The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
Students engaged in a design process need to diagnose their information needs, gather resources, evaluate their quality and apply them appropriate to make evidence-based decisions about potential solutions to their problems. Much of students' information management process typically is hidden from instructors, which makes evaluation of their underlying information literacy skills difficult. In a first-year...
Traffic in military ad hoc networks are often broadcast or multicast traffic. A robust and efficient way to handle this type of traffic is the multi-point-relay (MPR) method. Furthermore, frequency spectrum is a scarce resource and must often be shared by several networks resulting in a risk for internetwork interference. The objective of this paper is to analyze the effects from internetwork interference...
It is well-known that the communication among agents plays an important role in leader-following consensus. When the communication fails, it will greatly degrade the performance of the leader-following consensus. As technology develops, memory components are quite cheap. Thus it is very natural to use the information before the communication failure to enhance the robustness of leader-following consensus...
In this paper, the distributed fault detection (FD) problem is addressed for a class of linear stochastic multi-agent systems (MASs). A novel distributed cooperative control scheme is given for reaching bounded formation of the MAS. It is proved that by using relative outputs between neighboring agents, a set of distributed fault detection filters can be designed for each agent to detect the faults...
Live media streaming applications are increasingly popular, with services such as Twitch.tv and YouNow being used by millions of people. Deploying such services on the cloud can be very expensive, as the cost is proportional to the amount of data transferred to the users. However, adopting a much less costly peer-to-peer (P2P) solution may reduce the overall quality-of-service (QoS) experienced by...
This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the...
The Internet is ubiquitous and nodes participating in it are becoming increasingly diverse and heterogeneous. Especially is this true in decentralized, overlay-based networks, which traditionally build upon the infrastructure of the Internet. An ability to search for nodes with specific capabilities becomes of growing interest, for example, to support the node capacity discovery in large scale, distributed...
This paper considers the robust consensus problem of Lipschitz nonlinear multi-agent systems with matched disturbances and time-delay dynamics. By LMI approach based on Lyapunov function, distributed adaptive protocols are proposed, which rely on the state information of neighbor agents. Theoretical analysis indicates that the proposed protocol achieve both the leaderless and leader-following consensus...
Previous models based on Deep Convolutional Neural Networks (DCNN) for face verification focused on learning face representations. The face features extracted from the models are applied to additional metric learning to improve a verification accuracy. The models extract high-dimensional face features to solve a multi-class classification. This results in a dependency of a model on specific training...
Distributed storage platforms draw much attention due to their high reliability and scalability for handling a massive amount of data. To protect user and data privacy, encryption is considered as a necessary feature for production systems like Storj. But it prohibits the nodes from performing content search. To preserve the functionality, we observe that a protocol of integration with searchable...
Secure interaction amongst system components is inherent to ensure the trustworthiness of the applications. In a distributed system, the attester should know whether the communicating client as well as the user who is using that client system is trustworthy. This can be achieved by a technique called remote attestation. This study presents a three-phase remote attestation protocol which provides relaxation...
This paper addresses robust consensus for a class of linear multi-agent systems (MASs) with uncertainty in communication network. It is suppose that the weighted adjacency matrix of the MAS is known to lie within an uncertainty polytope. Base on the Lyapunov stability theory combining with homogeneous parameter-dependent (HPD) Lyapunov functions, necessary and sufficient conditions for ensuring robust...
Robust adaptive time-varying formation control problems for high-order linear multi-agent systems with parameter uncertainties and external disturbances are investigated. Firstly, using the adaptive updating mechanism, a fully distributed time-varying formation control protocol is proposed. The protocol is determined by each agent in a fully distributed form and does not need any global information...
In this paper, the distributed h∞ composite-rotating consensus problem is concerned for a class of second-order multi-agent systems. Firstly, based on local state feedback and communication feedback, a distributed control algorithm is proposed. Then, sufficient conditions are derived in order to make all agents reach a composite-rotating consensus with the desired h∞ performance. Finally, the simulations...
Detecting incidental scene text is a challenging task because of multi-orientation, perspective distortion, and variation of text size, color and scale. Retrospective research has only focused on using rectangular bounding box or horizontal sliding window to localize text, which may result in redundant background noise, unnecessary overlap or even information loss. To address these issues, we propose...
This paper deals with the consensus disturbance rejection problem for networked systems coordinating over uncertain communication channels. Each communication channel of the network is modeled as an ideal transmission system with the unitary transfer function perturbed by a norm-bounded uncertainty, which is particularly susceptible to describe quantization errors and communication noises. A distributed...
This paper studies semi-global robust output consensus of multi-agent uncertain nonlinear systems of a strict-feedback normal form. The concerned agents may have high relative degrees with actuating disturbances, thus strictly extended from the previous study [17]. We develop a Lyapunov function based approach to establishing a cooperative output feedback protocol. Specifically, each local protocol...
Next generation applications of wireless IP networks face an ever increasing demand of real-time dissemination of sensory and similar data to nearby devices. During situations when the transmission capabilities become scarce due to overused bandwidth, such as vehicular and various IoT use-cases, limiting the number of transmitted bytes over the wireless interfaces could ease the network load considerably...
In this paper, we explore the UAV loss detection and auto-replacement scheme in a multi UAV system. The developed scheme is based on the concept of cooperative multi UAV control, where the cooperation is achieved by broadcasting heartbeats (HBs) and information fusion technology. We first propose the UAV loss detection method by checking the HB time. Subsequently, we present the UAV auto-replacement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.