The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-Physical System on Chip (CPSoC) is a special class of MPSoC consisting on-chip sensor-actuator integration to achieve self-awareness. This design sophistication is acquired by implementation of traditional processor cores along with virtual sensing and actuating IPs and connecting them by means of Network on Chip (NoC). In case of NoC, the network topology and routing decides the throughput...
A quorum system is a collection of process sets (quorums) which intersect among themselves. Quorums are used by many distributed applications such as mutual exclusion, data replication, and for the dissemination of information. This work presents an autonomic solution to build a majority quorum system that is self-adaptive by dymically reconfiguring itself if processes fail. Processes can fail by...
In smart cities, providing structural health care for multi-storey buildings and bridges are major challenges. Corrosion is the major cause of structural failures in civil infrastructures. Continuous monitoring is essential for timely actions like strengthening of reinforced concrete, repainting the structures using special paints to avoid further corrosion and for performing repairing works. The...
Cloud Computing is the technology provisioning services from remote Cloud Data Centers (CDC) using the Internet technologies where services range from compute to storage. This technology has evolved from distributed computing and it incorporates other technologies namely virtualization, grid and utility computing. The rate of users getting facilitated by the CDC increases exponentially. In this scenario...
This paper considers the problem of network monitoring and management in distributed wireless industrial control systems. The urgency of the implementation of management and monitoring systems in such networks is stated. The possibility of using network management architectures known from general purpose networks is shown. Usage of a mixed approach to realize monitoring and management system in wireless...
Software-defined networking is a modern network paradigm that eases networks management, and enables dynamic networks configuration by separating the control plane from the data plane. But the struggle of failure detection and recovery in a timely manner is still intractable. In this paper we introduce a failover scheme using per-link Bidirectional forwarding detection sessions and preconfigured primary...
The wireless sensor network (WSN) consist of wireless sensor nodes, which are deployed randomly in a surge of unforeseen applications. Topology Control (TC) is the most essential approach used for minimizing energy consumption that extends the in WSN time. Also increases the throughput of the topology and minimize the radio interference. The aim of the proposed context aware topology control is to...
Many restructured power markets rely on Financial Transmission Rights (FTRs). FTRs are financial contracts that entitle the holder to a stream of revenues (or charges) based on the day-ahead hourly congestion price difference across an FTR related energy path. Holders obtain FTRs through an auction mechanism relying on the solution of a specially formulated OPF problem. FTR holders then receive or...
Real time monitoring and control of wind power farm (WPF) require a highly reliable communication network infrastructure. The monitoring and control can be guaranteed through the communication network by using redundant resources and ensuring quality of service (QoS) for different applications. In this paper, we study and simulate fault-resilient network architecture for monitoring and controlling...
Network function virtualization is quickly gaining acceptance as the new approach to delivering communication services. The promises of greater flexibility and dramatically reduced time to introduce new services coupled with the cost advantages, are driving communications service providers(CSP) around the world to begin deploying NFV-based services. But NFV service is actually operated based on virtualization...
The Wireless Sensor Network (WSN)-based pipeline monitoring systems are expected to have long life time in order to make their deployment cost-effective. In reality, wireless transceivers are considered one of the main consumers of energy in individual sensor nodes of WSNs. The duty cycling technique which puts transceiver module into sleep state for the majority of sensor node's operating time is...
Security in wireless sensor networks is critical due to its way of open communication. Packet modification is a common attack in wireless sensor networks. In literature, many schemes have been proposed to mitigate such an attack but very few detect the malicious nodes effectively. In the proposed approach, each node chooses the parent node for forwarding the packet towards sink. Each node adds its...
This paper presents a context-aware Personal Area Network (PAN) coordinator selection algorithm - CAPCoS, for real-time acquisition of physiological data of soldiers in battle-field. PAN coordinator selection procedure in Wireless Body Area Networks (WBANs), must have some WBAN specific attributes and scenario specific attributes. In this work, we consider three criteria such as - successful delivery...
Formal localized reactive model of Subnet-based Failure Recovery of Sparsely Connected Network for monitoring less critical areas of border is presented in this paper to reduce monitoring by soldiers. It involves Wireless Sensor and Actor Networks (WSANs) partitioned into subnets. The topology of the subnets is sparsely connected in less critical areas where fewer sensors and actors are required....
Recently significant improvement in wireless sensor and actor networks has been made due to the increased interest of researchers. But still there is a need to overcome many operational challenges particularly in safety-critical and mission-critical large-scale applications. We propose a model of Subnet-Based Backup Assigning (SBBA) algorithm in wireless sensor and actor networks which assumes partitioning...
As data volumes and the need for timely analysis grow, Big Data analytics frameworks have to scale out to hundred or even thousands of commodity servers. While such a scale-out is crucial to sustain desired computational throughput/latency and storage capacity, it comes at the cost of increased network traffic volumes and multiplicity of traffic patterns. Despite the sheer reality of the dependency...
With the increase of water-inrush accidents from coal mine, water-inrush prediction has become a significant aim for coal mine safety experts. As an intelligent classifying algorithm, the Classification and Regression Tree (CART) is a potential method for predicting the possibility of water inrush from coal seam floor. One of its main advantages is that the Decision Rules (DRs) can be extracted from...
Visual management for industrial wireless sensor network not only requires quickly data process, but also the higher interact ability of graphical interface. However, the visual management has exists now which are just publish the equipment and relationship by list, they are little relate to simulated reality topological distribution. Based on research the topological structure of ISA100.11a protocol...
Due to the increasing penetration of distributed generation resources, more and more microgrids can be found in distribution systems. This paper proposes a phasor measurement unit based distance protection strategy for microgrids in distribution system. At the same time, transfer tripping scheme is adopted to accelerate the tripping speed of the relays on the weak lines. The protection methodology...
Along with the rapid development of the power industry, distribution networks get more sophisticated. Traditional fault location methods have obvious drawbacks. In this paper, an accurate and efficient method based on multi- source information from protective equipment and FTUs (Feeder Terminal Unit) as well as voltage sag profiles from monitored node is proposed for fault location in distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.