The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) have a wide variety military applications including battlefield surveillance, enemy tracking, and target classification. In this paper, we propose a WSN architecture based on a mobile sink. The proposed architecture differentiates the regular data from the critical data, and leverages this difference to reduce the energy consumption in WSNs. We formally modeled the...
This paper introduces a new innovation for the analytical model to improve the throughput performance and energy efficiency for ideal channel conditions by the integration which challenges both fountain code and Markov chain modeling. In this context, the energy consumption is a critical resource that can be saved by minimizing the number of transmissions to be performed in the network. Channel contention...
Listen-Before-Talk category 4 (LBT Cat4) mechanism is considered as the most appropriate access method for Licensed-Assisted Access (LAA) framework, especially when LAA system coexists with WiFi system in unlicensed bands. Previous investigations of the LBT Cat4 based LAA-WiFi coexistence provide experimental results and simulation results, and theoretical analysis work is relatively rare. This work...
We consider a large system populated by n anonymous nodes that communicate through asynchronous and pair-wise interactions. The aim of these interactions is for each node to converge toward a global property of the system, that depends on the initial state of each node. In this paper we focus on both the counting and proportion problems. We show that for any δ ∊ (0, 1), the number of interactions...
Determining the reliability of the power supplies for induction heating through an analysis of the states is linked to several aspects of their operation. One of them is the transition between states — from an operating state into a protection state or from a protection state into a failure sate. To do that analysis, an Analysis of the Probabilistic States, the so called Markov Analysis, is used....
During the past a few years, control systems are greatly influenced by the evolution of networked control systems (NCSs). However, challenges such as time-delay and packet dropouts in NCSs are still breaking its stride. To analyse and tackle those constraints, Markov chains had been widely used to model time-delay and packet dropouts, and a set of controllers had been designed thereafter. Nevertheless,...
Due to the increased usage of smart phones, mobile users now have access to a diverse set of services. These mobile services have increased the demand for faster wireless networks. In this paper, we examines mobility support functions in soft handoff for IP-based mobile network, and distinguishes the control areas in the cell's range areas for mobile network's efficient session control (SC). Based...
Machine-to-machine (M2M) traffic is variegate and finding a traffic model which can cover a wide range of M2M sources is challenging. In this paper we address this challenge by proposing an extension of legacy renewal processes for modeling of M2M traffic sources. To this end, we first describe the model and derive some performance parameters, as the overall packet arrival distribution and its moments...
Branch prediction is crucial in improving the throughput of microprocessors. It reduces branching stalls in the pipeline, which helps to maintain the instruction execution flow. Of these instructions, conditional branches are non-trivial in determining the microprocessor performance and throughput. Modern microprocessors accurately predict the branches using advanced branch prediction techniques....
In this paper, we study the behavior of a large number N of parallel loss servers operating under a randomized power-of-d routing scheme for the arrivals. Such models are of importance in several cloud architectures that offer IaaS (Infrastructure as a Service). The probabilistic behavior of such modelshas previously been analyzed for jobs with exponential holding times. However, in most realistic...
One of the key performance challenges in cloud computing is the problem of interference, or resource contention, among colocated VMs. While prior work has empirically analyzed interference for specific workloads under specific settings, there is a need for a generic approach to estimate application performance under any interference condition.In this paper, we present an analytical model to estimate...
A new type of channel in order to analyze burst noise is introduced. As opposed to the well known Gilbert-Elliott Markov and Polya contagion channels previously analyzed in the literature, burst run one's lengths based on the logarithmic distribution are introduced. The main property of this new model is that the conditional probability of having an erroneous bit given a previous run one's length...
In this paper, we study neural cognition in social network. A stochastic model is introduced and shown to incorporate two well-known models in Pavlovian conditioning and social networks as special case, namely Rescorla-Wagner model and Friedkin-Johnsen model. The interpretation and comparison of these model are discussed. We consider two cases when the disturbance is independent identically distributed...
In March 2016, a new protocol called licensed-assisted access (LAA) has been embodied in Release 13 (Rel-13) for Long-Term Evolution (LTE) to operate on unlicensed spectrum and interwork with Wi-Fi. The relevant standards clarify the channel access procedures and contention window (CW) adjustment procedures for LAA. In a long period of time, the coexistence performance of LAA with other technologies,...
We conducted three experiments to discover the effect of a virtual agent's state transition on a user's eye gaze. Many previous studies showed that an agent's state transition affects a user's state. We focused on two kinds of transitions, the internal state transition and appearance state transition. In this research, we used a product recommendation virtual agent (PRVA) and aimed to discover the...
This work presents the Failure Modes and Effects Analysis (FMEA) technique applied to an utility's power transformers to obtain a risk value to enable the optimization of a maintenance schedule. The application of the study will lead to greater assertiveness of the investments, providing technical and scientific support and agility in the decision making.
Phased-mission system (PMS) usually has the characteristic of high complexity and integration and operates under a complex condition, so system reliability plays an important role during its mission. The common cause failure (CCF) in system which can destroy the hypothesis that the failures are independent, especially in the PMS. Based on their impacts on the components, CCFs can be classified into...
Statistical testing based on a Markov chain usage model, as a rigorous testing method, has been around for more than two decades. Through the comprehensive application of statistical science to the testing of software, it provides audit trails of evidence to support correctness arguments for a software-intensive system as well as a decision that the system is of requisite quality for its intended...
Due to the increasing complexity of web and client application's structure, security problem has become more and more critical. Among all the threats reported, SQL Injection Attacks (SQLIAs) have always been top-ranked in recent years, and network logs, which are very important for the detection of SQLIA, are often utilized to analyze the user's attacking behaviors. However, the collection of network...
In this paper we revisit the problem of deriving the expected number of transmissions for multicasting random linear coded (RLC) packets on single-hop wireless channels. We show by deriving the closed form expression for an instance of the problem that previous analytical formulation does not accurately model the true expected number of transmissions, especially for smaller finite field size. Our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.