The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We evaluate a routing metric, called TXPFI, which captures the expected number of frame transmissions needed for successful delivery of data in Wireless Sensor Networks (WSNs) featuring non-fully cooperative nodes and unreliable links. The study, which addresses the exploitation of the TXPFI in routing protocols of distance-vector type, assesses the impact of different network settings on the performance...
Mobile Ad Hoc Networks (MANETs) use many different routing protocols to route data packets between nodes. These routing protocols are designed taking for granted that all nodes are cooperative and willing to forward control and data packets from and to other nodes. However, when selfish nodes exist in the network, the network performance may degrade significantly. In previous research, selfish nodes...
Due to intermittent connectivity and uncertain node mobility, opportunistic message forwarding algorithms have been widely adopted in delay tolerant networks (DTNs). While existing work proposes practical forwarding algorithms in terms of increasing the delivery rate and decreasing data overhead, little attention has been drawn to the control overhead induced by the algorithms. The control overhead...
This research estimates the minimum intervention distance needed for a vehicle to safely avoid an obstacle, while also preventing wheel lift and tire skid. The intervention strategy considered is an open-loop lane change avoidance trajectory. As the vehicle approaches the obstacle, it continually determines the available lane change maneuver, relying on predictions of the Zero-Moment Point (ZMP) metric...
Recently we proposed a simple, computationally inexpensive multi-agent simulation strategy to understand drop movement in a microchannel with Hele-Shaw flow geometry (2D). This has helped us understand the collective behavior of the drops in these systems. However, transitioning these systems to practice would require that strategies are developed to combat the inherent fluctuations that are a part...
While the services-based model of cloud computing makes more and more IT resources available to a wider range of customers, the massive amount of data in cloud platforms is becoming a target for malicious users. Previous studies show that attackers can co-locate their virtual machines (VMs) with target VMs on the same server, and obtain sensitive information from the victims using side channels. This...
Wireless Sensor Networks (WSNs) often need to operate under strict requirements on energy consumption and be capable of self-adapting to the presence of non-trusted nodes which do not fully cooperate in the packet forwarding operation. In such an environment, the mechanism employed for the calculation of routing paths of minimum cost in terms of the number of transmissions executed for the reliable...
In this paper, we used our proposed and implemented system based on Hill Climbing algorithm, called WMN-HC for mesh router node placement in WMNs. We evaluate and compare the performance of the proposed system for different movement methods. We took into consideration Normal and Uniform distributions of mesh clients. We use as evaluation metrics giant component and number of covered mesh clients....
A threshold based Schnorr-Euchner (TSE) sphere decoder (SD) is presented in this paper to reduce the high computational burden incur in multiple input multiple output (MIMO) decoding. The proposed method makes use of the probabilistic threshold for SE enumeration to remove the nodes which are most unlikely to be an ML solution. The threshold is chosen using the pruning probability based on noise statistics...
In this paper, we evaluate privacy preservation capability of biometric hashing methods. Although there are some work on privacy evaluation of biometric template protection methods in the literature, they fail to cover all biometric template protection methods. To the best of our knowledge, there is no work on privacy metrics and assessment for biometric hashing methods. We use several metrics under...
Electromagnetic analysis of antennas in complex scenarios require accurate numerical modelling solvers. A fundamental requirement to achieve truthful results is the accurate representation/modelling of the source antenna. However, in many practical cases a full-wave representation of the physical antenna is either unfeasible or unavailable in the format required by the desired computational electromagnetic...
Recent years have witnessed two major trends in the development of complex real-time embedded systems. First, to reduce cost and enhance flexibility, multiple systems are sharing common computing platforms via virtualization technology, instead of being deployed separately on physically isolated hosts. Second, multicore processors are increasingly being used in real-time systems. The integration of...
In spite of the existing protection limits and despite the fact that no research results have proven any health effects below these limits, the public fears towards electromagnetic fields, mobile telephony and the radiofrequencies used, remain important. The EMF exposure from wireless communication systems and networks is often cited as a major cause of public concern and is frequently given considerable...
We developed a near-field coupling communication (NFCC) technology that uses the surface of the human body as a data transmission path in the MHz band. It is important to assess the loss of signal propagation on the human body to design a “touch and connect” form of stable NFCC links. We measured the signal propagation characteristics on a phantom equivalent to the human body with an electrically...
This study aims to present the effectiveness evaluation of job-shop scheduling based on TOC concept under demand variation using simulation technique. Two schedule performance measurements under uncertainty, schedule robustness and performance, are used in comparing the performance of schedule based on TOC and traditional method (minimizing Cmax). Simulation test scenarios are carried out by applying...
This paper investigates the down-converted mixer verification using the measured X-parameter in future system-level simulation. The X-parameter measurement system utilizing Agilent's nonlinear vector network analyzer (NVNA) and the external RF signal generator can provide the desired stimulus to device under test (DUT) at the specified port in order to measure and respond to the non-linear DUT characteristic...
The higher data rate in coded MIMO systems needs higher performance and lower computational complexity. This paper proposes a method to improve the performance and reduce the computational complexity in coded MIMO system, such as IEEE 802.11ac. The proposed scheme based on log likelihood ratio with QRM-MLD (QRM-MLD-LLR) needs to expand the estimated channel matrix H by MMSE scheme firstly, and use...
Magnetic gears are becoming attractive since they offer advantages such as low vibration and acoustic noise, and low maintenance operation in comparison with conventional mechanical gears. Planetary type magnetic gears, especially, have larger transmission torque than the other types. Therefore, the planetary type magnetic gears are expected to be put into practical use. In this paper, first, torque...
As a new kind of dispensing technology, jetting dispensing has a broad application prospect. The dispenser driven by two piezoelectric stacks can realize high frequency and nano dispensing to some certain viscosity of adhesive. In order to analyze the dynamic character of the needle, The model of the dispenser is established, and simulated with Matlab. Then two piezoelectric stacks' input voltages...
Modern mobile devices comprise multiple interfaces for heterogeneous network technologies. However, currently implemented mechanisms to decide which one(s) to use and distribute application flows accordingly (i.e., solving the multihomed flow management problem, MFM) are rather coarse and do not leverage the opportunities. A user-centric quality-aware (QA) MFM has been proposed which optimises network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.