The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
The 10Gbase-KR protocol is widely used to accomplish the high speed data conversion in the Ethernet area. This paper presents a design of the critical controller in the physical coding sublayer based on the 10Gbase-KR. In order to satisfy the demand of the high speed data conversion, the scrambler and descrambler are specially designed to work in a parallel mode. The post-synthesis simulation results...
This paper analyzes the transmission efficiency of two kinds of communication technologies: summation frame and individual frame. The abstract models for these two communication technologies using linear topology, which is the most popular topology in industrial control field, are proposed in this paper. The simulation results based on the models show that summation frame has a significant performance...
In this paper, we simulate the tri-message time synchronization protocol within the cluster sub net for the MAC layer of underwater acoustic network. Distinguished with the traditional TDMA protocols, all sub nodes are time consistent with the cluster node and the sub nodes can be quickly netted in the improved TDMA protocol. We established a network simulation with a bunch of 6 nodes in OPNET software...
The loT (Internet of things) is emerging as a wide variety of devices are attached to the Internet to support ubiquitous and pervasive sensing and computing, home automation, and the shift toward smart cities. As the IoT becomes a critical part of the Global Internet on which we increasingly rely, resilience is increasingly important. Of greatest concern is resilience to large-scale disasters that...
As wireless and telecommunicaton infrastructure communications have been integrated into modern vehicle systems (i.e., infotainment systems and vehicle to vehicle systems), the security implications on the relatively unchanged underlying network protocols inside the vehicles are investigated by researchers and industrial experts in the corresponding domain. Some researchers have achieved the investigation...
This paper describes the use of mobile agents in the group of cooperating UAV and UGV autonomous robots. Multiagent system simulation uses an environment that integrates robot operating system (ROS), V-REP simulation environment and JADE multi-agent system. Mobile agents ensure the continuation and completion of the mission even in case of failure of a device from a group. Paper describes a particular...
Container-based Software-as-a-Service (SaaS) systems are rapidly emerging as a dominate cloud deployment paradigm, as supported via Docker, etc. This has opened new research avenues as lighter-weight containers replace heavier-weight virtual machines (VMs) as atomic cloud deployment units. Advancing such research requires sufficiently rich, container-aware cloud simulation frameworks so as to explore...
Considerable efforts have been expended on the centralised administration of WSNs. However, only very small functions, such as processing, memory, battery unit, and communication ability, can be configured using WSN nodes due to the associated resource restrictions. Moreover, unbalanced cluster construction and unbalanced energy dissipation can reduce network lifespan by a large extent. Therefore,...
This paper investigates the performance of a cooperative spectrum sharing protocol for cognitive two-way amplify-and-forward (AF) relaying system. In the proposed framework, two primary users (PUs), PU1 and PU2 coexist with a secondary user (SU) in the same frequency band albeit with different priorities. Primary users by virtue of having a license to operate over the frequency band have higher priority...
Data dissemination among vehicles is an important problem in a Vehicular Ad Hoc Network (VANET). However, all existing works on data dissemination consider transferring small-sized data, where the entire data can be transferred from a roadside unit (RSU) to a vehicle when the vehicle is passing by it. In this paper, we address the problem of large data transfers among vehicles in a VANET using RSUs...
This paper investigates the collision avoidance problem in formation control. First, a collision avoidance algorithm is proposed by using the gradient-based method. Then, a collision-free consensus based formation protocol is developed for a group of second-order systems with the aid of graph theory. In particular, the formation protocol is designed only based on the relative information obtained...
The control of multiple homonuclear spin systems is a long-standing problem in nuclear magnetic resonance (NMR). In this paper, we introduce the brachistchrone algorithm to local unitary control of such systems, which usually take a long operation time to discriminate because of their small resonant frequency differences. We show that for this particular problem the model can be reduced from 2N-dimensional...
Standardization bodies such as IEEE and 3GPP, as well as other interest groups, are in the process of defining and standardizing different functional subdivisions within mobile network base stations, primarily to reduce the data rate requirements imposed on the transport architecture by 4th and 5th generation mobile systems. Ethernet is considered the leading candidate for the transport architecture...
The current design drivers for multi-cores, namely performance per watt, scalability and flexibility, make the Networks-on-Chip (NoCs) the de-facto on-chip interconnect. State of the art NoCs can exploit heterogeneous solutions and complex DVFS techniques to fulfill also the variability of the application requirements. Relevant showstoppers to the design of a truly flexible NoC fitting all the possible...
Accurate estimation of unknown quantum states using limited number of samples is very important but difficult task using fixed measurement basis states since the best local unbiased estimator (LUE) for estimating the parameter depends, in general, on the unknown parameter itself. In order to solve this problem, Nagaoka advocated an adaptive quantum state estimation (AQSE) procedure [1], where the...
This work presents a novel virtual vehicle based decentralized coordination framework for Connected Autonomous Vehicles (CAVs). We explore the idea of CAVs being capable of positioning virtual vehicles to share their intended maneuver as well as request cooperation. This framework has potential to inspire versatile solutions and provides an intuitive interface to interact with reactive and unconnected...
Ever-increasing research effort has been dedicated to multi-group radio frequency identification (RFID) systems where all tags are partitioned into multiple groups, such as group-level queries, and multi-group missing tag detection. However, it is assumed in the existing work that all tags know their individual group IDs, which thus leaves group labeling problem unaddressed. To tackle the under-investigated...
This paper investigates and compares the performance of different scheduling techniques in an Ethernet fronthaul network in the presence of both time-sensitive/high priority and background traffic streams. A switched Ethernet architecture is used as the fronthaul section of a cloud radio access network (C-RAN) and a comparison of two scheduling schemes, strict priority scheduling and time-aware shaping,...
The article describes the terminal program for data exchange between the PC and the in-house system development kits based on the Modbus RTU protocol. It explains modification of the source code and the program compilation (C#) without the MS Visual Studio integrated development environment. The authors offer a technique for debugging of the data exchange with the virtual object in the slave device...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.