The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active Distribution Network (ADN) implements the operation and consumption of distributed energy resources (DERs), especially in the use of renewable ones, by hierarchical and distributed coordination control mode. Plenty of advanced communication and control technologies must be integrated in ADN. In this paper, a new method of co-simulation for ADN is proposed based on Ptolemy II and Simulink. In...
This paper addresses a perimeter patrol problem involving control of unmanned air vehicles. Around the perimeter of a protected area are placed a number of unmanned ground stations. These stations send alert signals which are investigated by the unmanned air vehicles. We present an approach to optimization of vehicle tasking based on max-plus probabilistic models and computational schemes.
Network connectivity, as a fundamental issue in a wireless sensor network(WSN), has been receiving considerable attention during the past decade. Most works focused on how to maintain full connectivity while conserving network resources. However, full connectivity is actually a sufficient but not necessary condition for many WSNs to communicate and function successfully. In addition, full connectivity...
For a wireless sensor network (WSN) to operate successfully in an application of detecting a mobile intruder, the sensor's sensing of the intruder and the communication between the tasking sensor(s) and the base station should be jointly considered for effective intrusion detection. Most related work either treats the two tasks separately or considers both tasks for general-purpose WSN applications...
Different from existing works that address the sensing coverage and connectivity for general-purpose Wireless Sensor Network (WSN) applications or treat the sensing coverage and connectivity separately, this work investigates the K-sensing detection problem of a WSN in detecting a mobile intruder by integrating the sensing coverage and connectivity. To be specific, the intruder has to be sensed by...
An improved PSO algorithm which is applied to mobile robot path planning is proposed. In this paper, we use the grid method to decompose two-dimensional space of the robot path to build the path space model. Using this method is simple and easy to achieve computer modeling, storing, processing, updating and analyzing. It can make the pairs of particles in the algorithm exchange information by leading...
In the scheme of Pawlak rough derivatives theory, functional features of roughly derived functions and higher order roughly derived functions are directed in rough function model. The valuing laws of first order and higher order roughly derived functions are given in form of a rough derivatives table. According to the difference principle of numerical analysis theory, the higher order rough derivative...
We consider a mutable distributed storage system that protects data using systematic linear k-of-n codes. Such a system may get into a partial updated state if some failures occur, and may become unrecoverable even though there are k+ living bricks (for they may be inconsistent with each other). General recovery mechanisms judge whether the system is recoverable according to the maximum number of...
Replication plays an important role in fault tolerant field which can improve the availability of distributed systems. After analyzing two shortcomings of the passive replication approach, which are update backup state frequently and slow recovery after the primary fault, this paper proposes a non-blocking consistent model, NBPRC. NBPRC satisfies the correctness criteria of passive replication that...
Partial Inferior turbinectomy is typically performed for patients suffering from chronic nasal obstruction due to hypertrophy of inferior turbinates and are refractory to other more conservative treatments In this paper, the effects of the various manner of incision performed on the inferior turbinates in terms of the resulting nasal air flow pattern were analyzed using computational fluid dynamics...
In a continuous-valued information system, attribute values of objects represent not only the relative distances, but also the ordinal relation of objects. By considering the relative distances of objects, some discretization approaches and other approaches were proposed in previous literature, to discuss the attribute reduces of the system. This paper considers ordinal relations of objects, and utilizes...
The purpose of this article is to analyze the effects of septal deviation on the aerodynamic flow pattern compared with a normal nose by computational fluid dynamics (CFD) tools. The software MIMICS 12.0 was used to perform the image segmentation and meshed model generation from CT scans. Thereafter high resolution 3D volume meshes comprising boundary layer effect and computational domain exterior...
The incompleteness and insufficiency in the investigation of rough continuity in Pawlak rough function model are pointed out. Proposing the e-d definition of rough continuity of a discrete function, the concept of Pawlak rough continuity is deduced in the form of a proposition. A series of operating properties of roughly continuous functions are discussed such as maximization, minimization, complementarity,...
In distributed systems that use active replication to achieve robustness, it is important to efficiently enforce consistency among replicas. The nonblocking mode helps to speed up system execution. Unfortunately, this benefit comes at the expense of introducing decision conflicts when the replicas form a single logical token ring and client requests are processed in sequence following the ring. In...
Video content summarization provides an effective way to accelerating video browsing and retrieval. In this paper, we propose a novel approach to automatically generate the video summary. Firstly, the video structure is analyzed by spatio-temporal analysis. Then, we detect video non-trivial repeating patterns to remove the visual-content redundancy among video stream. Moreover, an importance evaluation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.