The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Inspired by potential application in power systems and a fully distributed primal-dual method, we investigate how a novel distributed optimization algorithm can be used to solve the dispath response problem in power systems with a distributed manner, whose main target is to minimize the generation cost of the whole network. The problem we study here can be formulated as a kind of optimization problem,...
Nowadays, the Internet of Things is able to provide more advanced services to people, which connects a variety of devices, systems and applications. However, it covers a variety of devices, protocols and applications, which makes it much more complex. In the main application areas, wireless sensor networks with a frequent but short communication character, it requires an efficient and flexible protocol...
Power plant control of the embedded data acquisition system had been developed from centralized control, distributed control into fieldbus control. The paper puts forward a design program combining Modbus communication protocol with 32-bit ARM Coretx-M0 microprocessor as its core. The overall design scheme of the system and the content of Modbus Communication Protocol are introduced while the circuit...
An active RFID tag design based on nRF24L01 is proposed in this paper. This active RFID tag works in 2.4GHz. The requirements for low power consumption and low system complexity of RFID tags have been well considered. The circuit diagram and the communication protocol are fully described in the paper. Particularly, an anti-collision algorithm has been proposed to improve the effectiveness of thecommunication...
Inefficient resource utilization of communication cell and base station is the major limitation of traditional Radio Access Network (RAN), which makes Cloud Radio Access Network (C-RAN) becomes a promising infrastructure. C-RAN data centers face physical constraints in space and power, so the efficient utilization of hardware is more critical. General multi-core processors are universally used in...
Inexpensive “point-and-shoot” camera technology has combined with social network technology to give the general population a motivation to use face recognition technology. Users expect a lot; they want to snap pictures, shoot videos, upload, and have their friends, family and acquaintances more-or-less automatically recognized. Despite the apparent simplicity of the problem, face recognition in this...
Location-Based Service (LBS) has become pervasive, riding along the trend of mobile application proliferation. Given its high utility value, LBS, however, present serious privacy concerns for cautious users. In this paper, we investigate privacy preserving for location-based information survey application, which calculates the geographic distribution of user's information. The design objective is...
In this paper we understand BitTorrent protocol from a Markov approximation perspective. We show that together with the underlying rate control algorithm, the rarest first algorithm and choking algorithm in BitTorrent protocol implicitly solve a cooperative combinatorial network utility maximization problem in a distributed manner. This understanding allows us to access properties of BitTorrent from...
Presently, all of local power enterprises mostly have built video monitoring systems, because there were no standards that can be adopted in initial stages, these systems were running independently and cannot be interconnected, so the need of accessing video information between different areas cannot be met. The first problem of interconnection that need to be solved is to unify call signaling and...
We study the problem of synchronization of two remotely located data sources, which are mis-synchronized due to deletions and insertions. This is an important problem since a small number of synchronization errors can induce a large Hamming distance between the two sources. The goal is to effect synchronization with the rate-efficient use of lossless bidirectional links between the two sources. In...
Range query in DHT based P2P network is a hot topic in recent researches. The hashing function in DHT protocols makes the data hard to keep their original order relationship. Hence range queries for such networks become difficult. This paper presents the design of Yarqs-a new schema to achieve range queries in DHT based P2P networks. By using the inherent characteristics of DHT based networks, Yarqs...
Combining with the characteristic of Web technology and field working requirement, Embedded Web Server (EWS) integrates the information acquisition and diffusion into the field embedded measurement and control equipments by the standard interface and communication protocol. And the EWS in the equipments can provide the browser-based operation and control interface through Internet. Ethernet for Plant...
Modbus protocol is widely used in the industrial control field because of its excellent reliability, flexibility, real-time performance etc. It becomes one of the international actuality industrial standards and including lots of industrial equipments using Modbus as their communication protocol such as PLC, DCS, intelligent instruments etc. Embedded system focus on applications, and it can adapt...
As the Profibus is generally applied in the field of control, its feature of real-time has become more and more important. This paper promotes an improved analyzing method on the single-master Profibus stations. In this method, single-master Profibus DP networks' feature and its protocol are analyzed, and the impact on the messages' real-time and network load of different priority level using different...
Video file synchronization between remote users is an important task in many applications. Re-transmission of a video that has been only slightly modified is expensive, wasteful and avoidable. We propose a scheme that automatically detects and sends only modified content according to some user defined distortion constraint to enable rate savings under a wide range of video edits. Through the use of...
IP address shortage over IPv4 is a big problem now, therefore the more massive deployment of NAT equipments is coming. One of the urgent problems for P2P is that how can each peer behind NAT find others and can establish direct connection to others. This paper discusses a TCP-based traversal model on the foundation of existing traversal methods having been analyzed, designs and presents the details...
With the rapid development of the embedded computer technology, the new generation of industrial automation data acquisition and monitoring system, which takes the high performance of embedded microprocessor as its core, adapts well to the application system. It meets the strict requests of the function, reliability, cost, size and power consumption, etc. In the industrial automation application system,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.