Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The achievement of highly efficient integration and compatibility of intelligent electronic device (IED) has always been the key issue of digital substation which conforms to IEC61850 protocol in communication standard. This paper studies on the information model and equipment test which have important influence on compatibility to the system integration, first of all, the composition of IEC61850...
Improving the performance of data gathering while saving the energy of network is one of the subjects of mobile data gathering protocols. In order to achieve the goal, the virtual force technique is introduced into the research where the data in the transmission queue and the distance between the sensor and the collector are simulated as forces. The collectors move on the direction of net force until...
Valves play a critical role in rocket-engine test stands because they are essential for the cryogen transport mechanisms that are vital to test operations. Sensors that are placed on valves monitor the pressure, temperature, flow rate, valve position, and any other features that are required for diagnosing their functionality. Integrated system-health management (ISHM) algorithms have been used to...
In order to figure out the problems which the existing intrusion detection system models have, such as more significant network transmission load, lower detection efficiency, limited data process ability. The paper has discussed an intrusion detection model based on mobile agent technology, and expatiated the method which analyzing data agent has adopted utilizing Markov model principle, and carried...
Simulation has become an important evaluation method in the area of Peer-to-Peer (P2P) research due to the scalability limitations of evaluation test beds such as Planet Lab or G-Lab. Current simulators provide various abstraction levels for different underlay models, such that applications can be evaluated at different granularity. However, existing simulators suffer from a lack of interoperability...
Recognizing the value of an advanced metering infrastructure (AMI), utilities worldwide are deploying millions of smart meters. To better justify AMI investment, researchers have recognized the urgency to utilize the full potential of AMI to improve the quality of distribution management system (DMS) applications. However, the integration of AMI and DMS is a challenge as it entails different communication...
Distributed virtual environments for training simulations can potentially improve team work quality besides introducing a safe environment to investigate human behavior in abnormal situations. However, the creation of such simulations is complex and expensive. Simulation reuse by means of interoperability, integrability and composability help saving money and development time. However, this is one...
In this paper we present an approach of using model-driven technologies for testing of service component interactions. We report on an industrial experiment with a novel combination of existing UML standards, i.e., the UML Testing Profile (U2TP), in conjunction with proprietary domain specific languages (DSLs). Many model-based testing (MBT) approaches use the UML 2 standard, but very few of them...
Wireless sensor networks (WSNs) are data centric networks to which data aggregation is a central mechanism. Nodes in such networks are known to be of low complexity and highly constrained in energy. This requires novel distributed algorithms to data aggregation, where accuracy, complexity and energy need to be optimized in the aggregation of the raw data as well as the communication process of the...
Trust, Accounting, Billing, Auditing and Charging (TABAC) are crucial functions of productive IT and telecommunication systems. However, they are often not considered in early stages of development, but have considerable impact on commercial success at later stages. On the one hand, these functions are costly to be added after having a running prototype. On the other hand, they should not be burdens...
In this paper we study the information spreading behavior of selected, mobility models combined with epidemic algorithms and the dynamic routing efficiency of gossip based routing algorithms on ad-hoc networks. Epidemic algorithms follow a paradigm of nature where simple rules dictate the spread of information by having a local view of the environment. In our work, three models of mobility, Random...
This paper proposes a new way to complete the interface model mapping from CORBA to ontology in the field of network management, which is interface model mapping adapter. The adapter consists of three parts, which are CORBA interface analyzer, mapping controller and ontology information database. The adapter can automatically map the CORBA interface model to ontology interface model. Therefore, we...
This paper investigates the effects of using a realistic discrete power model in cluster-based communication for wireless sensor networks (WSNs). Four different clustering protocols are evaluated by incorporating a model compliant with Crossbow MICAz motes. The energy consumption model takes into account the discrete transmit power levels of the CC2420 radio chip used by MICAz sensor nodes. The radio...
This paper discusses a new approach to dynamically configure generic protocols. Generic protocols are interaction patterns from which all application domain information has been removed. Configuring a generic protocol consists in refining the coarse-grained description of this protocol with the functionality an agent is endowed with for a specific application. In this process the general behaviors...
The Hybrid Operational Protocol Evaluation (HOPE) tool, allows users to: ldr Compare performance metrics of various communication protocols against realistic operational scenarios ldr Visualize motion and communication activities in a mobile network. Designing a distributed mobile communication architecture, which may involve hundreds of mobile nodes, requires the evaluation of various communication...
This paper shows an approach to the evaluation of mission scenarios that involves motion and mobile network communications for groups of vehicles, using the Hybrid Operational Protocol Evaluation (HOPE) tool. HOPE is a framework that combines simulation models of communication protocols, terrain maps, link budget reporting services, scenario network visualizations, statistics gathering and displays,...
Stochastic simulations may require many replications until their results are statistically significant. Each replication corresponds to a standalone simulation job, so that these can be computed in parallel. This paper presents a grid-inspired approach to distribute such independent jobs over a set of computing resources that host simulation services, all of which are managed by a central master service...
DEVS is a formalism intended to model both discrete and continuous systems. The use of discrete events, rather than time steps, as the basis for simulation has been shown to reduce the computation time in many applications. Parallel DEVS is an extension to standard DEVS, which provides means to handle simultaneous scheduling. In this paper, we present an implementation of the parallel DEVS simulation...
We developed a simulation set-up that can test the behaviour of streaming applications over an error-prone wireless networks: 802.11b/g specifically. The application we tested is a video coder that adds unequal error protection to the scalable extension of H.264/SVC. This protection mechanism enables the recovery of lost packets. We adapted a radio wave propagation model to define Rayleigh fading...
The development of an open architecture for multimedia data integration and visualization in template based distributed applications is a challenge for the scientific researches. Because of characteristics of multimedia data, their management and querying techniques are unlike than those of traditional data. We can increase the potential use of multimedia data across various applications by storing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.