The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers the optimal linear quadratic control problem for network control systems(NCSs) with packet dropout and input delay. The optimal output feedback controller is derived for the first time which minimized the cost function. The separation principle, which often fails when the systems is with multiplicative noise, is proved to be established.
Management of overflows caused by stochastic traffic arrivals is one of most important consideration for traffic signal control of isolated intersection because overflows of one cycle can results in not only extra delay in following cycles but also blocking of upstream intersections. Although the stochastic arrivals problem has been studied either by simulation based methods or analytical models,...
Wireless networks are required to guarantee the Quality of Service (QoS), including throughput, fairness, delay, etc. IEEE802.11 MAC protocol employs a typical backoff mechanism, Binary Exponential Backoff (BEB) algorithm, to avoid collisions when multiple users try to access the shared wireless channel. Many works on QoS guaranteeing point out that the BEB algorithm introduces the unfairness and...
With the wireless technologies being widely used, it is for sure that all types of wireless networking will become more and more popular now and in the near future. Therefore, measurement-based performance evaluation of different wireless network standards and traffics is becoming very important. In this research paper, the wireless local area network performance differences between IEEE 802.11n and...
Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise...
Advanced motion vector prediction (AMVP) is one of the most important inter prediction coding tools adopted in the state-of-the-art HEVC coding standard, which does great effect on the coding efficiency. However, the current AMVP design is highly sequential and thus restricts the throughput both on the encoder and the decoder sides. To facilitate the parallel processing and enlarge the throughput,...
Smart Home works at the customer domain of the Smart Grid. It aims to provide an interactive environment in which direct communication with end-users can be easily done. Home Area Network adopts Low-Rate Wireless Personal Area Networks (LR-WPANs) to realize the automatic control of lighting system, safety system, smart appliances, smart devices, etc. This paper discusses the architecture of Home Automation,...
In wireless sensor networks(WSNs) code dissemination is an important technology to remotely add new functionality or fix bugs after the sensors are deployed. As WSNs is usually in hostile environments, secure code dissemination has been a major concern. Most code dissemination protocols are Deluge-based which have to take much energy and memory to deal with the problem caused by out-of-order-delivery...
Nowadays, with increase in ageing population, Health care market keeps growing. There is a need for monitoring of Health issues. Body Area Network consists of wireless sensors attached on or inside human body for monitoring vital Health related problems e.g, Electro Cardiogram (ECG), ElectroEncephalogram (EEG), ElectronyStagmography(ENG) etc. Data is recorded by sensors and is sent towards Health...
IEEE 802.15.4 standard is designed for low power and low data rate applications with high reliability. It operates in beacon enable and non-beacon enable modes. In this work, we analyze delay, throughput, load, and end-to-end delay of non-beacon enable mode. Analysis of these parameters are performed at varying data rates. Evaluation of non beacon enabled mode is done in a 10 node network. We limit...
Deadzone and backlash are two common non-linearities in physical systems. This paper presents a novel approach to compensate for the effects generated by deadzone and saturation, or backlash and saturation, acting in series on a system's input. It takes advantage of the idea of inverting the deadzone or backlash to cancel its effects. It is shown that the final setting corresponds to that of a saturation...
IEEE 802.15.4 has poor performances in multi-hop network for the hidden terminal problem (HTP). This paper proposes a simple and effective mechanism to reduce the HTP in nonbeacon-enabled multi-hop network. Using the idea of RTS/CTS in IEEE 802.11 for reference, we propose adaptive adoption of RTS/CTS (a-RtsCts-CSMA/CA) depending on the collision result of transmissions and measure its performances...
Disaster situations are a challenge for network operators because they result in an extraordinary large number of calls being opened simultaneously compared to normal operating conditions. The Quality of Service (QoS) and Quality of Experience (QoE) for the end user can be widely affected by peak loads and result in severe degradation, basically due to congestion on bottlenecks inside the network...
To ensure the optimal use of spectrum, when the primary user or spectrum quality deterioration occurs, the secondary users need to change the spectrum, which is called as the spectrum mobility. The new handoff is called as the spectrum handoff. Among the key technologies in Cognitive Radio Networks, spectrum handoff has received extensive concern from both academia and industry. Switching request...
Push-to-Talk over Cellular (PoC) system in mobile communication network, such as TD-SCDMA, is considered to have more wide coverage and more flexibility than traditional trunk communication systems. It is ideal for group communication in many cooperative work environments. But the foremost block for wider application of PoC system is the longer session setup latency comparing to other trunk communication...
By analyzing the signal lings exchange of SIP deeply, GSPN model of protocol is established for evaluating the performance of protocol, reducing call setup time of SIP and obtaining a tradeoff between the performance and the number of buffer. Basing on the model, markov chain of model is designed. Based on properties of constructed markov chain, performance of SIP is studied and evaluated through...
In many sensor network applications the major traffic pattern consists of data collected from many source nodes to a sink through a tree. In this paper, we propose S-Non Bcn based on nonbeacon-enabled (Non Bcn) mode of IEEE 802.15.4, an energy-efficient and low-collision MAC that is designed and optimized for such data gathering trees in wireless sensor networks. S-Non Bcn uses staggered sleep mechanism...
Push-to-Talk over Cellular (PoC) system is ideal for group communication in many cooperative work environments because of its wider coverage and more flexibility than traditional trunk communication systems. The long session-setup-delay is an important problem that must be solved before the commercial application of PoC system. Many research works have been done to solve it in some mobile networks,...
Traditional G-P algorithm exist two drawbacks in solving the correlation dimension of chaotic time series. The one is the subjective existence to determine scaleless range, the other is calculation error is large when the amount of data is small. For two shortcomings, the fuzzy C-means clustering is introduced to the G-P algorithm to determine the no-scales range. Least-squares fitting method is used...
This study investigates a Wi-Fi-based Wireless Networked Control System. This system is first modified in order to enhance resistance to interference. Then, it is subjected to different types of interference. The system consists of a workcell containing 30 sensors, 30 actuators and 1 controller. All forms of interference modeled focus on the operating frequency band used by the control nodes. All...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.