The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Corrective transmission switching can improve the flexibility of power system. To avoid the computational complexity, a data mining approach for real-time corrective switching is proposed in this paper. A factorized expression that measures the approximate switching effects is first derived. The expression can be utilized to generate candidate transmission switching lists. Based on the factorized...
This paper proposes a novel anomaly detection method of network worms. The algorithm detects unknown worms by multidimensional worm abnormal detection technology, extracts its feature string via analyzing worm data with leap-style and creates new rules to detect the corresponding worm in case that the unknown worm attacks again. The paper has realized the automatic detection of unknown worms. Experiment...
In this paper we study the characterization of asymptotic stability for discrete-time switched linear systems. We first translate the system dynamics into a symbolic setting under the framework of symbolic topology. Then by using the ergodic measure theory, a lower bound estimate of Hausdorff dimension of the set of asymptotically stable sequences is obtained. We show that the Hausdorff dimension...
This paper presents a systematic approach to generate 2-phase switched capacitor DC-DC step-up converters with a given integer conversion ratio. The present method has a deterministic complexity and does not require any search. The generated charge pumps make use of theoretical minimum number of capacitors to achieve conversion ratios from 2 to 29, and almost theoretical minimum number of capacitors...
In this paper, we study the problem of distributed containment control of a group of mobile autonomous agents with multiple stationary or dynamic leaders under fixed and switching directed network topologies. In the case of stationary leaders, we show necessary and sufficient conditions on the network topology such that all followers will ultimately converge to the stationary convex hull formed by...
In this paper, we discuss the coordination of a group of autonomous agents with input saturation and time-varying interconnection. The state agreement of the whole agent group is discussed with bang-bang control protocols and switching interaction topologies described by joint connectivity on the time interval (t;??) for any time t. The convergence analysis for the considered system is carried out...
In this paper, we consider the coordinated motion of multiple dynamic agents via nearest neighbor rules based on fixed and switching topologies, respectively. We design the control law which consists of two parts: a potential field force that makes the agents attract to each other and at the same time avoid collision in the group, and an alignment force that makes all dynamic agents' headings and...
Data switch structure is necessary to support data transfers in network on chip (NoC). Most of designs can only support one-direction data transfer, and the potential concurrency is omitted. Concurrent multi-direction data switch structure (CMDSS) that proposed before can offer several concurrent transfers. In this paper, graph theory is used to help designing the structures, and the method is called...
We propose an efficient way of constructing the wireless mesh structure associated with molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted weakly connected dominating set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation...
We propose a novel view on efficient packet forwarding in wireless mesh networks based on a molecular analogy in which mesh routers are either nuclei or electrons in an atom that corresponds to a 802.11 cell. In this view, a mesh network appears as a collection of spatially distributed 802.11 cells operating on different channels. We define molecular MAC that uses dynamic channel switching at neighbor...
DHT-based P2P networks have a problem of topology mismatch which causes high latency for message routing. This paper focuses on improving the latency of routing process for chord, which is a typical DHT-based P2P network protocol. We propose a simple method to build a chord network based on the proximity of nodes in the underlying physical network. The idea of our method is the combination of two...
The cascade multilevel inverter output performance such as equivalent switch frequency, the number of output level and distribution of harmonic is relationship with carrier-shifted angle. So research on the relationship of cascade multilevel inverter with carrier-shifted mode will contribute to optimization design and improve its performance. Based on this, two different carrier-shifted modes of 1800/N...
Multicast applications such as real-time streaming and video/teleconferencing tolerate delay and packet loss poorly. As a consequence, multicast routing and forwarding should offer flexibility and resiliency for them. In this paper, we introduce fast reroute methods for LIPSIN, a novel Bloom filter based multicast forwarding fabric. We propose two different algorithms, both capable of rerouting traffic...
Ethernet ring protection (ERP) introduced by ITU-T G.8032 Recommendation is a new class of packet switched network protection technology that can provides ring automatic protection switch for nested multiple Ethernet rings. An ERP system is required to provide network protection against link and node failures within 50 ms. Whenever the protection scheme switches the ring to have a new topology, the...
Based on the generic addresses forwarding table (AFT), a physical topology discovery algorithm, which is adaptable to multi-subnet network with shared segment and dump switch, is defined and the correctness is proved. The algorithm solves the problem that a complete AFT uniquely determines the physical topology for multi-subnet network, can discover the physical connections between switch and switch...
In this paper we have considered the channel assignment problem in multi-channel multi-radio wireless mesh networks. The problem is to assign channels to links in the network with the original topology preservation, and aim at minimizing the overall network interference which is proved to be NP-hard. We have first illustrated that the conversion from the channel assignment problem to the max k-cut...
This paper presents a method for characterizing the average error voltage in the zero-crossing region of the inductor current during the dead time. The analysis makes use of an existing analytical solution to model the reverse recovery of the power diodes in this region. The proposed analytical solution is verified by experimental results.
InfiniBand networks are aimed to fulfill increasing communication demand of parallel applications in high performance clusters. However, the dynamic behavior of communication load may cause bottlenecked link(s) which lead to message congestion. Congestion spreading increases latency and reduces network throughput causing important performance degradation. In this paper, we propose a congestion control...
Distributed system emulators provide a paramount platform for testing of network protocols and distributed applications in clusters and networks of workstations. However, to allow testers to benefit from these systems, it is necessary an efficient and automatic mapping of hundreds, or even thousands, of virtual nodes to physical hosts-and the mapping of the virtual links between guests to physical...
A novel hybrid three-phase multilevel converter is proposed for medium-voltage applications. The converter employs a conventional three-phase voltage source inverter (VSI) linking series connected half-bridge modules at each phase. With the proposed connection, a large portion of energy can be processed by the VSI without the need for insulation or by employing a single transformer, while smaller...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.