The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ns-3 is a widely used as a the network simulator of choice by researchers. It contains many well tested and high quality models of network protocols. However, the application layer models of ns-3 are very simplistic, and do not capture all aspects of real life applications. As a result, there is often a huge gap between the results of real experiments and the corresponding simulations. This problem...
Reproducing complex networks with features of real-life networks is exciting and challenging at the same time. Based on the popular Omnet++ discrete event simulator, we introduce Armonia, a framework for modeling massive networks and their dynamic interactions. It includes a collection of topology generators, a set of resource placement and replication modules, a component for specifying resource...
Reproducing complex networks with features of real-life networks is exciting and challenging at the same time. Based on the popular Omnet++ discrete event simulator, we introduce Armonia, a framework for modeling massive networks and their dynamic interactions. It includes a collection of topology generators, a set of resource placement and replication modules, a component for specifying resource...
As an integral part of the Ethernet standard IEEE 802.3, the Ethernet Powerlink protocol is widely used in the automation industry. It is a software-based solution and achieves some real-time capabilities. It satisfies data transmission demands by guaranteeing communication with very high speed and accuracy. In effort to make implementing Powerlink protocol easier, we build a formal Powerlink model...
In this paper, we present a distributive target-centric formation controller with saturated control action for multiple unmanned aerial vehicles (UAVs). The desired target-centric formation is maintained using consensus protocol. We show that if there exists at least one vehicle in the group of agents who has the complete target information and corresponding communication graph is connected, then...
The communication standard IEC 61850 which is defined for information exchange in smart grids, has been increasingly used for Substation Automation Systems (SAS). Current mainstream communication technologies such as switched Ethernet and TCP/IP have been adopted for the communications networking. However, with the growing amount of IEDs in one collision domain, a risk of violation of transmission...
Our team has been developing a System on a Chip (SoC) and is using Synopsys VDK to accelerate both software development and hardware verification. We will discuss how VDK has helped us achieve our primary goal of starting software development and testing prior to design fabrication and our secondary goal of testing our RTL with software. The platform creation process and our transition from RTL-only...
Cloud computing has experienced enormous popularity and adoption in many areas, such as research, medical, web, and e-commerce. Providers, like Amazon, Google, Microsoft, and Yahoo have deployed their cloud services for use. Cloud computing pay-as-you-go model, on demand scaling, and low maintenance cost has attracted many users. The widespread adoption of cloud paradigm upshots various challenges...
Private Information Retrieval (PIR) is the fact that a client retrieves a certain record from a remote database managed by untrusted parties without letting them know which record has actually been requested, thus preserving the privacy of the client. Ostrovsky and Skeith showed in [1] that any homomorphic encryption can actually be used to achieve PIR. In this paper we use their protocol as basis...
Cloud computing is a kind of internet-based computing, it outstanding property is on-demand computing. As an important service, cloud storage is able to provide users and enterprises with various capabilities to store and access their data in the centers. It relies on sharing of resources to achieve coherence and economies of scale. However, in most of data sharing protocols, to update the outsourced...
Communication services to support information exchange between simulation applications participating in the distributed interactive simulation (DIS) environment are defined. These communication services describe a connectionless information transfer that supports real-time, as well as non-real-time, exchange. Several communication profiles specifying communication services are provided.
Predicting the capacity of wireless mesh networks is difficult, due to the complex interaction of various layers such as the radio environment, media access protocols, network protocols and, traffic load and types. When modelling and simulation takes into account the interaction of all these factors, it can facilitate insights into anticipated network behaviour. These insights can be used to more...
Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. WSNs measure environmental conditions like temperature, sound, pollution levels, humidity, wind speed and direction, pressure, etc. Sensors are usually attached to microcontroller...
In this paper, we discuss the consensus of discrete-time multi-agent system. Based on the network topology, consensus protocol in discrete-time with dynamic step-size is designed. Conventional algorithms need man made step-size generally, having a great non-natural impact. The new algorithm employs a self-adaptive dynamic step-size based on the network topology, with little non-natural factor, and...
In delay tolerant networks, the design of routing strategy is very challenging due to the characteristics of dynamic topology, long delay and intermittent connectivity. Most of existing routing strategies neglect the number limitation of intermediate nodes during forwarding messages. Owing to the small-world feature in delay tolerant networks, messages can reach destination nodes at most by five or...
The growing concern in tracking, identification and localization systems has turn Radio Frequency Identification (RFID) technology into a mainstream in scientific research. In this technology, the phenomena known as the tag collision problem is becoming increasingly important, since it leads to a wastage of bandwidth, energy, and an increase in identification delay. There- fore, anti-collision protocols...
In this paper, we analyze moments of instantaneous signal-to-noise ratio (SNR) in a multichannel relay system with subchannel pairing (SP) over Rayleigh fading environments. With aid of order statistics, new unified expressions of moments of the SNR are derived in closed-form for three SP cases, i.e., ordered subchannel pairing (OSP), reversely ordered subchannel pairing (ROSP) and non-subchannel...
This paper discusses the implementation of a tactical network simulation tool. The tool is called Tactical Network Modeller (TNM). TNM uses some novel techniques to simplify the building of the network model using graph theory constrained by a hierarchical tree which reflects the organisation structure. TNM allows models to be constructed using an Application Programming Interface (API) or a node...
Finding a perfect Embedded Engineer in India is really a challenge for private organizations. Lack of practical experience and real time exposure let the companies to think about a Fresher. As of advancement in the technology the academic regulations should also be updated. Embedded System is a fast and vast emerging field where a lot of employability is required in recent days. In order to update...
It has been shown that secure communication between two partners can be achieved with devices containing components with quantum properties. While such devices are in timid stages of practical availability, the quantum properties exhibited are well defined theoretically: quantum bits (qubits) in persistent quantum states, quantum transformations or gates applicable on qubits, and quantum communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.