The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates a full duplex wireless-powered two way communication networks, where two hybrid access points (HAPs) and a number of amplify and forward relays both operate in full duplex scenario. We use time switching (TS) and static power splitting (SPS) schemes with two way full duplex wireless-powered networks as a benchmark. Then, the new time division duplexing static power splitting...
This paper investigates the consensus control problem of nonlinear multiagent systems under an arbitrary topological structure. A novel Takagi–Sukeno (T–S) fuzzy modeling method is proposed to describe the problem of nonlinear follower agents approaching a time-varying leader, i.e., the error dynamics between the follower agents and the leader, whose dynamics is evolving according to an...
ZigBee network is a restricted wireless sensor network, and it has wide range of extensions. To solve the interconnection problems between ZigBee networks and IP networks, we propose an approach called DTN based Interconnecting ZigBee Network (DIZN), present the architecture and hierarchy communication protocol of DIZN system, study the main functions of the communication process in DIZN modules,...
A novel network layer management protocol for the low-voltage power line communication (PLC) network is proposed, focusing on the dynamic network address assignment mechanism of the PLC network with a multi-master topology. The remarkable feature of the presented protocol is that it enables the equipments to claim, configure and maintain their network addresses autonomously within the PLC network...
In Vehicular Ad-hoc Network (VANET), the multi-hop routing frequently breaks off, which has a negative effect on the reliability and transmission quality of the network. The paper proposes a new routing algorithm based on the geographical position, called Multi-Priority Opportunistic Directional Routing (MPODR). The algorithm improves the existing Opportunistic Directional Forwarding Strategy from...
Long Term Evolution system represents the latest developments in the direction of UMTS standard. Radio Link Control Protocol layer protocol is an important component of LTE, and its data transmission function plays an important role in the LTE R & D. This paper is concerned with a study of the RLC layer protocol framework, state transitions, and AM mode transmission. Mainly realizes AM transmission...
China is vigorously promoting the three nets integration, the related business will increase sharply. This paper places emphasis on discussing the reality of DHCP network access and authentication on the embedded terminal. Firstly, it defines the DHCP demand in mobile embedded terminal based on Linux operating system. Secondly, it discusses how to implement the whole technological process of DHCP...
In this paper, we analyze the framework of Intelligent Analysis System and the important significance of information transmission which based on RMTP to this system; then introduce the fundamental structure and framework of RMTP; at last we realize RMTP by program it to a DLL. The function of this DLL includes basic data transforming, pretreat and classify the accepted data automatically, now we can...
OBS ring networks inherently suffer from the resource contention due to the limited network resources and the one-way reservation. Multiple tokens with the help of control information table (CIT) have been applied to avoid the source and wavelength collision. However, the receiver collision cannot be completely avoided as tokens are processed in a distributed manner. In round-robin (RR) queue selection...
In this paper, we present an approach that uses formal methods to verify clock domain crossing (CDC) issues in a fully automatic way. First, we discuss various CDC schemes and the corresponding checks that need to be formally verified. Then we demonstrate how to synthesize them into assertion logic. After that a fully automatic, on-the-fly formal CDC approach is proposed. To the best of our knowledge,...
Formal description of network behavior is the important part in network management. But some problems have not yet to be adequately addressed are the semantic and behavioral aspects of composition in this domain. Therefore a formal description method was presented to network behavior. The method includes a simple formal language, and its semantic was described by CSP. The formal language has graphical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.