The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Inspired by potential application in power systems and a fully distributed primal-dual method, we investigate how a novel distributed optimization algorithm can be used to solve the dispath response problem in power systems with a distributed manner, whose main target is to minimize the generation cost of the whole network. The problem we study here can be formulated as a kind of optimization problem,...
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
We present a new distributed} model of probabilistically checkable proofs (PCP). A satisfying assignment x ∊ \{0,1\}^n to a CNF formula \phi is shared between two parties, where Alice knows x_1, \dots, x_{n/2, Bob knows x_{n/2+1},\dots,x_n, and both parties know \phi. The goal is to have Alice and Bob jointly write a PCP that x satisfies \phi, while exchanging little or no information....
A distributed network can have faulty links and nodes. In such a case, reaching a decision amongst themselves become extremely difficult. The current work describes an effective solution for reaching an agreement in a distributed system in the presence of such faults. Furthermore, a partitioning method is used to reduce the overhead of exchanging messages.
Pathfinding algorithms are at the heart of several classes of applications, such as network appliances (routing), GPS navigation and autonomous cars, which are related to recent trends in Artificial Intelligence and Internet of Things (IoT). Moreover, advances in semiconductor miniaturization technologies have enabled the design of efficient Systems-on-Chip (SoC) devices, with demanding performance...
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
Mobile e-health is one of the Internet of Things application that assists the healthcare organization in providing better healthcare services. Development of wireless sensor networking area has greatly increased the feasibility of a mobile e-health system since it provides wireless communication technology with promising sensor network applications. However, mobile e-health is subjected to a lot of...
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
In this paper, we consider the privacy preserving problem in an agreement network under interception attacks. First, we introduce a consensus protocol with privacy preserving, where each node hides their initial states into a set of random sequences, and then injects the sequences into the process of consensus. Second, we assume that an attacker with limited power can intercept the data transmitted...
Formation-containment tracking problems for high-order linear multi-agent system on directed graphs are studied, where the multi-agent system is composed of a virtual leader, several real leaders and followers. The real leaders need to not only accomplish a predefined time-varying formation but also track the expected trajectory generated by the virtual leader, while the followers are required to...
Finite-time consensus of heterogeneous multi-agent system (MAS) with external disturbances is investigated in this paper. Distributed control algorithm is designed for the agents described by leaderless MAS. It can be shown that the state errors of any two agents reach a region in finite time with external disturbances by using Lyapunov stability analysis and algebraic graph theory. At last, one example...
This paper constructs a novel consensus framework for continuous-time multi-agent systems by using motion planning approaches. In this framework, a novel notion, specifiedtime consensus, is raised. Specified-time consensus means that the consensus of multi-agent systems is achieving with a finite settling time, which can be accurately and arbitrarily pre-specified according to task requirements. In...
In this paper the authors present the results of research to develop the visual system for autonomous flying agent. The core elements of the vision system which were designed and implemented in the earlier stage of the project are brought together. The second aim is to show capabilities of a simulation environment designed and developed by the authors in order to enable testing of the vision systems...
The Development of technological system have grown up rapidly including how to vote. In general, people are accustomed to vote by using ballot paper. In Indonesia, this way is considered ineffective both in terms of cost, time, and governance. Due to this, the creation of an electronic voting system or known as e-voting based on android for the voting system implemented can be performed more easily...
Current networks are changing very fast. Network administrators need more flexible and powerful tools to be able to support new protocols or services very fast. The P4 language provides new level of abstraction for flexible packet processing. Therefore, we have designed new architecture for memory efficient mapping of P4 match/action tables to FPGA. The architecture is based on DCFL algorithm and...
This paper revisits the failure1 temporal independence hypothesis which is omnipresent in the analysis of resilience methods for HPC. We explain why a previous approach is incorrect, and we propose a new method to detect failure cascades, i.e., series of non-independent consecutive failures. We use this new method to assess whether public archive failure logs contain failure cascades. Then we design...
The advances made in the field of IoT in recent years implore us to take a closer look at the security challenges it presents. Due to its ubiquitous nature and high heterogeneity of the connected devices and communication protocols a novel approach must be taken. This papers aim is to make a brief review of the work done in the areas of Negative Selection and Danger Theory and to do a comparative...
Performance parameters are pretty important as well as clustering and routing algorithm in order for conditioning network lifetime in Wireless Sensor Network (WSN). The parameters like number of nodes, network area and radius of node coverage affects network lifetime directly. In this study the radius of node coverage's effect on network lifetime was checked out on various number of nodes. In the...
In a passive radio-frequency identification (RFID) system the reader communicates with the tags using the EPC Global UHF Class 1 Generation 2 protocol with dynamic frameslotted ALOHA. Due to the unique challenges presented by a low-power, random link, the channel efficiency of even the most modern passive RFID system is less than 40%. Hence, a variety of methods have been proposed to estimate the...
Automatic tools based on symbolic models have been successful in analyzing security protocols. Such tools are particularly adapted for trace properties (e.g. secrecy or authentication), while they often fail to analyse equivalence properties.Equivalence properties can express a variety of security properties, including in particular privacy properties (vote privacy, anonymity, untraceability). Several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.