The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the problem of fault-tolerant tracking control for a class of leader-follower multi-agent systems with actuator loss of effectiveness and addictive faults. The communication graph among followers is undirected, yet the communication between leader and follower is directed. A fully distributed adaptive fault-tolerant consensus protocol is proposed, under which the consensus...
In the process of making radio programs, Radio stations need to get a IoT of audio material, which are usually stored on the FTP server. The traditional radio program production station will download each audio, and do not consider the server's and the local environment, using a single-threaded download, which results in poor user experience. This paper designs an efficient download mechanism, which...
In this paper, a new perspective of congestion is presented to promote the development of traffic video analysis. Our main contributions are threefold: a) An unified and quantifiable definition of congestion is proposed to describe the traffic state in video. b) Based on the definition, a congestion dataset which contains multiple traffic scenes is constructed as a platform for the research community...
This paper investigates the containment control problem for multi-agent systems with nonlinear dynamics under directed graph. Leaders' control inputs are unknown to any of the follower. A distributed adaptive protocol with a finite time unknown input observer is proposed to ensure that the states of the followers asymptotically converge to a convex hull spanned by the dynamic leaders. Compared with...
Wireless networks have become a very attractive solution for soft real-time data transport in the industry. For such technologies to carry real-time traffic, reliable bounds on end-to-end communication delays have to be ascertained to warrant a proper system behavior. As for legacy wired embedded and real-time networks, two main wireless multiple access methods can be leveraged: (i) time division...
In opportunistic networks, messages are delivered based on a store-forward-carry paradigm. Network topology varies with time and dynamism of the links between nodes has a primary effect on the message delay, one of the network performance indicators. To get a precise estimation of the network latency with less complexity, a rigorous framework modeling the information propagation process is developed...
The inherent structure of applications defined with hypertext markup languages is that of a graph. Push-enabled protocols like HTTP/2 drive the need for solutions allowing the server to traverse this graph and preemptively push related resources to the client. In addition to this, user interface adaptation to various mobile devices belongs to the server's tasks. Taking into account the diversities...
Future 5G networks have stringent end-user requirements on data rate and error performance. In order to satisfy these requirements, innovative wireless networking technologies and models need be researched. One particular example is the two-way relaying channel, which can have as much as 100% higher theoretical data rate than current systems where transmissions are arranged in an orthogonal manner...
Service discovery in vehicular networks has been extensively investigated in literature. Collecting and disseminating data in high mobility networks in a reliable and efficient way without exhausting network bandwidth is still challenging, due to unreliable channel access in broadcast scenarios and thus results in loss of time through resending packets. Sending delta information to reduce network...
This paper proposes a distributed relay selection and successive relaying scheme for Wireless Sensor Networks (WSN) with directional antennas. Since the working life of WSN is usually affected by the battery life of its nodes, the reduction of the nodes' working time without the sacrifice of communication quality is of significant interest. The proposed scheme makes explore the potential of the large...
Modern consumer electronic devices can easily integrate into distributed computing environments. By applying network-based user interface systems to control these devices, innovative applications become feasible. However, several requirements like high responsiveness and low bandwidth consumption need be satisfied. Particularly, to be applicable in wireless and mobile local and wide area networks,...
Group key agreement based on elliptic curve at ad hoc networks is studied. In order to meet the demand of efficiency and security, an improved key exchange scheme based on elliptic curve is proposed in this paper. In the scheme, elliptic curve cryptosystem and digital signature algorithm in elliptic curve field are combined to make a group key. The key is agreed on within all members who would participate...
This paper proposed a new idea that applying Identity-based cryptography mechanism to the wireless mesh network for it's security features and defects, IBS-EAP access authentication protocol and IBS-RP roaming authentication protocol are designed with objective of rapid access and avoiding multiple certification. The security and efficiency of the new protocols is analysed. With the ID-based signature...
As the Internet continues to grow; it becomes more and more apparent that the network is playing a more and more vital role. The traditional network managements just monitor the network movements and the network devices. But the network servers occupy to the core status in the network. Aiming at the network server monitor and management, we proposed a server monitor solution which is based on the...
A new, deadlock-free, fully adaptive routing algorithm is proposed for worm hole-switched 3-dimensional tori with only two virtual channels. The deadlock avoidance technique is presented based on a new virtual network partitioning scheme. Unlike the previous virtual network partitioning schemes, the new method allows all virtual networks to share some common virtual channels. A new virtual channel...
A new deadlock-free fully adaptive routing algorithm is proposed for 2-dimensional tori with only two virtual channels. The deadlock avoidance technique is presented based on a new virtual network partitioning scheme. Unlike the previous virtual network partitioning schemes, the new method allows all virtual networks to share some common virtual channels. Two virtual channels should be the lower bound...
This paper presents the design, implementation and evaluation of a solution for dynamic redirection of traffic flows for multihomed mobile networks. The solution was developed for a mobile user that disposes of a Personal Area Network (PAN) with a Personal Mobile Router (PMR), in order to achieve Always Best Connected (ABC) service by distributing flows belonging to different applications among the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.