The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As one of the important steps in the process of self-organization of wireless ad hoc networks, neighbor discovery has substantial influence on the network performance. Especially in the modern warfare environment, the time consumption of neighbor discovery is very important for holding the battlefield situation. In this paper, we address the problem of neighbor discovery in ad hoc network with double-face...
This paper addresses the problem of average consensus for multi-agent systems (MAS) with time-varying delay and switching communication topology. By designing a new Lyapunov-Krasovskii functional (LKF), applying the Wirtinger-based inequality and reciprocally convex combination approach to handle the integral terms of the derivative of the LKF, a novel delay-dependent sufficient condition in terms...
All-to-all broadcast, which means that every node in the network has its own data packet to share among the other nodes, plays a significant role in some applications, such as situation awareness and cooperative engagement. However, current studies in the TDMA (Time Division Multiple Access) manner mainly focus on the fixed size model, which assumes that all data packets can be successfully transmitted...
A large percentage of the data published on the web is tabular data, commonly in the comma-separated values (CSV) format. URI fragment identifiers for CSV provide possibilities for data publishers (web servers) to refer to specific parts (i.e., fragments) of a CSV file using URIs as well as for data consumers (web clients) to retrieve URI-identified fragments over HTTP for further processing. However,...
Distributed imaging using sensor arrays has grown rapidly over past several years. Because image data is characterized by is high volume, an architecture of two tiered visual sensor network is proposed, where storage nodes gather image data from nearby sensors and process sink's query to transmit a time-specific image. However the importance of storage nodes is attractive to attackers. In this paper,...
The promise of high speed (over 1Gbps) wireless transmission rate at the physical layer can be significantly compromised with the current design in 802.11 DCF. There are three overheads in the 802.11 MAC that contribute to the performance degradation: DIFS, random backoff and ACK. Motivated by the current progress in OFDM and self-interference cancellation technologies, in this poster, we propose...
RFID has been gaining popularity due to its variety of applications, such as inventory control and localization. One important issue in RFID system is tag identification. In RFID systems, the tag randomly selects a slot to send a Random Number (RN16) packet to contend for identification. Collision happens when multiple tags select the same slot, which makes the RN packet undecodable and thus reduces...
Aiming at the coverage problem, a new coverage algorithm is proposed based on residual energy of sensors in this paper. In the algorithm, it is unnecessary for sensors to know its geographic information. By exchanging some related information with its neighbors, sensors judge its suitable status (active or sleep) according to energy. The algorithm can save sensor energy and extend the time of sensor...
Based on computational geometry method, a coverage algorithm for wireless sensor network based on matrix is proposed in this paper. In the algorithm, the whole monitored area is simplified to be a matrix. Each vertex in the matrix denotes one node in the network. When the area is covered and connected, redundant sensors are put into sleep status to keep energy. According to energy saving rate and...
In order to adapt the development of the Internet, the electronic commerce based on Internet emerges as the times require and it has been rapidly developed in recent years. It has attracted more and more attentions as a new commerce mode. The electronic commercial business used as a new model of enterprise management and administration, which is suitable for network virtual market economy, will break...
A new Web Service construction method is proposed according with the principle of Representation State Transfer (REST) in this paper. Using Resource-Oriented Architecture, how to construct the application with REST characteristics is described step by step. The performance of new Web Service construction method is evaluated and is compared with that of Service-Oriented Architecture (SOA). Analytical...
Along with the establishment of the absolute dominant position of Internet as the backbone network of worldwide wire network, the interconnection between wireless sensor network and Internet will have larger development space and can be more widely used. A kind of dissymmetrical Internet access technology-based on optimum gateway is proposed in this paper, by reactive style gateway discovery method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.