The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opportunistic routing is widely known to have substantially better performance than traditional unicast routing in wireless networks with lossy links. However, wireless sensor networks are heavily duty-cycled, i.e. they frequently enter deep sleep states to ensure long network life-time. This renders existing opportunistic routing schemes impractical, as they assume that nodes are always awake and...
In this paper we develop a novel bottleneck model which assumes that the capacity of the bottleneck is stochastic and follows uniform distribution. Commuters form a heterogeneous population with distinctive requirements on the probability of punctual arrival and the commuters' trip scheduling follows user equilibrium (UE) principle in terms of the mean travel cost. The analytical solution of the proposed...
Ethernet is increasingly recognized as the future communication standard for distributed embedded systems in multiple domains such as industrial automation, automotive and avionics. A main motivation for this is cost and available data rate. A critical issue in the adoption of Ethernet in these domains is the timing of frame transfers, as many relevant applications require a guaranteed low-latency...
In this paper we present a novel analysis for complex safety-critical real-time systems involving component-based design and abstraction models. The analysis combines deterministic and probabilistic models for component interfaces; based on the bounded curves (deter-ministically or probabilistically). These results, through the usage of probabilities, can offer different degrees of realtime guarantees...
In explicit or delay-driven congestion control, a common objective is to sustain high throughput without long queues and large losses at the bottleneck link of the network path. Congestion control protocols strive to achieve this goal by transmitting smoothly in the steady state. The discovery of the appropriate steady-state transmission rates is a challenging task in itself and typically introduces...
Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only partly connected. In this harsh environment,...
Managed software development organizations are de facto closed loop systems, in which management actions influence future behavior based on observations of previous behavior thus forming a closed feedback loop. It is well known from control theory that a closed loop system might exhibit dynamics very different from the dynamics of its open loop components. Therefore, it is the goal of this work to...
This paper discusses mobile hidden station (MHS) problem which is a significant source of packet collisions in medium access control (MAC) protocols of vehicular networks due to relatively high node speeds. MHS problem occurs when mobile stations that are not present in the channel reservation period enter and disturb the existing communications. We present effect of MHS problem using Markov model...
The aim of this article is modeling, simulation, control and complex design of Active Magnetic Levitation Systems (AMLS). In this application is necessary to proposed the effective control law for the stable operation in levitation mode because these devices in nature are essentially unstable. The stabilizing controller has to generate the appropriate value of electromagnetic force to levitate an...
A population growth model that represents the growth trajectories of individual subjects is critical to study and understand neurodevelopment. This paper presents a framework for jointly estimating and modeling individual and population growth trajectories, and determining significant regional differences in growth pattern characteristics applied to longitudinal neuroimaging data. We use non-linear...
In this work, we present an empirical support of an analytical approach which employs a frequency domain analysis for estimating end-to-end delay in multi-hop networks. The proposed analytical results of the end-to-end delay distribution are validated through simulation and compared with queueing based analysis by defining two concrete scenarios. Our results demonstrate that an analytical prediction...
For the rotary inverted pendulum system in network control system, a variable structure control method with time-varying sliding surface of delay compensation is proposed. The inverted pendulum system model was established and analyzed, and the sliding surface and sliding mode control law design process were shown. Through using MATLAB/Simulink control system design and simulation tools to analyze...
Desynchronizing streams of frames through the means of offsets has today become common practice in automotive CAN networks. This is because this traffic shaping strategy is very beneficial in terms of reducing response times especially at high load levels. However, to the best of our knowledge, there is no result available in the literature that allows the response times of frames with offsets to...
Incremental opportunistic relaying (IOR) has been proposed to increase the spectral efficiency of the two-phase cooperative transmissions by exploiting limited feedback from the destination node. Specifically, the relaying process is activated only if the source-destination channel is of insufficient quality. In this case, the feedback instructs the best relay to forward the source message to the...
One of the today challenges for the mesh networks researches is reliable transmission of multimedia traffic. This traffic demands high quality of service (QoS), to provide which it is suitable to use Mesh Coordinated Channel Access (MCCA) — the novel medium access method described in IEEE 802.11s. According to MCCA, mesh stations (STAs) set up periodic reservations; if all STAs in the network support...
Vehicular Ad hoc Networks (VANETs) provide vehicle-to-vehicle and vehicle-to-infrastructure communication using Dedicated Short-Range Communications (DSRC). The core objective of VANETs is to provide safety message communication among vehicles. In dense urban traffic, safety message communication encounters severe packet collisions due to excessive number of nodes contending to access the control...
For centralized selection of communication relays, the necessary decision information needs to be collected from the mobile nodes by the access point (centralized decision point). In mobile scenarios, the required information collection and forwarding delays will affect the reliability of the collected information and hence will influence the performance of the relay selection method. This paper analyzes...
With the advent of multi-core architectures, worst case execution time (WCET) analysis has become an increasingly difficult problem. In this paper, we propose a unified WCET analysis framework for multi-core processors featuring both shared cache and shared bus. Compared to other previous works, our work differs by modeling the interaction of shared cache and shared bus with other basic micro-architectural...
Traffic volume control is one of the fundamental requirements in traffic generation and transformation. However, due to the complex interactions between the generated traffic and replay environment (delay, packet loss, connection blocking, etc), controlling traffic volume in interactive network traffic replay becomes a challenging problem. In this paper, we present a novel model-based analytical method...
Newer link-layer protocols - including Energy Efficient Ethernet (EEE) - support a sleep mode to save energy during idle periods. Bursting or coalescing of packets can be used to reduce the overhead from sleep-wake transitions for such links. We develop an energy-delay model for a coalescing queue given deterministic interarrival and service times. We also model the delay of a downstream queue. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.