The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
All applications of the wireless sensor network is closely related to the underlying environment in which the sensors are deployed. The topology of the sensor network is great importance for sensor network applications and the implementation of networking function[1]. The recognition of the boundary or the inner hole boundary of the network is the basic of a broad spectrum of algorithms. In the paper...
Virtualization and cloud computing platform brought the new combination of resources integration and use mode. Cloud computing distributes computing tasks to large pools consists of computing resources to make all kinds of application system could acquire services according to need; The Virtualization technology can greatly improve the efficiency and availability of resources and application in cloud...
Because of existence of the interference, WMNs' end-to-end throughput usually is not very ideal. In order to solve this problem, this paper design an topology algorithm which via combining collision domain load and power control to structure network topology and optimize network throughput. The algorithm adjust each node transmission power to a reasonable leve after construct the network topology,...
This paper presents an efficient algorithm for the reconfiguration of a two-dimensional degradable VLSI/WSI array with faulty processing elements (PEs). Unlike previous work, the proposed algorithm does not limit the number the physical rows related to the logical row to be constructed, in order to utilize as many fault-free PEs as possible to compensate faulty ones. Also, the row-exclusion process...
Collision is a familiar problem in an RFID system. How to solve this problem effectively is very important to the whole RFID system. Anti-collision technology is one of the key factors that determine RFID system performance, especially for UHF RFID, multiple object identification depends on anti collision performance, This paper emphatically studies the solution and improvement of anti-collision algorithm...
For WSN, the network node energy is limited, so how to save and even the consumption of the overall energy is an important problem. Clustering is one of the design methods used to manage the network energy consumption efficiently. In this paper, we use genetic simulated annealing algorithm(GSAA) to find an optimal cluster formation and prolong network lifetime. The proposed algorithm takes the nodes...
Based on the workshop production scheduling, single resource scheduling is formerly researched, but actually multi-resources scheduling is often applied. Aiming at the workshop production resource scheduling, a maxed genetic algorithm to solve the problem of the single resource dynamic Job-Shop scheduling is used and implement workshop multi-resource dynamic Job-Shop scheduling. The Job-Shop multi-resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.