper proposes a hierarchical trie based on the results of expectation-maximization clustering. Finally, this paper respectively conducts simulation experiments and real-environment experiments to compare the performances of our algorithm with other typical algorithms, and analyzes the results of the experiments. The hierarchical trie structure in our algorithm not only adopts trie path compression to eliminate backtracking, but also solves the problem of low efficiency of trie updates, which greatly improves the performance of the algorithm. PMID:28704476

  10. Optical resilient packet ring (O-RPR) based on all-optical buffering techniques

    Science.gov (United States)

    Wu, Chongqing; Sheng, Xingzhi; Fu, Songnian; Wei, Bin; Li, Yajie; Liu, Aiming

    2006-01-01

    This paper reports the progress of the 863 high-technology project of China "Optical Resilient Packet Ring (O-RPR) Based on All-optical Buffering Techniques". In this ring network, for the packet through an intermediate node the conversion of O/E/O is not needed in order to overcome the bottleneck of O/E/O. In all-optical node a Dual Loop Optical Buffer (DLOB) is used to revolve the collision between the packet, which pass through the node, and add packet from local user to ring. The principle of DLOB is introduced. The bit-rate of head of optical frame is lower than the bit-rate of payload in a packet, in order to increase the efficiency of transmission link. This paper will introduce the network topology, layers and the structure of optical node. It includes an optical splitter, optical delay line as input buffer, a SOA as optical switch, which switch the packet dropping down form the ring or pass through the node, a DLOB and an electric buffer. An ARM is used for regulation of different buffers. The experiment results of a demonstrate network including 3 nodes are given.

  11. Three Packets of Minerals of the Periodic Table of Chemical Elements and Chemical Compounds

    CERN Document Server

    Labushev, Mikhail M

    2013-01-01

    The concepts of alpha- and beta-packets of the periodic table of chemical elements and chemical compounds are defined. The first of the 47 minerals alpha-packets is composed. In it all minerals are arranged in increasing Iav index of proportionality of atomic weights of composing chemical elements, the same way as chemical elements are located in increasing atomic weights in the Periodic table. The packet includes 93 known minerals and two compounds - N2O5 and CO2 - being actually minerals. Beta-packet of oxides and hydroxides minerals includes 88 known minerals and five chemical compounds - N2O5, CO2, CO, SO3 and SO2. Two minerals of the packet have not been determined yet. Besides, beta-packet of minerals with sulfur, selenium or arsenic is composed, with one mineral not defined yet. The results of the calculations can be used for further development of the Periodic Table of Chemical Elements and Chemical Compounds and their properties investigation.

  12. Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression

    Directory of Open Access Journals (Sweden)

    Divya Selvaraj

    2014-01-01

    Full Text Available Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. During network transfer, incoming and outgoing packets are monitored in depth to inspect the packet payload. In this paper, the regular expressions that are basically string patterns are analyzed for packet payloads in detecting worms. Then the grouping scheme for regular expression matching is rewritten using Deterministic Finite Automaton (DFA. DFA achieves better processing speed during regular expression matching. DFA requires more memory space for each state. In order to reduce memory utilization, decompression technique is used. Delayed Dictionary Compression (DDC is applied for achieving better speeds in the communication links. DDC achieves decoding latency during compression of payload packets in the network. Experimental results show that the proposed approach provides better time consumption and memory utilization during detection of Internet worm attacks.

  13. Fuzzy-Based Dynamic Distributed Queue Scheduling for Packet Switched Networks

    Institute of Scientific and Technical Information of China (English)

    Chollette C.Chude-Olisah; Uche A.K.Chude-Okonkwo; Kamalrulnizam A.Balar; Ghazali Sulong

    2013-01-01

    Addressing the problem of queue scheduling for the packet-switched system is a vital aspect of congestion control.In this paper,the fuzzy logic based decision method is adopted for queue scheduling in order to enforce some level of control for traffic of different quality of service requirements using predetermined values.The fuzzy scheduler proposed in this paper takes into account the dynamic nature of the Internet traffic with respect to its time-varying packet arrival process that affects the network states and performance.Three queues are defined,viz low,medium and high priority queues.The choice of prioritizing packets influences how queues are served.The fuzzy scheduler not only utilizes queue priority in the queue scheduling scheme,but also considers packet drop susceptibility and queue limit.Through simulation it is shown that the fuzzy scheduler is more appropriate for the dynamic nature of Internet traffic in a packet-switched system as compared with some existing queue scheduling methods.Results show that the scheduling strategy of the proposed fuzzy scheduler reduces packet drop,provides good link utilization and minimizes queue delay as compared with the priority queuing (PQ),first-in-first-out (FIFO),and weighted fair queuing (WFQ).

  14. Einstein-de Broglie relations for wave packet: the acoustic world

    CERN Document Server

    Simaciu, Ion; Dumitrescu, Gheorghe; Georgeta, Nan

    2015-01-01

    In this paper we study the relations of Einstein-de Broglie type for the wave packets. We assume that the wave packet is a possible model of particle . When studying the behaviour of the wave packet for standing waves, in relation to an accelerated observer (i.e. Rindler observer), there can be demonstrated that the equivalent mass of the packet is the inertial mass. In our scenario, the waves and of the wave packets are depicted by the strain induced/produced in the medium. The properties of the waves, of the wave packet and, generally, of the perturbations in a material medium suggest the existence of an acoustic world. The acoustic world has mechanical and thermodynamical properties. The perturbations that are generated and propagated in the medium are correlated by means of acoustic waves with maximum speed. The observers of this world of disturbances (namely the acoustic world) have senses that are based on the perception of mechanical waves (disturbance of any kind) and apparatus for detecting and acqui...

  15. Flexible-rate optical packet generation/detection and label swapping for optical label switching networks

    Science.gov (United States)

    Wu, Zhongying; Li, Juhao; Tian, Yu; Ge, Dawei; Zhu, Paikun; Chen, Yuanxiang; Chen, Zhangyuan; He, Yongqi

    2017-03-01

    In recent years, optical label switching (OLS) gains lots of attentions due to its intrinsic advantages to implement protocol, bit-rate, granularity and data format transparency packet switching. In this paper, we propose a novel scheme to realize flexible-rate optical packet switching for OLS networks. At the transmitter node, flexible-rate packet is generated by parallel modulating different combinations of optical carriers generated from the optical multi-carrier generator (OMCG), among which the low-speed optical label occupies one carrier. At the switching node, label is extracted and re-generated in label processing unit (LPU). The payloads are switched based on routing information and new label is added after switching. At the receiver node, another OMCG serves as local oscillators (LOs) for optical payloads coherent detection. The proposed scheme offers good flexibility for dynamic optical packet switching by adjusting the payload bandwidth and could also effectively reduce the number of lasers, modulators and receivers for packet generation/detection. We present proof-of-concept demonstrations of flexible-rate packet generation/detection and label swapping in 12.5 GHz grid. The influence of crosstalk for cascaded label swapping is also investigated.

  16. Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

    Directory of Open Access Journals (Sweden)

    Zeinab Latifi

    2013-08-01

    Full Text Available Capturing is the first step in intrusion detection system (IDS. Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements are not met, packet capture system is considered as the main bottleneck of IDS and the overall efficiency of this system will be influenced. Presence of all these three characteristics calls for utilization of hardware methods. In this paper, by using of FPGA, a line sniffing and load balancing system are designed in order to be applied in IDS systems. The main contribution of our work is the feasibility of attaching labels to the beginning part of each packet, aiming at quick easy access of other IDS modules to information of each packet and also reducing workload of these modules. Packet classification in the proposed system can be configured to 2, 3, and 5 tuple, which can also be applied in IDS detection module in addition to load balancing part of this system. Load balancing module uses Hash table and its Hash function has the least flows collisions. This system is implemented on a set of virtex 6 and 7 families and is able to capture packets 100% and perform the above mentioned processes by speed of 12 Gbit/s.

  17. Phase and group velocity tracing analysis of projected wave packet motion along oblique radar beams – qualitative analysis of QP echoes

    Directory of Open Access Journals (Sweden)

    C. L. Fern

    2007-02-01

    Full Text Available The wave packets of atmospheric gravity waves were numerically generated, with a given characteristic wave period, horizontal wave length and projection mean wind along the horizontal wave vector. Their projection phase and group velocities along the oblique radar beam (vpr and vgr, with different zenith angle θ and azimuth angle φ, were analyzed by the method of phase- and group-velocity tracing. The results were consistent with the theoretical calculations derived by the dispersion relation, reconfirming the accuracy of the method of analysis. The RTI plot of the numerical wave packets were similar to the striation patterns of the QP echoes from the FAI irregularity region. We propose that the striation range rate of the QP echo is equal to the radial phase velocity vpr, and the slope of the energy line across the neighboring striations is equal to the radial group velocity vgr of the wave packet; the horizontal distance between two neighboring striations is equal to the characteristic wave period τ. Then, one can inversely calculate all the properties of the gravity wave responsible for the appearance of the QP echoes. We found that the possibility of some QP echoes being generated by the gravity waves originated from lower altitudes cannot be ruled out.

  18. Wave packet autocorrelation functions for quantum hard-disk and hard-sphere billiards in the high-energy, diffraction regime.

    Science.gov (United States)

    Goussev, Arseni; Dorfman, J R

    2006-07-01

    We consider the time evolution of a wave packet representing a quantum particle moving in a geometrically open billiard that consists of a number of fixed hard-disk or hard-sphere scatterers. Using the technique of multiple collision expansions we provide a first-principle analytical calculation of the time-dependent autocorrelation function for the wave packet in the high-energy diffraction regime, in which the particle's de Broglie wavelength, while being small compared to the size of the scatterers, is large enough to prevent the formation of geometric shadow over distances of the order of the particle's free flight path. The hard-disk or hard-sphere scattering system must be sufficiently dilute in order for this high-energy diffraction regime to be achievable. Apart from the overall exponential decay, the autocorrelation function exhibits a generally complicated sequence of relatively strong peaks corresponding to partial revivals of the wave packet. Both the exponential decay (or escape) rate and the revival peak structure are predominantly determined by the underlying classical dynamics. A relation between the escape rate, and the Lyapunov exponents and Kolmogorov-Sinai entropy of the counterpart classical system, previously known for hard-disk billiards, is strengthened by generalization to three spatial dimensions. The results of the quantum mechanical calculation of the time-dependent autocorrelation function agree with predictions of the semiclassical periodic orbit theory.

  19. Consistency of trace norm minimization

    CERN Document Server

    Bach, Francis

    2007-01-01

    Regularization by the sum of singular values, also referred to as the trace norm, is a popular technique for estimating low rank rectangular matrices. In this paper, we extend some of the consistency results of the Lasso to provide necessary and sufficient conditions for rank consistency of trace norm minimization with the square loss. We also provide an adaptive version that is rank consistent even when the necessary condition for the non adaptive version is not fulfilled.

  20. High SNR Consistent Compressive Sensing

    OpenAIRE

    Kallummil, Sreejith; Kalyani, Sheetal

    2017-01-01

    High signal to noise ratio (SNR) consistency of model selection criteria in linear regression models has attracted a lot of attention recently. However, most of the existing literature on high SNR consistency deals with model order selection. Further, the limited literature available on the high SNR consistency of subset selection procedures (SSPs) is applicable to linear regression with full rank measurement matrices only. Hence, the performance of SSPs used in underdetermined linear models ...