The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a new guidance problem with the impact time constraint for cooperative attack of multiple missiles is investigated, which can be applied to salvo attack of anti-ship missiles. It can be used to guide multiple missiles to hit a stationary target simultaneously at a desirable impact time. The considered impact time control problem can be transformed into a range tracking problem. Then...
In this paper, we mainly study finite-time input-to-state-stability (finite-time ISS) for the multi-agent systems with communication noise under switching interaction topologies, using the method of ISS, finite-time finite-time ISS-Lyapunov function.
Peer-to-Peer (P2P) technology has been successfully used in various applications in the last few years. However it is also regarded as being disruptive for traditional fixed and mobile operators because of the large bandwidth consumption and disordered data exchange. To solve the P2P issues for operators, we utilize the important feature, data exchange, in P2P application to design a novel P2P-multicast...
IEEE1588 is a Precise Time Protocol (PTP), which is of potentially wide application in control and measurement networks. Stamping PTP messages accurately in physical layer taking advantage of hardware circuits, it is one of important key technologies to achieve the object of high precision time synchronization of IEEE1588. This paper analyzes the content of IEEE1588 standard in detail, and proposes...
With the development of digital substation, the devices of the substation put forward higher demands on clock synchronization. The standard of the IEEE1588 provides a protocol that enables precise synchronization of clocks in measurement and control systems, and the precision of its network is sub-microsecond level which can satisfy the need of clock synchronization of the substation. This paper makes...
Protecting sensitive information systems from security threats such as unauthorized access, information eavesdropping and information interfering, is significant. Most of the natural approaches employ strong authentication or cryptography systems to protect critical data. But those approaches do not stress on the potential amount of risks associated with sensitive information, especially the vulnerability...
In this paper, we propose a MAC layer multicast protocol for 802.11n WLAN for the first time. In IEEE 802.11n, new feature at MAC layer, such as frame aggregation and more flexible link adaptation are defined to increase the effective throughput. Recently, several multicast protocols at MAC layer have been proposed for WLAN. However, these protocols don't consider the new features defined in 802.11n,...
In IEEE 802.11, multicast protocol is based on the basic access procedure of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). This protocol does not provide any recovery mechanism for multicast frames. As a result, transmitted multicast frames may be lost due to collisions or errors. Recently, several reliable multicast protocols at MAC layer have been proposed for 802.11. They can...
In this paper, we consider finite-time tracking problems of a moving target by multiple mobile agents. The mobile agents with global sensing areas and limited actuation region are designed to track down a target with estimation error with the help of formation and coverage. In order to capture the target, its location and velocity are first estimated. With observer-based estimation and formation control,...
Wireless sensor networks have been widely used in many important areas. Medium access control (MAC) protocols have a significant effect on the function and performance of sensor networks. Though the TDMA-based MAC protocols are inherently collision free and can rule out idle listening since nodes know when to transmit, it is difficult to change the frame size and time slot assignment due to network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.