The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
Verification plays a major role in the implementation of soc and it is as important as designing. verification gives with the actual enactment and functionality of a DUT and verifies if it meets the specification or not. This paper presents an AMBA 3 AHB_LITE protocol has been justified as per the specifications by using UVM environment which completely wraps the DUT The verification environment is...
Wireless Sensor Network (WSN) has recently emerged as a new widely used technology. However, the deployment of such networks has reported high rates of failures. Due to resource constraints of sensor nodes, the design of efficient failure detection techniques has become a very challenging issue. Already proposed WSN fault detection protocols have reported either a high number of false suspicions,...
According to the safety and reliable transmission and integration requirement of co-guidance information for autonomous aero craft flying formation, the control mode of autonomous flying formation was studied. The paper firstly presents the AdHoc-based communication network scheme of autonomous flying formation, and the design and implementation mechanism of four-level networking protocol stack model...
In dealing with computer networks, these allow the flow of information through the resources of various equipment's. This work describes the implementation through the encapsulation of Protocol DNP3, usually employed in Smart Grid communication, in a simulator of discrete events. The NS-2 is a simulator in open source of network events, that facilitate the development of communication networks scenarios...
Nowadays, due to excessive queuing, delays on the Internet can grow longer than several round trips between the Moon and the Earth — for which the “bufferbloat” term was recently coined. Some point to active queue management (AQM) as the solution. Others propose end-to-end low-priority congestion control techniques (LPCC). Under both approaches, promising advances have been made in recent times: notable...
In recent years there has been a rapidly increasing intensity of work going into investigating various methods of facilitating assisted living for the benefit of the elderly and those with difficulties in mobility. The paper describes one such effort which distinguishes itself from the rest by considering and describing a system with true commercial potential and thus significant social impact. Promising...
The wireless sensor networks are attracting more attention from the research community. And simulation is a frequently used approach to test and validate approaches, simulation environments must be able to support different models of wireless sensor networks. Our paper focuses specifically on a case-monitoring sensor networks. The protocol tested is based on the reconfiguration of nodes with the principle...
Wireless sensor network (WSN) technologies have been employed in recent years for monitoring purposes in various domains from engineering industry to our home environment due to their ability to intelligently monitor remote locations. In this paper, we have developed a purely deterministic model that utilizes clustering to organize the WSN. We propose a deterministic energy-efficient clustering protocol...
The quality of monitoring accomplished by wireless sensor networks (WSNs) mainly depends on the service of coverage provided by the deployed sensors. In particular, redundant coverage is essential to several applications, where an event is simultaneously detected by multiple sensors. While several protocols have been proposed for two-dimensional (2D) space, little work has been focused on three-dimensional...
We present a peer-to-peer based storage system and evaluate its resistance in the presence of malicious peers. To do so, we resort to simulation of the actual code borrowed from the production system. Our analysis allows to identify the main threats, prioritise them and propose directions for mitigating the attacks.
An active handoff decision strategy is proposed to improve the handoff performance in aviation data link. According to this strategy, the high-quality data link is maintained timely. The VDLM2 models are created in Network Simulator version 2 (NS2) environments. The end-to-end delay and signal quality are analyzed. Simulation results illustrate that the proposed strategy achieves better handoff performance.
ZACA-EEC (Zigbee Ant Colony Algorithm Energy Efficient Cluster) routing protocol is proposed to replace AODV in Zigbee with the aim of increasing reliability for mine equipment monitoring in this paper, which can prolong the lifetime of network remarkably. Taking hydraulic support as an example, the distribution of monitoring nodes can be simplified as chain hierarchy topology, then Free-space model...
This paper presents a comparative study of clustering techniques and cluster quality of a single criterion cluster heads election and cluster formation in Wireless Sensor Networks. The HEED, LEACH and Energy-based LEACH protocols are simulated and their performance are compared in terms of the number of cluster head generated, cluster size, cluster head distribution, scalability and coverage. The...
In order to speed up the process of developing embedded software while reducing its cost, a novel configurable simulation system based on MDA (Model Driven Architecture) is proposed in this paper. A configurable software approach is introduced into the simulation system resulting in an easy configuration of the system functions. The proposed simulation system can customize the simulation environment...
The control function of configuration software is researched and developed based on the application of laboratory project in this paper. A program of the fuzzy control algorithm is designed and simulated. Then the designed fuzzy control algorithm is embedded to the InTouch of the configuration software by the DDE communication protocol. The results show that the dynamic data exchange between InTouch...
Congestion in Wireless Sensor Networks (WSN) can be a severe problem, as it causes a plethora of malfunctions such as packet loss, lower throughput, energy inefficiency, and short lifetime. As a result, the performance of the whole network is subject to undesirable change; an issue that renders congestion control an issue of uttermost importance for such networks. As far as data-collection applications...
The deployment of Wireless Sensor Networks at sea provides on-site, distributed sensing of specific events. They can be complementary to existing satellite and airborne radar monitoring, providing continuous and real-time data feed. Of particular interest is chemical spill, such as oil slick. As unexpected occurrences, it is not possible to predict the location, size or weather conditions affecting...
From the overall performance of simulation grid system, it aimed on that how to determine balance load include mission and traffic, according to analysis relevant performance parameters which related to the bottom of the grid physical resources and the federate application. It is provided that the performance assessment methods with simulation grid system based on grey cluster and not only to prevent...
We present a framework for building and evaluating P2P systems in simulation, local execution, and distributed deployment. Such uniform system evaluations increase confidence in the obtained results. We briefly introduce the Kompics component model and its P2P framework. We describe the component architecture of a Kompics P2P system and show how to define experiment scenarios for large dynamic systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.