The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Coflow scheduling without prior knowledge has been proposed recently. However, the previous solution, Aalo, has two problems: it does not explicitly control the flow rate; it assumes the network is ideally non-blocking (with perfect traffic balancing and no oversubscription). In this paper, we show the performance loss caused by the above two problems. We propose EAalo to cope with the problems. It...
This work will present a novel photovoltaic (PV) inverter with integrated short-term storage. The topology combines advantages of microinverter topologies, such as module-specific maximum-power-point tracking, failure-tolerance, safety due to limited voltages, modularity, use of low-cost low-voltage components such as silicon field-effect transistors (FET), and simple expandability, with those of...
In order to enhance the stability of grid-connected modular multilevel converters (MMC) system, which has become a prominent topology as an alternative to conventional voltage source converter in applications for high voltage, a novel single-phase circulating current suppressing strategy is proposed. This paper studies the mechanism and model of circulating currents of a single-phase MMC system at...
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders...
The existing spectrum allocation algorithms do not consider the starvation phenomenon of cognitive users seriously in cognitive radio wireless networks. For this reason, a maximum system access algorithm based on graph coloring model is proposed. Aiming at maximizing the system access, it assures the validity by means of designing corresponding schemes of selecting cognitive users and channels. Comparisons...
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate the attacks but none can effectively and efficiently identify the intruders. To address the problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.