The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Barrier coverage with wireless sensors aims at detecting intruders who attempt to cross a specific area, where wireless sensors are distributed remotely at random. This paper considers limited-power sensors with adjustable ranges deployed along a linear domain to form a barrier to detect intruding incidents. We introduce three objectives to minimize: 1) total power consumption while satisfying full...
For a wirelessly-connected multi-robot system operating in a realistic environment, the wireless communication condition among mobile robots is generally unstable and fluctuating due to the signal loss, attenuation, multi-path fading and shadowing. This paper presents a decentralized control strategy, using the technique of reinforcement learning artificial neural network, to learn and approach a...
This paper introduces a decentralized control scheme for deploying multiple mobile robots into an unknown realistic environment with the fluctuating signal propagation condition to establish and maintain desired wireless communication connections. A fuzzy neural network controller is designed for each robot, trained by the backpropagation algorithm, and applied to decide the motion for each robot,...
Transformer-based inductively coupled near-field wireless links have been extensively studied in the past three decades as a means of transferring power to implanted biomedical devices. Even with deliberative optimizations, the reported maximum transferred power is limited to 275 mW over 1-cm[1]. In this paper, a novel wireless power transfer link is described that uses a rotating magnet to transfer...
Analysis model for routing protocols for wireless ad hoc networks is significant helpful, since it can be employed to investigate to highlight the most considerable ingredient, enlighten the heuristic approach, provide landmark for performance evaluations, and so forth. A fundamental issue in multicast over an ad hoc network is that what is the optimal multicast throughput in such an environment and...
Multicast routing paths in ODMRP form a multiple tree in fact and different process of multiple tree construction will result in significant different performance in terms of packet delivery ratio, forwarding efficiency, end-to-end delay, and so forth. In this paper, we outline the model and investigate the process of multiple construction in ODMRP and propose two multiple tree construction process,...
The orthogonal frequency division multiple access (OFDMA) is widely used for its characteristics of high data transmission rate and the flexibility of bandwidth allocation. In this paper, an equivalent SISO model for the MIMO STBC system was presented, and a Multi-user multirate adaptive sub-carrier allocation scheme was proposed also. We apply the algorithm to the OFDMA. The simulations results show...
Due to high mobility, highly dynamic topology and unreliable communication medium of Mobile Ad Hoc Networks (MANETs), nodes mobility must be taken into account in design of a service discovery protocol for such environment. A novel approach, Mobility-aware Attenuated Bloom Filters (maBF), to perform effective and efficient service discovery in MANETs is proposed in this paper. In order to guarantee...
Most security issues of wireless network are focused on preventing attacks from the outsiders or wireless users. However, these authorized wireless users have no right to take part in the drawing up security policy of an organization. Besides, the larger network scales the more difficulty to be maintained. Patching and managing the mass of computer vulnerabilities are a timely but critical issue....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.