The random failure of components in a distribution network leads to power supply interruptions to electricity customers. Among different failure modes in the distribution network components, active ...failure is more frequent and requires the circuit breaker operations to isolate faulty segments. Active failure of a breaker causes the operation of a backup breaker, thus, exposing the larger segment of the network to outages. This paper proposes a new analytical methodology to identify breaker active failure events involving different order of contingencies. This methodology introduces an active breaker incidence (ABI) matrix to capture the active failure of breakers leading to load point failures. The ABI matrix is concatenated to the incidence matrix of the minimal path to form a new incidence matrix which reflects the information of all failure events including active failure of circuit breakers. These failure events are then utilized to evaluate the reliability indices. The proposed methodology is illustrated in a test distribution network. A study conducted on the IEEE Gold Book Standard Network shows that that the methodology effectively identifies and includes breaker failure events to evaluate the reliability performance, and that the proposed methodology can be utilized to make investment decisions in modern industrial distribution systems.
Accurately and efficiently predicting elephant flows (elephants) is crucial for optimizing network performance and resource utilization. Current prediction approaches for software-defined networks ...(SDNs) typically rely on complete traffic and statistics moving from switches to controllers. This leads to an extra control channel bandwidth occupation and network delay. To address this issue, this paper proposes a prediction strategy based on incomplete traffic that is sampled by the timeouts for the installation or reactivation of flow entries. The strategy involves assigning a very short hard timeout (Tinitial) to flow entries and then increasing it at a rate of
until flows are identified as elephants or out of their lifespans. Predicted elephants are switched to an idle timeout of 5 s. Logistic regression is used to model elephants based on a complete dataset. Bayesian optimization is then used to tune the trained model Tinitial and
over the incomplete dataset. The process of feature selection, model learning, and optimization is explained. An extensive evaluation shows that the proposed approach can achieve over 90% generalization accuracy over 7 different datasets, including campus, backbone, and the Internet of Things (IoT). Elephants can be correctly predicted for about half of their lifetime. The proposed approach can significantly reduce the controller-switch interaction in campus and IoT networks, although packet completion approaches may need to be applied in networks with a short mean packet inter-arrival time.
We present a network decomposition method using binary decision diagrams (BDD), a state-of-the-art data structure to encode, and manipulate Boolean functions, for computing the reliability of ...networks such as computer, communication, or power networks. We consider the K-terminal reliability measure R K , which is defined as the probability that a subset K of nodes can communicate with each other, taking into account the possible failures of the network links. We present an exact algorithm for computing the if-terminal reliability of a network with perfect vertices in O(m . F max . 2 Fmax. B Fmax ), where B Fmax is the Bell number of the maximum boundary set of vertices F max , and m is the number of network links. Several examples, and experiments show the effectiveness of this approach.
5G cellular networks are already more than six times faster than 4G networks, and their packet loss rate, especially in the Internet of Vehicles (IoV), can reach 0.5% in many cases, such as when ...there is high-speed movement or obstacles nearby. In such high bandwidth and high packet loss network environments, traditional congestion control algorithms, such as CUBIC and bottleneck bandwidth and round-trip propagation time (BBR), have been unable to balance flow fairness and high performance, and their flow rate often takes a long time to converge. We propose a congestion control algorithm based on bottleneck routing feedback using an in-network control mode called bottleneck routing feedback (BRF). We use SDN technology (OpenFlow protocol) to collect network bandwidth information, and BRF controls the data transmission rate of the sender. By adding the bandwidth information of the bottleneck in the option field in the ACK packet, considering the flow fairness and the flow convergence rate, a bandwidth allocation scheme compatible with multiple congestion control algorithms is proposed to ensure the fairness of all flows and make them converge faster. The performance of BRF is evaluated via Mininet. The experimental results show that BRF provides higher bandwidth utilization, faster convergence rate, and fairer bandwidth allocation than existing congestion control algorithms in 5G cellular networks.
One of the most challenging issues in the routing protocols for underwater wireless sensor networks (UWSNs) is the occurrence of void areas (communication void). That is, when void areas are present, ...the data packets could be trapped in a sensor node and cannot be sent further to reach the sink(s) due to the features of the UWSNs environment and/or the configuration of the network itself. Opportunistic routing (OR) is an innovative prototype in routing for UWSNs. In routing protocols employing the OR technique, the most suitable sensor node according to the criteria adopted by the protocol rules will be elected as a next-hop forwarder node to forward the data packets first. This routing method takes advantage of the broadcast nature of wireless sensor networks. OR has made a noticeable improvement in the sensor networks' performance in terms of efficiency, throughput, and reliability. Several routing protocols that utilize OR in UWSNs have been proposed to extend the lifetime of the network and maintain its connectivity by addressing void areas. In addition, a number of survey papers were presented in routing protocols with different points of approach. Our paper focuses on reviewing void avoiding OR protocols. In this paper, we briefly present the basic concept of OR and its building blocks. We also indicate the concept of the void area and list the reasons that could lead to its occurrence, as well as reviewing the state-of-the-art OR protocols proposed for this challenging area and presenting their strengths and weaknesses.
How can you use the latest digital technology to create an environment in which people can learn European languages while performing a meaningful real-world task and experiencing the cultural aspect ...of learning to cook European dishes? This book explains how to do this from A to Z, covering how a real-world digital environment for language learning was designed, built and researched. The project makes language learning motivational and fun by tapping into people's interest in both cooking and technology - you can learn a language while cooking and interacting with a speaking digital kitchen. The kitchens provide spoken instructions in the foreign language on how to prepare European cuisine. Digital sensors are inserted in or attached to all the kitchen equipment and ingredients, so the digital kitchen detects what learners are doing and gives them feedback. Learners are also able to communicate with the kitchens and can ask for help via photos and videos if they don't understand any foreign language words. Based on two research grants, the book provides five research studies showing the learning experiences of users in five European countries. The book explains the principles and procedures involved in the project, enabling others to design and implement a real-world digital learning environment in the same way. It includes numerous photographs of the system in use and evidence of how and what 250 users actually learnt.
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets ...passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this regard, detecting or preventing deceitful nodes that will launch blackhole attacks is a challenge in MANETs. In this paper, we propose an Enhanced Blackhole Resistance (EBR) protocol to identify and resist nodes that are responsible for blackhole attacks. EBR can avoid congested traffic by passing the data packets through a safe route with the minimum RTT. The EBR protocol uses a combination of time to live (TTL) and round trip time (RTT), which is also called a TR mechanism, to detect the blackhole attacks. Our algorithm does not require any cryptographic or authentication mechanisms. Simulation results prove that EBR behaves better than other protocols in terms of throughput, end-to-end delay, packet delivery ratio, energy, and routing overhead.
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private ...data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge–response pairs generated by the PUF chip. It ensures the security of the physical layer of the device and reduces the computing cost and communication cost of the wireless sensor side. The protocol introduces a pre-authentication mechanism to achieve continuous authentication between the gateway and the cloud server. The overall computational cost of the protocol is reduced. Formal security analysis and informal security analysis proved that our proposed protocol has more security features. We implemented various security primitives using the MIRACL cryptographic library and GMP large number library. Our proposed protocol was compared in-depth with related work. Detailed experiments show that our proposed protocol significantly reduces the computational cost and communication cost on the wireless sensor side and the overall computational cost of the protocol.
Flying Ad‐Hoc Network (FANET) is a promising ad hoc networking paradigm that can offer new added value services in military and civilian applications. Typically, it incorporates a group of Unmanned ...Aerial Vehicles (UAVs), known as drones that collaborate and cooperate to accomplish several missions without human intervention. However, UAV communications are prone to various attacks and detecting malicious nodes is essential for efficient FANET operation. Trust management is an effective method that plays a significant role in the prediction and recognition of intrusions in FANETs. Specifically, evaluating node behaviour remains an important issue in this domain. For this purpose, the authors suggest using fuzzy logic, one of the most commonly used methods for trust computation, which classifies nodes based on multiple criteria to handle complex environments. In addition, the Received Signal Strength Indication (RSSI) is an important parameter that can be used in fuzzy logic to evaluate a drone's behaviour. However, in outdoor flying networks, the RSSI can be seriously influenced by the humidity of the air, which can dramatically impact the accuracy of the trust results. FUBA, a fuzzy‐based UAV behaviour analytics is presented for trust management in FANETs. By considering humidity as a new parameter, FUBA can identify insider threats and increase the overall network's trustworthiness under bad weather conditions. It is capable of performing well in outdoor flying networks. The simulation results indicate that the proposed model significantly outperforms FNDN and UNION in terms of the average end‐to‐end delay and the false positive ratio.
Flying Ad‐Hoc Network (FANET) is a promising ad hoc networking paradigm. Typically, it incorporates a group of Unmanned Aerial Vehicles (UAVs) that collaborate and cooperate to accomplish several missions. FUBA, a fuzzy‐based UAV behaviour analytics is presented for trust management in FANETs by considering humidity as a new parameter.
Vitreous hemorrhage from proliferative diabetic retinopathy can cause severe vision loss. DRCR Retina Network Protocol AB was a randomized clinical trial comparing intravitreal aflibercept versus ...vitrectomy with panretinal photocoagulation and found no difference in the average rate of visual recovery over 104 weeks. Herein, we describe patient-reported outcome measures from Protocol AB.
Secondary analysis of a multicenter (39 sites) randomized clinical trial. The Work Productivity and Activity Impairment Questionnaire was administered at 4, 12, 24, 36, 52, 68, 84, and 104 weeks. Main outcomes were mean change in activity impairment and work productivity loss over 24 and 104 weeks (area under the curve).
Mean (SD) activity impairment at baseline was 58% (27%) in the aflibercept group (N = 99) and 56% (30%) in the vitrectomy group (N = 105). The mean reduction in activity impairment from baseline over 24 weeks was 21% (25%) in the aflibercept group and 27% (31%) in the vitrectomy group (adjusted difference = -6.8% 95% CI, -12.7% to -0.9%, P = .02); over 104 weeks, the adjusted mean difference was -3.1% (95% CI, -9.2% to 3.0%, P = .31). Mean work productivity loss at baseline was 51% (28%) in the aflibercept group (N = 44) and 58% (30%) in the vitrectomy group (N = 43). The mean reduction in work productivity loss from baseline over 24 weeks (area under the curve) was 19% (23%) in the aflibercept group and 31% (24%) in the vitrectomy group (adjusted difference = -8.3% 95% CI, -16.8% to 0.2%, P = .06); over 104 weeks, the adjusted mean difference was -9.1% (95% CI, -18.4% to 0.2%, P = .05).
Participants with vitreous hemorrhage from proliferative diabetic retinopathy had less activity impairment over 24 weeks when treated initially with vitrectomy and panretinal photocoagulation versus intravitreal aflibercept. The trend was similar for work productivity but not statistically significant. By 104 weeks, the improvements were similar in the two treatment groups.
ClinicalTrials.gov NCT02858076.