期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks 被引量:3
1
作者 Nogbou G. Anoh Michel Babri +3 位作者 Ahmed D. Kora Roger M. Faye Boko Aka Claude Lishou 《Digital Communications and Networks》 SCIE 2017年第1期11-18,共8页
Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks ... Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL) algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP) algorithm which offers better performance than the Dedicated Protection (DP) algorithm. 展开更多
关键词 Hybrid protectionElastic Optical NetworksBackup shared resourcesEfficient energy costMinimum resource utilizationModulation format
在线阅读 下载PDF
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs 被引量:1
2
作者 Aziz Baayer Nourddine Enneya Mohammed Elkoutbi 《Journal of Information Security》 2012年第3期224-230,共7页
Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anyt... Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anytime and anywhere in the network by interception and retransmission of the valid signed messages. Consequently, the MANET performance is severally degraded by the overhead produced by the redundant valid messages. In this paper, we propose an enhancement of timestamp discrepancy used to validate a signed message and consequently limiting the impact of a replay attack. Our proposed timestamp concept estimates approximately the time where the message is received and validated by the received node. This estimation is based on the existing parameters defined at the 802.11 MAC layer. 展开更多
关键词 MANET REPLAY Attack DENIAL-OF-SERVICE (DoS) 802.11 MAC Layer Network Allocation Vector (NAV) Security Countermeasure
在线阅读 下载PDF
Data Recovering Problem Using a New KMF Algorithm for Annular Domain
3
作者 Chakir Tajani Jaafar Abouchabaka Otman Abdoun 《American Journal of Computational Mathematics》 2012年第2期88-94,共7页
This paper is interested at the Cauchy problem for Laplace’s equation, which is to recover both Dirichlet and Neumann conditions on the inaccessible part of the boundary (inner part) of an annular domain from the ove... This paper is interested at the Cauchy problem for Laplace’s equation, which is to recover both Dirichlet and Neumann conditions on the inaccessible part of the boundary (inner part) of an annular domain from the over specified conditions on the accessible one (outer part). This work is an extension of the proposed algorithm for a unit circle [1] to annular domain, where, we describe an alternating formulation of the KMF algorithm proposed by Kozlov, Mazya and Fomin, and its relationship with the standard formulation. The new KMF algorithm ameliorates the accuracy of the solution and reduces the number of iterations required to achieve convergence. In the last part, the discussion of the error estimation of solution is presented and some numerical tests, using the software Freefem are given to show the efficiency of the proposed method. 展开更多
关键词 Inverse Problem Annular Domain Laplace Equation Iterative Method Freefem
在线阅读 下载PDF
A Genetic Algorithm for Overall Designing and Planning of a Long Term Evolution Advanced Network
4
作者 Brou Aguié Pacôme Bertrand Diaby Moustapha +2 位作者 Soro Etienne Oumtanaga Souleymane Aka Boko 《American Journal of Operations Research》 2016年第4期355-370,共17页
In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, w... In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, we introduce a comprehensive single-lens model for a fourth generation mobile network, Long Term Evolution Advanced Network (4G/LTE-A) technology which includes three sub assignments: cells in the core network. In the resolution, we propose an adaptation of the Genetic Evolutionary Algorithm for a global resolution. This is a combinatorial optimization problem that is considered as difficult. The use of this adaptive method does not necessarily lead to optimal solutions with the aim of reducing the convergence time towards a feasible solution. 展开更多
关键词 Overall Planning 4G/LTE-A Network Genetic Algorithm
在线阅读 下载PDF
Method of Estimation of Chemical Compounds of a Solution by Analysis of Video Images of Titration from a Semi-Automatic Approach
5
作者 Marcelin Sandje Sie Ouattara +1 位作者 Diako Doffou Jerome Alain Clément 《Open Journal of Applied Sciences》 2022年第6期1069-1082,共14页
To titrate or measure a chemical species in a solution is to estimate its quantity of matter or its molar concentration in a given solution. Several methods of estimating molar concentrations of chemical species exist... To titrate or measure a chemical species in a solution is to estimate its quantity of matter or its molar concentration in a given solution. Several methods of estimating molar concentrations of chemical species exist, the main ones being Colorimetric titration, Conductimetric titration, pH metric titration. In practice, all these methods present approximative results because the operator repeats the experiment to ensure the reliability of the results. As a consequence, we have a prolonged time of the experiment which involves a cost in reagents. Given the repetitions of the same experiment, the final result is the average of the results of each experiment. The aim of this paper is to correct this subjectivity by implementing a semi-automatic approach based on colorimetric titration. At the end of the implementation of our approach, we compared our results to those of existing techniques. These results show the reliability of the calculation by the semi-automatic method. This method of estimating the volume at equivalence is fast because it is not manual and does not involve the use of geometric measuring instruments to find the volume at equivalence. This method improves the manual calculation of the volume at equivalence used in the laboratories in school and student environment. 展开更多
关键词 TITRATION TURNING Equivalence Point Volume at Equivalence
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部