The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-Advancements in VLSI technology has made it possible to have more than eight metal layers connecting millions of closely placed devices in a single IC chip. Different interconnect layers run across the chip and the necessary connections across the layers are made through vias. The impedance discontinuity at the junction of the via and the interconnect line creates signal reflections and contributes...
Mathematical equations are possible to simulate with various electronic circuits. Inductors and capacitors intrinsically are capable of integrating and differentiating, and active components alone can realize such algebraic operations as addition and multiplication. In this work, linear differential equations are shown to be implemented with three active components, namely operational amplifiers(Opamp),...
This paper proposes modeling and simulation of photovoltaic model. Taking in to account the temperature and sun's irradiance, the PV array is modeled and its voltage current characteristics and the power and voltage characteristics are simulated. This enables the dynamics of PV system to be easily simulated and optimized. It is noticed that the output characteristics of a PV array are influenced by...
Linear design methods for state-quantity observers are used dominantly for power-electronic systems. The main reasons are the problems related to advanced approaches - namely complexity and the high time effort of the necessary stability prove and the design process. In observer and control design, the special characteristics of power-electronic systems are often neglected. The robustness and the...
Networks are very important in many fields of machine learning research. Within networks research, inferring the structure of unknown networks is often a key problem; e.g. of genetic regulatory networks. However, there are very few well-known biological networks, and good simulation is essential for validating and evaluating novel structural inference techniques. Further, the importance of large,...
This paper presents the theoretical analysis, design and simulation of a single phase single stage boost dc-ac converter powered from PV array. The main attribute of the boost inverter topology is the fact that it generates an ac output voltage larger than the dc input one, depending on the instantaneous duty cycle. This paper proposes an accurate solar panel simulation to incorporate the temperature...
This paper focuses on the design and construction of an electric drive system for an electric boat. A number of technical interventions were made to convert a simple boat to an electrically driven boat. In our days the electric boats and the electric propulsion in general constitute a part of the electric transportation. The electric transportation seems to be an alternative solution in the continuously...
An improved Vegas scheme is proposed with a measure of congestion control as average round trip time rather than round trip time. It enhanced the prevention of congestion control. Simulation results demonstrate in some scenario that the instantaneous queue length improved the stability and decreased response time.
This brief proposes a novel multi-objective heuristic. It is a transformation of a mono-objective heuristic into a multi-objective one by addition of an archive and some non dominance computing routines. Performances of the proposed heuristic are demonstrated thru test functions. An application to the optimal sizing of a class AB second generation CMOS current conveyor is presented. Comparison with...
Aiming at the growing phenomenon of cheating in exams using radio-technology, the paper introduces a radio anti-cheat system. It monitors the frequency band occupied by cheating signal (voice signal mostly), and then fires interfering signals in the corresponding frequency band so as to achieve the purpose of suppressing the cheating signal. The performance of interfering signals is very important...
Evacuation simulation can greatly ease the cost of money and material in fire case by using computer. Integrating ABM and GIS technology can not only recurrent the evacuation process, but also analyse optimal evacuation route, optimize the supermarket layout by GIS spatial analysis functions. A model is used to determine the action rules of evacuation staff, simulate the evacuation process on Agent...
In this decade, peer-to-peer (P2P) applications have emerged as popular tools for sharing data and they have gained much attention. Such P2P applications build overlay networks on top of existing infrastructure networks and disseminate data in a peer-to-peer manner. How well the P2P overlay network maps onto the underlying physical network topology can significantly impact P2P application performances...
In new generation cellular networks, opportunistic schedulers take advantage from the delay-tolerance of data applications to ensure that transmission occurs when radio channel conditions are most favourable. “Proportional Fair” (PF) is a well-known opportunistic scheduler that provides a good compromise between fairness and efficiency when transmitting long flows. Unfortunately, the PF algorithm...
Opportunistic routing has gained much attention in recent years as a means of leveraging the broadcast nature of wireless medium. Most of the previous studies focused only on improving throughput, assuming that Best Effort traffic which is delay insensitive is delivered through opportunistic routing. However, when the delay sensitive traffic is involved, it is necessary to consider both the opportunistic...
This paper presents the design of a new diffusion algorithm over adaptive networks. The algorithm assumes knowledge of variance of additive noise. The design is based on the Noise-Constrained Least-Mean Squares (LMS) Algorithm and the new algorithm becomes a type of variable step-size algorithm for which the step-size variation rule results directly from the constraint. The design of the Noise-Constrained...
Frame delay variance in CSMA/CA networks is large. Wireless applications may require both, limited mean delay and limited delay jitter. These parameters can be derived easily from cumulative distribution function (CDF) of frame delay. This paper applies Signal Flow Graphs (SFGs) to calculate the CDF of frame delay in IEEE 802.11 DCF WLANs. SFGs allow to establish a mathematical WLAN model for precise...
For multicast applications with large-scale groups in large-scale wireless sensor networks, it is an important issue for energy saving in geographic multicasting both to obtain location information of destination nodes and to construct the geographic multicast tree efficiently. To address this issue, there have been proposed global search based hierarchical geographic multicasting protocols. Such...
Packet-level erasure correction is considered for downstream packets each of which is delivered from a base station to an individual receiver (i.e., user) over a lossy shared wireless network where only a very limited upstream feedback is provided. Note that, while the destination of each packet is a single user, each packet can be overheard by all users in the shared network. With exploiting this...
P2P (peer-to-peer) streaming systems are getting more and more popular in recent years. P2P streaming architectures can be classified into tree-based and mesh-based. The tree-based architecture has low start-up delay, but is less resilient to node failures compared to the mesh-based architecture, and it would result in a low delivery ratio and unstable quality of received multimedia. In this paper,...
We propose a novel tag collection algorithm to improve tag collection performance in active RFID systems. In the proposed algorithm, an active RFID reader differentiates identified slots from collided and empty slots via an identified-slot-scan phase, in which active RFID tags send minimal responses, and then eliminates collided and empty slots in the following tag-collection phase, in which it collects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.