The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
In this paper, we apply the k-core decompostion to analyse the Autonomous System (AS) level Internet connectivity graph from January 2006 to October 2013 and finally obtain 94 Internet Nuclei for each month. Then, we empirically study the evolution and characteristics of the Internet Nucleus and find that the size of the Internet Nucleus grows in a linear form, which is different from the exponential...
Wireless sensor networks (WSNs) powered by energy harvesting is a promising technology for monitoring and diagnostic systems in smart grid. However, the limitation and instability of harvesting energy leads to the requirement of high energy-efficient time synchronization algorithms for WSNs. In this paper, in order to minimize the energy consumption, we propose an improved hybrid time synchronization...
In this paper, we consider the decentralized fault diagnosis problem of discrete event systems modeled by time Petri nets (TPNs). Our approach is based on the fault diagnosis graph which is obtained from the time reachability graph by removing the irrelevant nodes. A coordinator computes the diagnosis states of the global system using information from subsystems. Local systems send small amounts of...
We introduce the notions of “ℌ∞ almost regulated synchronization” and “ℌ∞ almost formation” for multi-agent systems subject to external disturbances and under directed interconnection structures. We assume that agents are linear, right-invertible and introspective with non-identical dynamics. The objective is to suppress the impact of disturbances on the synchronization error dynamics in terms of...
Web services are widely used to enable remote access to heterogeneous resources through standard interfaces and build complex applications by reusing existing component services. However, massive commodity computers, storage, network devices and complex management tasks running behind web services make them subject to outage and unable to provide continuously reliable services. To address this issue,...
An average consensus protocol is proposed for continuous-time double-integrator multi-agent systems with measurement noises under fixed topologies. The time-varying control gain is employed to attenuate noises. The closed-loop system is therefore a time-varying linear stochastic differential equation. By determining the state transition matrix of this closed-loop system, the dynamic characteristics...
A supervision and control system (SCS) is described for an actual project, which is used to remotely control the factory substation and supervise the status of the device. In the factory, it is very important to control, management, monitor for power distribution system. SCS can effectively reduce the possibility of accidents and the loss of finance. Through SCS, the operator not needs to go to the...
With the growth of decentralized network users, preserving privacy becomes a critical issue in this open community. Kad-based network, as a typical decentralized system, has been widely used nowadays. However, there is not enough research to achieve anonymity on it. In this paper, we propose an anonymous protocol based on Kad network, named Anonymous Kad (A-Kad), which achieves complete privacy and...
Using 802.11 wireless network protocols as the communication medium, combining with radio frequency-communication and ultrasonic ranging, implement a mobile terminal system in an intellectualized building. It can provide its holder such functions: 1) accurate positioning 2) intelligent navigation 3) video monitoring 4) wireless communication. The innovative point for this paper is to apply this system...
Current IM or SNS system provides a way for users to send message, talk, and share pictures and so on among buddies. However, it's not easy to share an application or other resources among the buddies. A user cannot use the resources in other devices which are lacked locally in run time, but sometimes that is what users want. This paper describes a new and potential Web 3.0 or Web 2.0 plus application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.