Search results for "Network optimization"

showing 6 items of 6 documents

The Network Balance Realized by Routing Organization System

2011

In the presented paper, we propose to exploit routing organization for the purpose of managing network resources. According to our assumptions, we have the same quantity of materials, objects, tokens, tools etc. at our disposal in every node of the network. During network operation we must distribute resources between these nodes. It should be carried out as instantaneously and as economically as possible. Multi-Agent Systems are also used to deal with this kind of tasks and the centralised algorithms presented in this paper are to be used to measure the efficiency of the distributed MAS solution. From the logistical point of view, we have a sequence of stages with different states of token…

Balance (metaphysics)SequenceMeasure (data warehouse)routing strategyPoint (typography)ExploitOperations researchComputer scienceDistributed computingNode (networking)Evacuation strategynetwork balancenetwork optimizationRouting (electronic design automation)
researchProduct

Discovery privacy threats via device de-anonymization in LoRaWAN

2021

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…

Information privacyIoTDe-anonymizationde-anonymizationsComputer scienceEmerging technologiesComputer Networks and CommunicationsInternet of ThingsDevice identificationcomputer.software_genreComputer securityprivacyLoRaSecurity and privacyUnique identifierDe-anonymizationLoRaWAN; Security; privacy; de-anonymizationsLorawanApplication serverNetwork packetProbabilistic logicIdentification (information)internet of things; lora; lorawan; security; privacy; network optimizationSecuritycomputerNetwork optimizationComputer Communications
researchProduct

Predicting lorawan behavior. How machine learning can help

2020

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…

IoTComputer Networks and CommunicationsComputer scienceDecision treeChannel occupancy; cluster analysis; IoT; LoRa; LoRaWAN; machine learning; network optimization; prediction analysisMachine learningcomputer.software_genreChannel occupancyLoRalcsh:QA75.5-76.95network optimizationNetwork performanceProtocol (object-oriented programming)Profiling (computer programming)Artificial neural networkNetwork packetbusiness.industrySettore ING-INF/03 - TelecomunicazioniPipeline (software)LoRaWANHuman-Computer Interactionmachine learningprediction analysisArtificial intelligencelcsh:Electronic computers. Computer sciencebusinesscomputerCommunication channelcluster analysis
researchProduct

Seismic Network Evaluation through Simulation: an application to the Italian RSNC-INGV

2010

Settore GEO/11 - Geofisica ApplicataSettore GEO/10 - Geofisica Della Terra Solidahypocenter localization network optimization
researchProduct

Active Learning for Monitoring Network Optimization

2012

Kernel-based active learning strategies were studied for the optimization of environmental monitoring networks. This chapter introduces the basic machine learning algorithms originated in the statistical learning theory of Vapnik (1998). Active learning is closer to an optimization done using sequential Gaussian simulations. The chapter presents the general ideas of statistical learning from data. It derives the basics of kernel-based support vector algorithms. The active learning framework is presented and machine learning extensions for active learning are described in the chapter. Kernel-based active learning strategies are tested on real case studies. The chapter explores the use of a c…

Active learningComputer scienceActive learning (machine learning)Kernel-based support vector algorithmsMachine learningGaussian simulationsData scienceMonitoring network optimization
researchProduct

The linear saturated decentralized strategy for constrained flow control is asymptotically optimal

2013

We present an algorithm for constrained network flow control in the presence of an unknown demand. Our algorithm is decentralized in the sense that it is implemented by a team of agents, each controlling just the flow on a single arc of the network based only on the buffer levels at the nodes at the extremes of the arc, while ignoring the actions of other agents and the network topology. We prove that our algorithm is also stabilizing and steady-state optimal. Specifically, we show that it asymptotically produces the minimum-norm flow. We finally generalize our algorithm to networks with a linear dynamics and we prove that certain least-square optimality properties still hold.

Production-distribution systemsOptimizationMathematical optimizationRobust controlUncertain systemsMinimum normNetwork topologyMinimum norm flowControl theoryElectric network topologyConstrained flowUncertain systemsElectrical and Electronic EngineeringMathematicsFlow control (data)Network topologyAsymptotically optimalRobust control; OptimizationUncertain systemEthernet flow controlAsymptotically optimal Constrained flow Distributed flow control Minimum norm Network optimization Network topology Production-distribution systems Steady-state optimal; Algorithms Electric network topology Flow control Uncertain systems; OptimizationProduction-distribution systemFlow controlAsymptotically optimal algorithmControl and Systems EngineeringSteady-state optimalMinimum-cost flow problemDistributed flow controlRobust controlNetwork optimization; Distributed flow control; Production-distribution systems; Uncertain systems; Minimum norm flowNetwork optimizationAlgorithms
researchProduct