The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates a consensus problem of the fractional version of second-order system with communication delay under both directed and undirected topologies. By applying the frequency domain method, a sufficient condition is given to ensure the fractional version of second-order consensus facing communication delays. It is proof that fractional version of second-order consensus can be reached...
In this paper, a new distributed control protocol based on the delayed state and delayed-state-fractional-order-derivative(DSFOD) is introduced into the existing delayed consensus protocol for improving the robustness against communication delays. Based on the frequency-domain analysis and algebra graph theory, it is shown that the new protocol can improve the robustness against communication delays...
Most of existing studies about two-way relay network rely on the assumption that two sources transmit with symmetric traffics, which is often unsatisfied in practical application. In this paper, we focus on asymmetric traffics for two-way relay network, and investigate how to minimize system outage probability. To achieve this objective, we first propose a strategy to combine relay selection (RS)...
Simulations are widely used to design and evaluate new protocols and applications of indoor wireless networks. However, the available network simulation tools face the challenges of providing accurate indoor channel models, three-dimensional (3-D) models, model portability, and effective validation. In order to overcome these challenges, this paper presents a new CO-Simulation framework based on MATLAB...
Current passive RFID systems face the challenges to locate mobile objects in real time in indoor environments, including the realization of low delay as well as effective cooperation among readers and accurate ranging ability in the physical layer. In order to overcome these challenges, this paper presents a low delay multi-reader passive RFID system using ultra high frequency (UHF) radio as the forward...
The rapid development of wireless sensor network and RFID technologies offers a wide range of novel applications and services. In this paper, we present a two-layered wireless network for warehouses and supermarkets to monitor goods storage and sale, and assist for quality management and market analysis. The hierarchical architecture uses IEEE 802.15.4a impulse ultra-wideband radio (IR-UWB) communication...
Congestion avoid in wireless sensor networks is a critical issue, it will not only affect transmission reliability, and will waste valuable energy resources. In order to reduce the wireless sensor network routing instability, we proposed a novel altering routing congestion control protocol for wireless sensor networks (CAAR). In this paper, we develop: 1) based on cognition detection technology to...
Next generation RFID towards ubiquitous wireless sensing and identification requires high network throughput along with long operation range and ultra low energy consumption. In this paper, we review future RFID for ubiquitous intelligence and their technology needs from system to device perspectives. As a promising enabling technology, ultra wideband radio (UWB) and its use in various RFID implementations...
To secure wireless sensor networks, a particularly challenging problem is how to feasibly deal with the internal attacks against the routing protocols, such as Byzantine attacks. In this paper, we proposed a secure routing a lightweight security protocol for detecting Byzantine attacks. In this paper, we develop: (1) an secure cluster header selection and clustering scheme that a source node can authenticate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.