The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to effectively restrain the impact of network delays for wireless networked control systems (WNCS), aiming to time-variant, random and uncertain network delays and controlled plant might be time-variant or nonlinear, as well as Smith predictor models might be imprecise, we propose a novel approach that modified Smith predictor combined with fuzzy immune self-regulating PID control for the...
Single carrier transmission with cyclic prefix (SC-CP or SC-FDE), has lower PAPR (peak to average power ratio) problem and requires smaller backoff of amplifier than orthogonal frequency division multiplexing (OFDM) technique. In order to combat impulsive noise under power limited channels, we apply regular LDPC (Low Density Parity Check) codes and propose a simplified decoding method. Also We compare...
A near field passive localization method based on improved weighted subspace fitting (IWSF) algorithm was presented. Unlike the way in Viberg's paper [1], bearing and range parameters are estimated by alternative Gauss-Newton iteration in our proposed method. Simulation results proved its effectiveness, and the performance comparison with Viberg's method is given.
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, we propose a cryptanalysis of A. M. Barmawi's protocol and show that every valid participating party can recover the factorization of the RSA modulus N with the computational complexity O(log...
According to the characters and requirements in industrial field, a protocol stack structure in WIN (wireless industrial networks) is proposed and presented comparing with OSI reference model. After that, an MAC (Medium Access Control) protocol based on virtual token mechanism is proposed to meet the real-time requirement. Afterwards, an improved time synchronization method and a new node positioning...
Video-on-Demand (VoD) is one of the most important services over the Internet. China's high performance broadband information network, named 3Tnet, is a new network architecture designed to provide large-scale real-time high definition VoD services. A new scheduling policy based on patching multicast is proposed to improve system performance of VoD services on 3Tnet. The simulation shows that this...
Carrier frequency offset (CFO) of different users in the multicarrier DS-CDMA (MC-DS-CDMA) system may violate the orthogonality among subcarriers and induce inter-carrier interference (ICI) and inter-user interference (IUI). This paper develops a new algorithm based on pilot clusters for CFO estimation of the uplink of MC-DS-CDMA system. By exploiting the low-pass property of fast Fourier transform...
Wireless Sensor Networks impose a requirement of low power usage, implying minimal processing power on PHY/MAC layer transmissions. However the underlying channel between nodes can sometimes be hostile and incur interference from heavy traffic. In this situation a customized, simple, robust and adaptive forward error correction scheme is essential. This paper proposes an Adaptive Transmission Power...
Refinement is a necessary and effective step in some node localization schemes of wireless sensor networks (WSN). Suitable refinement procedure can improve the node localization accuracy and raise the robustness of the localization algorithm. However, most existing refinement algorithms are costly duo to complex computation and frequent communication, and may induce serious coverage problem duo to...
The paper investigates the effect of feedback delay on hybrid selection and closed-loop transmit diversity in Rayleigh time-selective flat fading. A Jakes model was used to formulate channel state correlation as a function of feedback delay and a Markov model was used to characterize channel state evolution. According to these models, the receive SNR is obtained. Averaging the receive BER over the...
In this article, a novel hybrid network architecture is proposed by incorporating the state-of-the art IEEE802.16 and HomePlug AV standard based systems. The proposed architecture allows to overcome limitations for using wireless devices and deliver nomadic broadband data communication services in hospital environment. Through the proposed Quality of Service (QoS) broker which jointly utilizes the...
This paper proposes a multicast routing algorithm, which applies the mechanism of network coding, to achieve the max-flow transmission in sensor networks. The main characteristics of the proposed algorithm are that a multicast graph with redundant path is constructed and a sensor joins in it by destination driven. Simulation results show that the proposed algorithm can effectively improve the multicast...
Most of the current WSN research platforms are based on Mica nodes and TinyOS. However, it's difficult to be integrated with the obsolete mature source code and difficult to port to other platforms. The micro-controller based solution is also weak to take high performance tasks such as image processing. So we develope an ARM7 based powerful WSN research platform named OpenWSN. OpenWSN adopts layerfirst...
Grid computing system is different from conventional distributed computing systems by its focus on large-scale resource sharing and open architecture for services. The global grid technologies and the Globus Toolkit in particular, are evolving toward an open grid service architecture with which a grid system provides an extensible infrastructure so that various organizations can offer their own services...
In this paper, we propose a new bandwidth prediction and control scheme for transmission of real-time video stream over wireless ad hoc network. Our proposed strategy is based on Cross-Layer, Feedback and Neural network techniques. We first determine several relevant parameters which directly impact the quality of video transmission. We obtain the topology change, the signal power information by using...
We demonstrate an hybrid WDM/TDM PON which uses a specific broadcast wavelength channel to transmit broadcast/multicast services. The simulation results proved that the implementation significantly improved the performance of the hybrid-PON systems
In the pattern recognition field, MIR is receiving more and more attention. To improve the accuracy of MIR system, a novel automatic algorithm based on dynamic thresholds note segmentation and weighted synthesis matching is presented. First dynamic steps are set for amplitude difference, get dynamic thresholds to segment notes and improve segmentation veracity. Then music scores are transformed into...
In this paper, direct-sequence code-division multiple-access (CDMA) is considered for multiuser communication network in underwater acoustic channel, where extended multipath and rapid time-variability is encountered. To track and compensate the channel distortion, a decentralized hypothesis-feedback equalization (HFE) algorithm which updates coefficients at chip rate is a promising method and has...
Key certificate is a difficult security problem in mobile ad hoc network because of many new features different from traditional networks. In this paper, we proposed a secure self-distributed certificate scheme suitable for mobile ad hoc networks, in which each node stores some certification built by selection algorithm and implement certificate by Multiple bounded disjoint paths certificate algorithm...
In this paper, a new feedback scheme is presented based on the comparison of several CQI feedback schemes for OFDMA systems. The number of feedback level is decreased. And the number of feedback RBs (Resource Blocks) is increased in each level, in order to enrich the feedback information of the radio channel. Simulation results show that the new scheme enhances the description precision of the radio...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.