The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years the use of wireless ad hoc networks has seen an increase of applications. A big part of the research has focused on Mobile Ad Hoc Networks (MAnETs), due to its implementations in vehicular networks, battlefield communications, among others. These peer-to-peer networks usually test novel communications protocols, but leave out the network security part. A wide range of attacks can happen...
This paper presents a practical methodology for designing, implementing and deploying IPv6 networks. We use a virtual lab to simulate topologies for different scenarios. These topologies are designed programmatically and then, tested for connectivity and efficiency. In particular, these scenarios include translation mechanisms such as DNS64 and NAT64, tunneling mechanisms such as 6to4 and 6RD and...
In this work, a real time soft fault diagnosis model is proposed for wireless sensor networks (WSNs) using particle swarm optimization (PSO) based classification approach. The proposed model follows in three phases such as initialization, fault identification, and fault classification phase to diagnose the composite faults (combination of soft permanent, intermittent, and transient fault) in the sensor...
Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device, a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components functionality, accepting integration into...
Many-core systems are increasingly popular in embedded systems due to their high-performance and flexibility to execute different workloads. These many-core systems provide a rich processing fabric but lack the flexibility to accelerate critical operations with dedicated hardware cores. Modern Field Programmable Gate-Arrays (FPGAs) evolved to more than reconfigurable devices, providing embedded hard-core...
Asynchronous quasi-delay-insensitive (QDI) circuits are a promising solution for coping with aggressive process variations faced by modern technologies, as they can gracefully accommodate gate and wire delay variations. Furthermore, due to their inherent robustness, such circuits are also promising for deep voltage scaling applications, where delays are orders of magnitude larger. However, QDI design...
Many-core architectures are similar to a computer network, where it is necessary to ensure the security during the execution of sensitive applications. This article discusses two security-related issues: the secure admission of applications and the prevention of resource sharing during their execution. The safe application admission is an open research subject for many-core systems. Although several...
The design of Wireless Network Interface Card device driver, based on PCI bus, is the key part of WMN(Wireles Mesh Network). MIPS and uclinux based development environment, Network Interface Card device driver RT2860 oriented are designed and realized. Combining to network protocol of IEEE 802.11, this paper focuses on the initialization, opening, transmission and receive, interrupt handling of RT2860...
This paper is concerned with the consensus problem for general first-order multi-agent systems over undirected topology. Under the assumption that the topology is connected and every agent receives neighbors information with time-varying communication delay, allowable delay bound depending on the agent dynamics, topology structure and the control gain is obtained. In particular, in case of first-order...
In this paper, the consensus problem of second order multi-agent systems with disturbance is studied under heterogenous position and velocity topologies. The cases that the disturbances are generated from linear exosystems and nonlinear exosystems are considered, respectively. Linear disturbance observer and dynamic-gain-based nonlinear disturbance observer using only the velocity information of the...
This paper discusses the time synchronization issue in wireless sensor networks. An event-triggered average consensus time synchronization algorithm is proposed. This algorithm uses the average time message from one node's one-hop neighbors to update the clock parameters of the node. And it achieved acceptable synchronization accuracy. We also proposed an event-trigger mechanism to reduce the communication...
Periodic event-triggered control for the consensus problem of multi-agent systems is investigated in this paper. Triggering conditions are discussed in two cases: 1) with communication between neighbors at each verification time, 2) with communication at triggering times. Based on Lyapunov theory and algebraic graph theory, consensus conditions on the verification period and triggering condition parameters...
This paper shows the development followed for three different structures of urban light electric vehicles. The first one is based in a Carbon Fiber Reinforced Plastic (CFRP) structure, the second one is a multi-material solution including aluminum, magnesium and structural thermoplastic joined by electromagnetic forces and the third one is based on the use of advanced high strength steel. For the...
This technical note is aimed at studying the joint impacts of the system dynamic structure and the communication topology on the synchronization of multi-linear positive systems. Through rigorous analysis, necessary and sufficient conditions are given to guarantee the coupled systems achieving positive synchronization under the distributed control protocol, and the gain matrix designed is related...
The development of telehaptic communication protocols has gained widespread focus over the past decade. Several protocols have been proposed for carrying out telehaptic activities over a shared network. However, a comprehensive analysis of the impact of the network crosstraffic on the telehaptic stream, and the feasibility of Quality of Service (QoS) compliance, is lacking in the literature. In this...
Communication data in the communication network of the islanded micro-grid can be disturbed by many methods, such as data attack or packet loss. In order to overtake the communication data disturbance (CDD), a new hierarchical control structure is proposed in the paper. Based on the concept of cyber physical system (CPS), the control structure is divided into two layers: cyber layer and physical layer...
In this work, a method to design STIM for sensor network system is proposed. Hardware selects TMS320F28335 as main controller. A common software implementation method is also presented. Electronic spreadsheet and independent interface configuration is the key research points to realize hot-plug function. After testing, system can be used in electric transmission line leakage current and voltage detection...
Manually annotating object bounding boxes is central to building computer vision datasets, and it is very time consuming (annotating ILSVRC [53] took 35s for one high-quality box [62]). It involves clicking on imaginary comers of a tight box around the object. This is difficult as these comers are often outside the actual object and several adjustments are required to obtain a tight box. We propose...
We developed a field management system with a field server that helps decrease farmers workload. It will be also enable the transfer of knowledge to the next generation of farmers in Japan. In order to reduce the burden of agricultural work, less frequent maintenance of the field server is desired. In this paper, we explain construction method of a local wireless network to cut the power consumption...
Nowadays, many requirements must be fulfilled in relation to the application of agrochemicals in different productive stages of the export fruit in Chile. Agronomists in charge of productive orchards should consult different sources of information before proceeding to apply a certain product. This is based on technical guides and protocols that are also modified from time to time, which implies a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.