The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this technical note, a descriptor approach to leader-following output consensus of multi-agent systems with both stationary and dynamic leaders is given in the presence of transmission delay and model uncertainty. The proposed method can deal with stable and unstable agents described by general linear models. To this end, a new proportional-derivative-integral (PID) consensus protocol for the closed-loop...
The high number of cells employed in a Modular Multilevel Converter represents a challenge for the control hardware. Some authors have proposed the use of digital communications to simplify the assemblage and maintenance in such converters, but the latency they add has undesirable consequences for the closed-loop performance. In this paper, we propose a model-based compensation of the latency that...
Due to its modularity and scalability, modular multilevel converter is a promising topology for medium voltage applications, such as energy storage or motor drives. Because of the large number of modules, the wiring can become complex if the conventional star topology communication network is used. To solve this issue, a communication link that uses a ring topology to connect the central controller...
E-health is one of the domains which will need more and more IoT solutions in the future, as it requires short delays for life-dependency situations and safe local storage spaces for privacy matters. The emergency context demands efficient communication and computing capacities, and the cloud vision as well as traditional TCP/IP way of communication cannot really suit these requirements. New approaches...
Opportunistic communications through wireless ad-hoc mesh networks have been thoroughly studied in the context of military infrastructureless deployments, sensor networks and even human-centered pervasive networking. However, due to the lack of a model that accurately computes the probability distribution of the delay, we usually content ourselves with the mean values. Such an approach can limit both...
Frequency-domain criterion on containment control for general linear multi-agent systems with time delay is studied under the directed network topology. A distributed protocol with time-invariant delay is proposed. When time-delay is an unknown constant, frequency-domain criterion on containment control of general linear multi-agent systems with delay is obtained, and an upper bound of delay is given...
The ability to provide a high Quality of Service is a crucial aspect in the acceptance and widespread dispersion of the Industrial Internet of Things and it has a key role to enhance the end user experience. The emerging fog cloud computing architectural concept aims to diminish the experienced latency while simultaneously providing a seemingly unlimited quantity of computational power by moving computations...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
BTLive is a novel, unique, mesh/push-based peer-to-peer (P2P) live video streaming mechanism. Previous studies show that it achieves significantly lower streaming delays than other approaches but suffers from a high overhead, where peers receive up to 33% duplicate video chunks. Other P2P streaming mechanisms, most of which are either mesh/pull or tree/push-based, do not experience duplicates at such...
Due to improvements in defensive systems, network threats are becoming increasingly sophisticated and complex as cybercriminals are using various methods to cloak their actions. This, among others, includes the application of network steganography e.g. to hide the communication between an infected host and a malicious control server by embedding commands into innocent-looking traffic. Currently, a...
The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer...
Standard applications are unable to perform well in delay- and disruption-tolerant networks (DTNs) due to frequent lack of end-to-end connectivity and long communication delays. Such applications must be thus adapted to be able to operate in disadvantageous network conditions. In a previous work on adapting standard tactical applications for DTN networks, we proposed how such an adaptation may be...
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result...
We investigate adaptive transmission for tactical packet radio networks in which a source uses fountain coding to multicast a file to a number of destinations over time-varying links. We examine two strategies from the literature for packet-by-packet adaptation of the modulation and channel code. The maximum data-recovery rate philosophy attempts to maximize the throughput for each transmitted packet...
Vehicular Ad-hoc NETworks (VANETs) are composed of moving vehicles with the ability to process, store, and communicate via wireless medium. VANETs promise a wide scope of services, such as, safety and security, traffic efficiency, and others. For instance, a VANET application can detect, control and reduce traffic congestion based on data that describes traffic patterns. However, disseminating data...
The rapid growth in market demands for high-quality, state-of-the-art, and reliable communication services increases the amount of session-control signaling, which is mainly based on the Session Initiation Protocol (SIP). Many research activities dealing with the Quality of Service (QoS) have been focused on media-related service components, whereas signaling-related service components have received...
With the requirement of real-time and reliability on monitoring power transmission lines, this paper proposes a cooperative communication protocol with network coding in long-chain wireless sensor networks (WSN). The protocol makes full use of channel broadcast characteristics and cooperative communication. It applies the classical butterfly structure of network coding among the successive three hops...
Using Commercial off-the-shelf (COTS) software over networks that are Disconnected, Intermittent and Limited (DIL) may not offer acceptable performance. Frequent network interruptions for both shorter and longer periods, as well as long delays, low data and high packet error rates characterize DIL networks. In this paper, we designed and implemented a prototype proxy to improve the performance of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.