The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Present research work propose the design of a low energy and high throughput, hierarchical clustering based routing protocol for smart home sensor network application. Proposed protocol perform dynamic cluster head selection based on multiple node characteristics like node residual energy, node distance from sink and node average distance from neighbour nodes. Cluster head distribution is even and...
In this paper, we propose a positioning system using a time-synchronized wireless network that can achieve high positioning accuracy without being dependent on any global positioning system (GPS) devices with cm-level accuracy as the main goal and objective. The proposed system utilizes time of arrival (ToA) method to estimate the target's position. Based on the results, we can achieve time synchronization...
Communication data in the communication network of the islanded micro-grid can be disturbed by many methods, such as data attack or packet loss. In order to overtake the communication data disturbance (CDD), a new hierarchical control structure is proposed in the paper. Based on the concept of cyber physical system (CPS), the control structure is divided into two layers: cyber layer and physical layer...
The high number of cells employed in a Modular Multilevel Converter represents a challenge for the control hardware. Some authors have proposed the use of digital communications to simplify the assemblage and maintenance in such converters, but the latency they add has undesirable consequences for the closed-loop performance. In this paper, we propose a model-based compensation of the latency that...
Cooperative containment problem is presented in this paper for discrete-time multi-agent systems with different dynamics subject to structural uncertainties. The topologies of the agents could be assumed that one leader contains a directed path to all the follower agents. The paper obtains some novel and challenging results on cooperative containment control problem of discrete-time multi-agent systems:...
This paper studies the networked estimation of the state of a linear dynamical system. The focus is on developing a distributed estimation algorithm which could achieve the same performance as the centralized ones. A communication protocol which formally describes the network topology is introduced. By performing this protocol, the sum of the information vector contributions is computed, which is...
We consider the scheduling problem for Aggregated ConvergeCast in wireless sensor networks with a physical interference model. Previous work consists of either heuristics without performance guarantees, or approximation algorithms which do not perform well in practice. We propose here a first scalable mathematical SINR (Signal to Interference plus Noise Ratio) model that outputs an optimal Aggregated...
The importance of static output feedback (OPFB) design for aircraft control, process control, and elsewhere has been well documented since the 1960s, since full state measurements are not usually available in practical systems. This problem is compounded in the case of multi-agent systems (MASs) where each agent has its own state variable and measured outputs. Therefore, this paper will focus on OPFB...
Energy efficiency has been a growing requirement in the latest development of wireless communication systems, and it has led to research on off-grid relay nodes with simultaneous wireless information and power transfer (SWIPT) capabilities. Two SWIPT protocols have been developed in the past, named power splitting and time switching. Both protocols have been theoretically proven to improve energy-constrained...
The paper considers a group of systems (agents), each of which described by a model consisting from a linear part and a static nonlinearity, satisfying special quadratic constraints, connected by a feedback. All systems operate in the repetitive mode with a constant pass length, and with resetting to the initial state after each pass is complete. Data connections among the systems are defined by a...
Consensus control problem for a group of agents in a multi-agent networked system is considered. The agents are modeled by linear dynamical systems and the interconnection topology of agent's network is represented as a directed weighted graph. A decentralized approach to the synthesis of consensus control is proposed, including a synthesis of the local stabilizing controllers for each agent of networked...
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology...
The approach to the integration of applications based on mathematical logic and artificial intelligence for World Data Center (WDC) interdisciplinary scientific investigations has been developed in the article. Key elements of the approach are a multilevel system architecture, a formal logical system, implementation based on the interaction of intelligent agents. The formal logical system has been...
This study investigates the opportunities for transmission power control (TPC) protocols in resource constrained wireless sensor networks (WSNs). The paper begins by creating a generalised model to describe the relationship between transmission power, communication reliability and energy consumption. Applying this model to the performance of state-of-the-art radio hardware, the maximum potential energy...
Failing to make use of multi-path advantages in data center networks (DCNs) has confined accessible resources and increased the possibility of congestion. In this paper, we have presented a new algorithm for traffic engineering (TE) in a modular mode. In the proposed algorithm, the less loaded paths for conduction of current are selected with regard to the present conditions as soon as a current is...
In automotive industry the role of electronic system becomes phenomenal. The complexity of the system increases to a larger extend now a days, and hence the diagnostics is also very much essential. The diagnostics can be mainly done in sensors/actuators, processors and on communication medium. Here, we have presented a fault detection system using fuzzy logic for the CAN (Controller Area Network)...
This paper aims at carrying out a parameters sensitivity analysis on a charge transport model using an approach based on the Sobol's method when data at different temperatures, different applied electric fields and different charging times are available. The Sobol's approach applied herein is used to study how the variation of the current density and charges density can be quantitatively apportioned...
Relay communication network is a technique to obtain spatial diversity by using one or more relay terminals in order to improve the transmission performance. Amplifty-and-forward (AF) and decode-and-forward (DF) are two kinds of fixed relaying protocols and widely researched now. In this paper the performance of AF and DF in terms of the outage probability and the symbol error rate (SER) is analysed...
Modern security protocols may involve humans in order to compare or copy short strings between different devices. Multi-factor authentication protocols, such as Google 2-factor or 3D-secure are typical examples of such protocols. However, such short strings may be subject to brute force attacks. In this paper we propose a symbolic model which includes attacker capabilities for both guessing short...
In symbolic verification of security protocols, process equivalences have recently been used extensively to model strong secrecy, anonymity and unlinkability properties. However, tool support for automated analysis of equivalence properties is limited compared to trace properties, e.g., modeling authentication and weak notions of secrecy. In this paper, we present a novel procedure for verifying equivalences...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.