Academic literature on the topic 'Time-Aware Shaper (TAS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Time-Aware Shaper (TAS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Time-Aware Shaper (TAS)":

1

Nasrallah, Ahmed, Akhilesh S. Thyagaturu, Ziyad Alharbi, Cuixiang Wang, Xing Shao, Martin Reisslein, and Hesham Elbakoury. "Performance Comparison of IEEE 802.1 TSN Time Aware Shaper (TAS) and Asynchronous Traffic Shaper (ATS)." IEEE Access 7 (2019): 44165–81. http://dx.doi.org/10.1109/access.2019.2908613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Chang, Yue Hong, Jin Wang, Chang Liu Sr., Li Tian, and Jiangpei Xu. "Hierarchical Cross Traffic Scheduling Based on Time-Aware Shapers for Mobile Time-Sensitive Fronthaul Network." Wireless Communications and Mobile Computing 2024 (April 15, 2024): 1–9. http://dx.doi.org/10.1155/2024/8882006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
To solve the problem of jitter and low network throughput caused by the impact of background flows on IQ traffic in mobile fronthaul network, this paper proposed a new scheduling model for background flows, named hierarchical crossover traffic scheduling mechanism based on time-aware shaper (HC-TAS) by improving the traditional counterpart. Then, in this new model, we designed an inbound scheduling algorithm based on frame length matching and an outbound scheduling algorithm based on queue status, making sure that smaller data frames will not be blocked by large data frames. This greatly improves the utilization of timeslots in the scheduling process and reduces the jitter impact of background flows. To verify its performance, we conducted experiments in a simulated fronthaul network conforming to IEEE 802.1CM. The experimental results show that, under the condition that the jitter is guaranteed to be zero, compared with two mainstream scheduling schemes, Comb-FITting and TAS + Preemption, our proposed scheme can achieve lower maximum end-to-end delay and higher link utilization. The proposed HC-TAS meets the requirements of low jitter and high bandwidth utilization in 5G fronthaul network, and the research results provide a technical basis for the application and development of general time-sensitive networks as well.
3

Hesham ElBakoury, Martin Reisslein, Akhilesh S. Thyagaturu, Venkatraman Balasubramanian, and Ahmed Nasrallah. "Reconfiguration algorithms for high precision communications in time sensitive networks: Time-aware shaper configuration with IEEE 802.1Qcc." ITU Journal on Future and Evolving Technologies 2, no. 1 (March 15, 2021): 13–34. http://dx.doi.org/10.52953/sivv2522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As new networking paradigms emerge for different networking applications, e.g., cyber-physical systems, and different services are handled under a converged data link technology, e.g., Ethernet, certain applications with mission critical traffic cannot coexist on the same physical networking infrastructure using traditional Ethernet packet-switched networking protocols. The IEEE 802.1Q Time Sensitive Networking (TSN) Task Group is developing protocol standards to provide deterministic properties, i.e., eliminates non-deterministic delays, on Ethernet based packet-switched networks. In particular, the IEEE 802.1Qcc, centralized management and control, and the IEEE 802.1Qbv, Time-Aware Shaper (TAS), can be used to manage and control Scheduled Traffic (ST) streams with periodic properties along with Best-Effort (BE) traffic on the same network infrastructure. We investigate the effects of using the IEEE 802.1Qcc management protocol to accurately and precisely configure TAS enabled switches (with transmission windows governed by Gate Control Lists (GCLs) with Gate Control Entries (GCEs)) ensuring ultra-low bounded latency, zero packet loss, and minimal jitter for ST TSN traffic. We examine both a centralized network/distributed user model (hybrid model) and a fully-distributed (decentralized) 802.1Qcc model on a typical industrial control network with the goal of maximizing the number of ST streams.
4

Guo, Mengjie, Guochu Shou, Yaqiong Liu, and Yihong Hu. "Software-Defined Time-Sensitive Networking for Cross-Domain Deterministic Transmission." Electronics 13, no. 7 (March 27, 2024): 1246. http://dx.doi.org/10.3390/electronics13071246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rapid development of Industrial 4.0, massive emerging time-critical applications pose new demands for industrial networks, such as strict latency boundaries, ultra-reliable transmission, and so on. Time-Sensitive Networking (TSN) is well suited for these demanding scenarios due to its support for deterministic transmission based on Ethernet. However, many use cases in real industrial scenarios involve non-TSN domains, and, thus, the network requires providing deterministic transmission across non-TSN domains to support them. To this end, this paper proposes a novel Software-Defined Time-Sensitive Networking (SD-TSN) framework that integrates the determinism of TSN and scalability of Software-Defined Networking (SDN). SD-TSN exploits the coordination between the coordinated controller and different domain controllers to bound non-deterministic queuing delays in a way that guarantees determinism. In particular, we designed a multi-domain time-aware traffic scheduling model, which harmonizes the time-aware shaper (TAS) in TSN and time-slots in non-TSN domains based on a global view, generating transmission schedules for each domain. A prototype testbed was built to conduct the experiments. The evaluation results demonstrate that the proposed method can efficiently achieve bounded delay and low delay variations in the transmission across non-TSN domains.
5

Luo, Feng, Bowen Wang, Zhenyu Yang, Ping Zhang, Yifei Ma, Zihao Fang, Mingzhi Wu, and Zhipeng Sun. "Design Methodology of Automotive Time-Sensitive Network System Based on OMNeT++ Simulation System." Sensors 22, no. 12 (June 17, 2022): 4580. http://dx.doi.org/10.3390/s22124580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Advances in automotive technology require networks to support a variety of communication requirements, such as reliability, real-time performance, low jitter, and strict delay limits. Time-Sensitive Network (TSN) is a keyframe transmission delay-guaranteed solution based on the IEEE 802 architecture of the automotive Ethernet. However, most of the existing studies on automotive TSN performance are based on a single mechanism, lacking a complete and systematic research tool. At the same time, the design method should be considered from a global perspective when designing an automotive TSN system, rather than only considering a single mechanism that TSN applies to. This paper discusses the correspondence between traffic types and automotive scenarios and proposes a methodology to target the delay constraint of traffic types as the design goal of automotive TSN networks. To study the performance of automotive TSN under different mechanisms such as time-aware shaper (TAS), credit-based shaper (CBS), cyclic queuing and forwarding (CQF), etc., this paper also develops a systematic automotive TSN simulation system based on OMNeT++. The simulation system plays a crucial role in the whole methodology, including all applicable TSN standards for the automotive field. Lastly, a complex automotive scenario based on zonal architecture provided by a major motor company in Shanghai is analyzed in the simulated system; verifying TSN can guarantee real-time performance and reliability of the in-vehicle network.
6

Agustí-Torra, Anna, Marc Ferré-Mancebo, Gabriel David Orozco-Urrutia, David Rincón-Rivera, and David Remondo. "A Microservices-Based Control Plane for Time-Sensitive Networking." Future Internet 16, no. 4 (April 1, 2024): 120. http://dx.doi.org/10.3390/fi16040120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Time-Sensitive Networking (TSN) aims to provide deterministic communications over Ethernet. The main characteristics of TSN are bounded latency and very high reliability, thus complying with the strict requirements of industrial communications or automotive applications, to name a couple of examples. In order to achieve this goal, TSN defines several scheduling algorithms, among them the Time-Aware Shaper (TAS), which is based on time slots and Gate Control Lists (GCLs). The configuration of network elements to allocate time slots, paths, and GCLs is laborious, and has to be updated promptly and in a dynamic way, as new data flows arrive or disappear. The IEEE 802.1Qcc standard provides the basis to design a TSN control plane to face these challenges, following the Software-Defined Networking (SDN) paradigm. However, most of the current SDN/TSN control plane solutions are monolithic applications designed to run on dedicated servers, and do not provide the required flexibility to escalate when facing increasing service requests. This work presents μTSN-CP, an SDN/TSN microservices-based control plane, based on the 802.1Qcc standard. Our architecture leverages the advantages of microservices, enabling the control plane to scale up or down in response to varying workloads dynamically. We achieve enhanced flexibility and resilience by breaking down the control plane into smaller, independent microservices. The performance of μTSN-CP is evaluated in a real environment with TSN switches, and various integer linear problem solvers, running over different computing platforms.
7

Munir, Haniya. "Language Shapes Socially Constructed Gender Roles: Ibsen’s ‘A Doll’s House’ in Focus." Journal of Communication and Cultural Trends 2, no. 1 (January 5, 2021): 19–30. http://dx.doi.org/10.32350/jcct/2020/21/1129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Language plays an important role in human life that can be seen from various perspectives such as the cultural perspective, linguistic perspective, social perspective, psychological perspective, perspective of gender and moral and ethical perspectives. This is undoubtedly a proven fact that we use language and at the same time, language uses us to define, designate, tag and shape our places in the society (Cameron, 2005). This role of language is generally suitable for all human race either male or female but the basic purpose of this study is to explain how language shapes a woman’s place and identity in society. Often we find that women face linguistic discrimination in two different ways: one is the way; they are taught to speak and use language and the other way is about how language treats them (Lakoff, 2004). These linguistic disparities tend to specify a woman’s role and function in the society as a sex object, a servant, a wife, a daughter, a mother and specifically a woman (Kerber, 1988). The researcher collected the data for this study from Ibsen’s (1999) ‘A Doll’s House’ in which different lexical items, phrases and sentences were uttered intentionally to explain the role of the main character Nora as a wife, as a daughter and as a woman. The researcher examined the speeches of different characters only to show the language –made and man- made places of women in the society. For this purpose, the researcher used a theoretical framework based on the qualitative approach while consulting the related ideas of Lakoff (2004) who, in her ‘Dominance Theory,’ explains how language shapes a woman’s place in the society by analyzing her own speeches and the speeches of different people in the society. The findings of the study go a long way in telling people and the upcoming researchers that language not only specifies gender roles individually, but also internally and externally as well. Basically different social characters surrounding a woman use language in such a way that it starts shaping a woman’s character in different sub- characters as explained in the work of Ibsen (1999). Furthermore, language use tells us that a man remains a man in every situation either as a father, as a husband, as a son, and above all as a man but a woman’s place in society is changeable according to language use and those tagged names that men have used for women ever. For example, if a little girl talks roughly like a boy, she is scolded by her parents and friends (Lakoff, 2004). This process of socialization is harmful in the sense that it is making women weak, incapable and less –confident but if we analyze the last lines spoken by Nora in the selected text of Ibsen (1999), we come to know that constant battering and hammering of socialization and generalization are now making women aware of their individual place and identity in the society and they are now looking at life from a different perspective that is still unacceptable in the man-made society (Kramer, 1974). This study will open new avenues for sociolinguists to study language and gender keenly and critically.
8

Munir, Haniya. "Language Shapes Socially Constructed Gender Roles: Ibsen’s ‘A Doll’s House’ in Focus." Journal of Communication and Cultural Trends 2, no. 1 (March 3, 2021): 19–30. http://dx.doi.org/10.32350/jcct.21.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Language plays an important role in human life that can be seen from various perspectives such as the cultural perspective, linguistic perspective, social perspective, psychological perspective, perspective of gender and moral and ethical perspectives. This is undoubtedly a proven fact that we use language and at the same time, language uses us to define, designate, tag and shape our places in the society (Cameron, 2005). This role of language is generally suitable for all human race either male or female but the basic purpose of this study is to explain how language shapes a woman’s place and identity in society. Often we find that women face linguistic discrimination in two different ways: one is the way; they are taught to speak and use language and the other way is about how language treats them (Lakoff, 2004). These linguistic disparities tend to specify a woman’s role and function in the society as a sex object, a servant, a wife, a daughter, a mother and specifically a woman (Kerber, 1988). The researcher collected the data for this study from Ibsen’s (1999) ‘A Doll’s House’ in which different lexical items, phrases and sentences were uttered intentionally to explain the role of the main character Nora as a wife, as a daughter and as a woman. The researcher examined the speeches of different characters only to show the language –made and man- made places of women in the society. For this purpose, the researcher used a theoretical framework based on the qualitative approach while consulting the related ideas of Lakoff (2004) who, in her ‘Dominance Theory,’ explains how language shapes a woman’s place in the society by analyzing her own speeches and the speeches of different people in the society. The findings of the study go a long way in telling people and the upcoming researchers that language not only specifies gender roles individually, but also internally and externally as well. Basically different social characters surrounding a woman use language in such a way that it starts shaping a woman’s character in different sub- characters as explained in the work of Ibsen (1999). Furthermore, language use tells us that a man remains a man in every situation either as a father, as a husband, as a son, and above all as a man but a woman’s place in society is changeable according to language use and those tagged names that men have used for women ever. For example, if a little girl talks roughly like a boy, she is scolded by her parents and friends (Lakoff, 2004). This process of socialization is harmful in the sense that it is making women weak, incapable and less –confident but if we analyze the last lines spoken by Nora in the selected text of Ibsen (1999), we come to know that constant battering and hammering of socialization and generalization are now making women aware of their individual place and identity in the society and they are now looking at life from a different perspective that is still unacceptable in the man-made society (Kramer, 1974). This study will open new avenues for sociolinguists to study language and gender keenly and critically.
9

Porras-Bernardez, Francisco, Georg Gartner, Nico Van de Weghe, and Steven Verstockt. "Finding cultural heritage traces from modern social media." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-302-2019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p><strong>Abstract.</strong> This work is on development within the framework of the project Eureca: <i>EUropean Region Enrichment in City Archives and collections</i> of the University of Ghent (IDLab, CartoGIS), the Technical University of Vienna (Research Group Cartography) and several city and state archives. <i>Eureca</i> focuses on revealing traces (i.e. origins or influences) of European regions that have shaped the cities in which we live today and will further develop tools to explore these traces when visiting a city. Different historical, architectural, economic, political, and cultural reasons form the base of these traces, and will be used as input to disclose cultural heritage items that can be linked to specific European regions and origins. The enriched metadata that will result in this project will be further usable to perform new fundamental research and applied studies, and to facilitate the exploitation of the collections to a broader public and attract new groups of cultural heritage consumers.</p><p>The specific focus of this work is on Geo-Social media (GSM) (Ostermann, 2015) as a source of information to identify these European traces of the past. The objective of this research is finding the <i>footprint</i> of Europeans visiting other euro-cities by determining areas of preference in a city for specific nationalities and during certain periods. The footprints represent areas of attraction for visitors in the city and the reasons for this attraction could be multiple: available services, architecture, historical/cultural hotspots, etc. Finding these modern footprints will be a base to identify the most visited cultural heritage points of interest (POIs) for specific nationalities or even cities of origin and during specific periods of the year. Finally, this will contribute to the development of location based services (LBS) that will help users to explore traces of their own region of origin in other European cities.</p><p>Social media data have been used in research widely and despite their multiple limitations, they have been proven useful for geographic research in different fields. Geotagged social media provide better insights on the spatial behaviour of their users. Some of the most used media in the literature include Foursquare, Twitter or Flickr. Foursquare is the least interesting for us because of its user base and amount of data available. Twitter provides a huge amount of geotagged text for semantic analysis but Flickr’s user profile is more suited for tourist behaviour analysis. Furthermore, Flickr provides a well-developed set of Application Programming Interfaces (APIs) to enable easier access to their data.</p><p>The first phase of this research involved the data collection from Flickr via two of its APIs. There are several Flickr datasets openly available, nevertheless we opted for building our own collection to avoid problems related to accessibility, accuracy and temporal coverage. Metadata of each uploaded picture such as photo owner, uploading date, geolocation, etc. was retrieved. In a second process, another API will be used to obtain the user name, location (user manually-provided) and other attributes. This location attribute have to be processed because of the heterogeneity of the data format. If only <i>city</i> is provided, the places have to be matched to a gazetteer to determine the country.</p><p>The data retrieved covered a squared area of 68 Mill.&amp;thinsp;km<sup>2</sup> representing a huge area around the continental Europe. In order to determine the nationality of each user the first source of information is the self-reported location included in her profile. Unfortunately, this information is often missing or can be simply false. For the majority of the users, the home location has to be inferred by some kind of method. A simple method based on previous works on home determination from user’s GSM data (Li &amp; Goodchild, 2012; Bojic et al., 2015) was developed and tested. To identify a country as user’s home location, all the pictures uploaded during a year in each country were considered. If the temporal difference between last and first photo was greater than 6 months, the user was labelled as local resident in that country. For comparison purposes, a second threshold of 3 months was also applied. With both thresholds, in some cases users were labelled with double home location because of being present in both cities in the same year.</p><p>We are aware of some limitations of this approach. For instance, a user can visit two times the same city in the same year. Besides, those users uploading pictures between the end of one year and the beginning of the following one will not be classified in that country. The nature of the Flickr user is a limitation itself; some individuals can upload one single photo and others may contribute thousands.</p><p>The method will be improved in future work by requiring a minimum of images uploaded during the chosen period. Also, it will be analysed the continuous stream of uploads during time instead of simply considering natural years. Additionally, the language of the title and tags could be used to infer the nationality. Moreover, the first information that will be taken into consideration is the self-reported home location obtained from the user’s profile. This new approach will increase the number of users correctly labelled so that we can get a better differentiation between locals and tourists and between different nationalities. This will be key for our further analysis.</p><p>The uploaded photos can be visualised as points in the space given that we have their geolocation. We can generate a continuous raster surface from these points using Kernel Density Estimation (KDE) (Grothe &amp; Schaab, 2009). These raster are heatmaps that represent areas of high concentration of pictures. These heatmaps represent a footprint of the visitors in the city. Thus, the areas more visited by tourists from a specific origin will be visible and also an analysis of the temporal evolution will be possible. The continuous surfaces built with KDE are very well suited for the task of determining vague areas open enough for further POIs identification in <i>Eureca</i>. In addition, to include areas of interest (AOIs) when dealing with open spaces like parks, squares or large buildings. Figure 1 shows examples of footprints in Vienna and Ghent.</p><p>The footprints will reveal the most preferred places for specific origins. Furthermore, all the footprints will be compared through spatial analysis. Using map algebra (Tomlin, 1990), we will obtain areas of common interest for Europeans and for instance classify the areas as high, moderate or low “Euro-visitor interest”. This can be applied for aggregated groups e.g. Mediterranean nations, German-speaking countries, etc. In further steps, Flickr data from the rest of the world will be collected to apply the same approach for more groups.</p><p>Regarding the results already obtained, the final number of points retrieved was about 66 million and covered a period (2004&amp;ndash;2018) representing Flickr photos from 62 countries. Initial research was done with a selection of 2 European cities and countries: Ghent (Belgium) and Vienna (Austria). Next steps will include all those countries fully retrieved from Flickr and the 10 European capitals with the highest amount of data available.</p><p>Several conclusions can be drawn from the initial results. The number of photos available for each city can vary greatly; this has to be considered in terms of relative representativeness. The inclusion of the self-reported user information should improve the theoretical accuracy of the user home location determination. It could serve as some kind of ground truth to estimate precision and recall of our own classification method. Increasing the dataset with world coverage and classifying the home location of all the global users should reduce the number of ambivalent cases by applying other strategies. In sum, further work is required but this initial approach seems to be useful for establishing GSM as a valuable modern source of information to identify cultural heritage POIs/AOIs that will reveal European traces of the past within the <i>Eureca</i> project.</p>
10

Pop, Paul, Konstantinos Alexandris, and Tongtong Wang. "Configuration of multi‐shaper Time‐Sensitive Networking for industrial applications." IET Networks, June 30, 2024. http://dx.doi.org/10.1049/ntw2.12129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractIEEE 802.1 Time‐Sensitive Networking (TSN) has proposed several shapers, for example, time‐aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit‐based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi‐shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi‐CQF combinations. The authors first propose multi‐shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi‐shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.

Dissertations / Theses on the topic "Time-Aware Shaper (TAS)":

1

Roberty, Adrien. "Ordonnancer le trafic dans des réseaux déterministes grâce à l’apprentissage par renforcement." Electronic Thesis or Diss., Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2024. http://www.theses.fr/2024ESMA0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L’un des changements les plus perturbateurs apportés par l’industrie 4.0 est la mise en réseau des installations de production. De plus, les discussions portant sur l’Industrie 5.0 montrent la nécessité d’un écosystème industriel intégré, combinant IA et jumeau numérique. Dans cet environnement, les équipements industriels fonctionneront de manière transparente avec les travailleurs humains, nécessitant une latence minimale et une connectivité haut débit pour la surveillance en temps réel. Afin de répondre à ces exigences, l’ensemble de standard Time-Sensitive Networking (TSN) a été introduit. Cependant, la configuration de TSN dans un réseau industriel complexe pose de nouveaux défis. Par exemple, les standards TSN permettent une certaine flexibilité et modularité dans le plan de données, néanmoins, les mécanismes définis dans ces standards dépendent de nombreux paramètres (tels que la topologie du réseau, le routage, etc.) ce qui rend le travail de conception difficile. IEEE 802.1Q est l’un des principaux standards TSN qui fournit plusieurs mécanismes pour atteindre une latence déterministe. L’un d’eux s’appelle le Time-Aware Shaper (TAS). Un commutateur avec une fonction TAS divise le trafic de données, à travers plusieurs priorités, en plusieurs files d’attente organisées selon un ordonnancement régulier. Les principales manières d’organiser ce processus sont basées sur des méthodes exactes ou heuristiques. Ceux-ci sont bons pour les réseaux fermés (lorsque tous les flux sont identifiés à l’avance et que la topologie du réseau est fixe). Cependant, dans un réseau ouvert (où plus de flux sont ajoutés au réseau et la topologie du réseau est dynamique), l’ordonnancement dans TSN peut entraîner des problèmes NP-difficile. L’objectif de cette thèse est de proposer une solution pour traiter l’ordonnancement dans TSN en utilisant l’apprentissage par renforcement profond avec l’utilisation de simulations pour entraîner et évaluer l’agent de configuration
One of the most disruptive changes brought by Industry 4.0 is the networking of production facilities. Furthermore, the discussions on Industry 5.0 show the need for an integrated industrial ecosystem,combining AI and the digital twin. In this environment, industrial equipment will work seamlessly with human workers, requiring minimal latency, high-speed connectivity for real-time monitoring. In order to meet this requirement, the Time-Sensitive Networking (TSN) set of standards was introduced. However, configuring TSN in a complex industrial network poses new challenges. For example, the TSN standard allow some flexibility and modularity in the data plane, however, the mechanisms defined by these standards depends on many parameters (such as network topology, routing, etc.) which makes the design work difficult. IEEE 802.1Q is one of the main TSN standards that provides several mechanisms to achieve deterministic latency. One of them is called Time-Aware Shaper (TAS). A switch with a TAS function divides the data traffic, through multiple priorities, into multiple queues arranged in a regular schedule. The main way to organize this process is based on exact or heuristic methods. These are good for closed networks (when all streams are identified in advance and the network topology is fixed). However, in an open network (where more streams are added to the network and the network topology is dynamic), scheduling in TSN can lead to NP-hard problems. The goal of this thesis is to propose a solution to process the scheduling in TSN using Deep Reinforcement Learning with the use of simulations to train and evaluate the configuration agent

Book chapters on the topic "Time-Aware Shaper (TAS)":

1

Johnson, Dale A. "Introduction." In The Changing Shape Of English Nonconformity, 1825-1925, 3–12. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195121636.003.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract The idea for this project began at a time when more than one scholar had noted that the greatest gap in nineteenth-century English religious history was the absence of modern studies of Nonconformity. Amid the revival of interest in religious themes of the Victorian era and earlier, represented by such monumental efforts as Owen Chadwick’s two-volume The Victorian Church (1966, 1970), the lack of attention to specific issues confronting the Nonconformists seemed a curious omission, perhaps more explainable by twentieth-century realities than by nineteenth-century events. In the course of time some of these increasingly visible gaps have been filled by a combination of anthologies, surveys, and monographs, and the overall picture is not nearly so sparse as it once was. Still, there remain a number of unexplored or minimally explored topics and questions, and it is because of these that this particular project has continued. While this volume is not as comprehensive as some have called for, it does attempt to contribute toward a deeper understanding of this phenomenon through the exploration of several interrelated themes that have received insufficient attention. Perhaps it is possible that no single study of nineteenth-century Nonconformity will be adequate to the task or the need.1 Scholars are now more aware of the great variety of Nonconformist forms and practices—from Plymouth Brethren to Unitarians, from a growing sense of denominationalism to fiercely independent congregations, from conservative approaches to issues in theology and culture to radical engagements with “the modern mind”—and corresponding departures from traditional perspectives. Further, studies of individual denominations have given way first to investigations of Nonconformity’s impact in politics and then to a number of social and literary explorations, as well as to consideration of popular identification with the several denominational groupings.

Conference papers on the topic "Time-Aware Shaper (TAS)":

1

Li, Xiaotong, and Ao Jiang. "The impact of prevalent behavioural mimicry in adolescents on disease prevention and maintenance of healthy behavioural activation." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the popularity and spread of social media, more and more social software is helping to bring people closer to each other [1]. It is increasingly easy for adolescents to get other people's updates from social media, including celebrities, internet celebrities and peers [2]. Also adolescence is a time when the brain undergoes many structural and functional changes, so it is likely that the part of the social brain responsible for regulating imitation is still maturing throughout adolescence, which may lead to more pronounced imitative behaviour [3]. In addition, adolescents gain popularity, status and attractiveness through imitation of their idols or among their peers [4]. Therefore, making good use of the prevalent behaviours that social media has created in society has the potential to provide better behavioural interventions for the adolescent population [5], helping to shape better behavioural habits in adolescents, improving the current trend of younger disease and potentially reducing the likelihood of preventable health problems.The aim of this study was to analyse how popular behavioural mimicry among adolescents can be used to promote the activation of their health behaviours. We asked two questions: 1. the extent to which imitation behaviours activate adolescents' health behaviours; 2. measuring the impact of knowledge, skills and beliefs involved in the activation of behavioural imitation on adolescents' health maintenance and disease prevention.A questionnaire was used to enumerate the population groups that have the greatest influence on adolescents as the test sample in this study. 100 participants took part in the questionnaire, including 50 participants from mainland China and 50 participants from Hong Kong, whose mean age was 16 ± 3 years. After administering the questionnaire, 50 of these participants, who were randomly and equally divided into 10 groups of 5 participants each, were surveyed using the Activation Inventory (PAM) to measure the current level of knowledge, skills and beliefs involved in the activation of the adolescent population to maintain health and prevent disease, and then measured again using the PAM 30 and 60 days after the adolescents were exposed to the imitated subjects.The adolescent group itself was not highly aware of healthy behaviours and the effectiveness of positive health behaviour imitation in changing health behaviours and outcomes was somewhat proven when they were exposed to positive health behaviours of imitators for 30 days. However, 60 days after participants were exposed to imitations of healthy behaviours, although the imitations were still effective in maintaining healthy behaviours, the 60-day activation of healthy behaviours produced some decline compared to the first 30 days of outcomes. Therefore, in the future, more research should be conducted on the preferences and needs of adolescent groups to identify the social factors and groups that best trigger imitation among adolescents, and to promote positive health behaviours among adolescents by developing mobile applications that are more in line with adolescents' expectations to trigger trends, create widespread social discussion and be present in their daily conversations.References1.Moira Burke and Robert E. Kraut. 2014. Growing closer on facebook: changes in tie strength through social network site use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Association for Computing Machinery, New York, NY, USA, 4187–4196. https://doi.org/10.1145/2556288.25570942.C. Longobardi, M. Settanni, M.A. Fabris, D. Marengo, Follow or be followed: Exploring the links between Instagram popularity, social media addiction, cyber victimization, and subjective happiness in Italian adolescents, Children and Youth Services Review, Volume 113, 2020, 104955,ISSN 0190-7409, https://doi.org/10.1016/j.childyouth.2020.104955.3.Cook, J., Bird, G. Social attitudes differentially modulate imitation in adolescents and adults. Exp Brain Res 211, 601–612 (2011). https://doi.org/10.1007/s00221-011-2584-4.4.Raviv, A., Bar-Tal, D., Raviv, A. et al. Adolescent idolization of pop singers: Causes, expressions, and reliance. J Youth Adolescence 25, 631–650 (1996). https://doi.org/10.1007/BF01537358.5.Korda H, Itani Z. Harnessing Social Media for Health Promotion and Behavior Change. Health Promotion Practice. 2013;14(1):15-23. https://doi.org/10.1177/1524839911405850.

To the bibliography