The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are many applications for which location information plays a crucial role. Finding location information by a sensor node is called the localization problem. The major challenge is to determine the location of unknown nodes based on the known location of other nodes. In this paper, a range-free localization scheme based on fuzzy-logic approach has been proposed. The localization scheme uses the...
For any large scale cloud applications coming around large geographic distribution, the large requirements have to be evaluated by the developers. Simulation procedures are very much useful for the researchers during their research process. Their own algorithms can be tested in a cloud environment using any type of simulators. Therefore, the common toolsets have to be used for evaluation and modeling...
We developed a push-content delivery method for integrated broadcasts on the Internet. To provide services that are highly synchronized between the broadcast programs and push content, we propose a new push-content delivery method that enables simultaneous reception of push content on all terminals.
Phase adjusting and power adjusting input schemes of non-orthogonal Gaussian multiple access channels (GMAC) for two-user with finite input constellations have been studied. In this paper, the input scheme for multi-user is jointly optimized by both powers and phases. This scheme is deduced from the constellation constrained (CC) capacity of multi-user GMAC. Performance analysis indicates that the...
Physical-layer network coding (PNC) can significantly improve the throughput of wireless communication systems by exploiting signal superimposition at relays. It is practically challenging to achieve symbol alignment in PNC. In this paper, we study the impact of the signal power loss and the inter-symbol-interference (ISI) on the system performance when the symbols are not aligned. We show that when...
Polycrystalline materials are solids that are made up of crystals, also called grains, that have varying sizes and orientations. Materials of this class are used in many applications, including steels, films, and electronic interconnects, to name just a few. The factors that influence how the grains in a polycrystalline form are not well understood, although materials scientists and engineers have...
This paper reports the method for the simulation of a rated machinable surface in a machined thin-walled part with a small angle of taper. The procedure for the simulation of a generating surface in the compound milling cutters set equipped with replaceable polyhedral plates within the limits of the creation of the procedure for their modeling is shown.
In this paper, we consider the problem of social learning in a network of agents where the agents make decisions repeatedly on two hypotheses. At every time slot, each agent in the system obtains sequentially a private observation that is independently generated under one of the hypotheses, and makes a decision on choosing the true hypothesis. The private belief of each agent is the posterior of one...
We study maximum likelihood (ML) position estimation using quantized received signal strength measurements. In order to mitigate the undesired quantization effect in the observations, the dithering technique is adopted. Various dither noise distributions are considered and the corresponding likelihood functions are derived. Simulation results show that the proposed ML estimator with dithering is able...
In this paper, we analyze energy-harvesting adaptive diffusion networks for a distributed estimation problem. In order to wisely manage the available energy resources, we propose a scheme where a censoring algorithm is jointly applied over the diffusion strategy. An energy-aware variation of a diffusion algorithm is used, and a new way of measuring the relevance of the estimates in diffusion networks...
Usually, electrical design engineer must take care about three-phase balancing before sending the final version of the LV electric wiring. The conventional method used to verify this task was just to divide all single-phase electrical-loads between the three phases without focusing the consideration on daily load-flow variation of the electrical-loads. For this, this paper describes a necessary new...
In the present scenario, orthogonal frequency division multiplexing (OFDM) systems are greatly utilized in multimedia applications due to their robustness to frequency selective fading channels. OFDM forms the basis for various wireless standards due to its high data rate achieving potential and high spectral efficiency. Despite these advantages, the challenge faced in implementing OFDM system, is...
Behavior selection is the key procedure in cooperation activity, which regularly determines the final direction of the group. This paper focuses on several concrete evolutionary game models, aiming at investigating the selection of individual behavior in the process of evolution. Related simulations have proved that in regard to different games, payoff matrix was closely connected to the final behavior...
The positioning technology is one of the most important technologies in the wireless sensor network. The paper describes the current international positioning on several existing technologies, including the based ranging RSSI, TOA, TDOA, etc. and non-centroid algorithm based on distance, Amorphous algorithm, APIT algorithm and so on. Dv_Hop algorithm is a distributed localization algorithm based on...
In this paper, an electromagnetic transient (EMT) simulation model of multi-microgrid system is established in PowerFactory software for power quality study. The system structure and basic elements in the simulation model are firstly introduced, as well as the control algorithm for distributed generations (DGs). Typical operation scenarios of microgrids are then proposed, in which power quality issues...
Wireless Sensor Networks(WSNs) consists of hundreds of nodes which are of low power, low cost, and tiny devices. The main functionality of these nodes is to sense the environment and send the sensed data to the observer. In order to validate and get the significance of sensing data, location information of the sensor node needs to be combined with the sensed data. In addition to this, there are many...
Extraction of information from an image acquired by real imaging systems is a difficult task, since the observed image may be degraded by blurring. In this paper, a framework for classification of blur in an image is presented and a technique for classification of blur using invariants is proposed. In this method, the blur classification is carried out without estimating the blurring function. The...
In this work, we aim to apply an adaptive Higher order sliding mode controller for trajectory tracking mode of Multi-rotor Unmanned Aerial Vehicles (UAVs) such as a Quadrotor system. The controller consists of the addition of two terms such as nominal term based os classical sliding mode control (SMC) and an adaptive super twisting term. We start the paper by the presentation of the Quadrotor model...
The growing concern in tracking, identification and localization systems has turn Radio Frequency Identification (RFID) technology into a mainstream in scientific research. In this technology, the phenomena known as the tag collision problem is becoming increasingly important, since it leads to a wastage of bandwidth, energy, and an increase in identification delay. There- fore, anti-collision protocols...
In intermittently connected ad hoc networks, a reliable path between communication endpoints may not exist because mobile nodes randomly move during their operation. Furthermore, routing protocols have to work efficiently under constraints of limited bandwidth and energy. These challenge researchers to develop a suitable protocol for the networks. In this paper, we present a new routing protocol,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.