The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Self Optimizing Narrowband Interference Canceller (SONIC) is a novel active disturbance rejection algorithm which combines the gain-freezing technique and automatic adjustment of a complex-valued estimation gain. In the paper a new version of the self-adjustment mechanism, based on the extremum-seeking technique, is proposed. To preserve the compactness of the original controller, the adaptation algorithm...
In this study, online identification of state delays is discussed. First, a novel adaptive time delay identification technique is proposed for general classes of autonomous nonlinear systems subject to state delays. As an extension, this technique is modified to design a tracking controller for general classes of nonlinear systems subject to state delays. The main novelty of this controller is that...
In this work we present a state-dependent sampling control that allows for enlarging the sampling intervals of state-feedback control. We consider the case of perturbed linear time-invariant systems with input-delay and guarantee their ℒ2-stability. The approach is based on a novel class of switched Lyapunov-Krasovskii functionals with state-dependent matrices. It results in an LMI problem that allows...
This paper addresses the output consensus problem of heterogeneous multi-agent systems. Specifically, we propose consensus algorithms that account for input saturations using only the available output measurements. Our approach takes roots from a simple design procedure built around ideal first order consensus schemes (full state availability and no input saturations) and extends to the more challenging...
Real-time stream mining such as surveillance and personal health monitoring is computation-intensive and prohibitive for mobile devices due to the hardware/computation constraints. To satisfy the growing demand for stream mining in mobile networks, we propose to employ a cloud-based stream mining system in which the mobile devices send via wireless links unclassified media streams to the cloud for...
This paper presents architecture of CORDIC, embedded with a scaling unit that has only minimal number of adders and shifters. It can be implemented in rotation mode as well as vectoring mode. The purpose of the design is to get a scaling free CORDIC unit preserving the design of original algorithm. The proposed design has a considerable reduction in hardware when compared with other scaling free architectures...
Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth generation of wireless mobility. The wireless backbone is tightly integrated with the Internet by some selected nodes called as Gateways. Common single gateway architecture is inadequate for clubbing this high speed network with the...
Carrier Sense Multiple Access (CSMA) has been widely used as a medium access control (MAC) scheme in wireless networks mainly due to its simple and totally distributed operations. Recently, it has been reported in the community that even such simple CSMA-type algorithms can achieve optimality in terms of throughput and utility, by smartly controlling its operational parameters such as backoff and...
In this paper, we proposed a kind of unicast routing suitable for deep space sensor networks, PEOPHR, on the basis of summarizing existing DTN unicast routing. This routing protocol utilizes a combination of copy and forward strategies. Its routing process consists three phrases: Bundle distribution based on copy strategy phase", "optimal path calculation based on WAOM routing selection...
Hadoop MapReduce is a widely used parallel computing framework for solving data-intensive problems. To be able to process large-scale datasets, the fundamental design of the standard Hadoop places more emphasis on high-throughput of data than on job execution performance. This causes performance limitation when we use Hadoop MapReduce to execute short jobs that requires quick responses. In order to...
Data aggregation is generally considered an important method used to reduce traffic and increase lifetime of wireless sensor networks in both two- and three-dimensional space. It is challenging to develop efficient data aggregation solution for the wireless sensor networks since quality-of-service, such as end-to-end delay, is considered as a severe criterion required in many scenarios. In this paper...
Efficient data delivery in vehicular ad hoc networks (VANETs) is particularly challenging due to the unique characteristics of VANETs, such as fast topology change, frequent disruptions and rare contact opportunities. We observe through empirical study that a considerable amount of packets cannot be delivered within time-to-live (TTL). The wide use of third generation (3G) networks inspires us to...
This paper proposes silence drop first algorithm(SDF) for the active buffer management. This algorithm finds and drops silence packet rather than talkspurt packet in the queue for resolving buffer overflow of queue. This algorithm can serve more simultaneous user while maintain voice service quality with same link capacity. Simulations with voice codec of G.711 and G.729a are performed in this paper...
In this paper we examine the potential for designing digital (IIR) filters with minimal group delay, which are relevant for real-time applications. By formulating filter design as a multi-objective optimization problem and approaching it with an unbiased metaheuristic search algorithm, we have established relationships between filter delay and other filter objectives. These relationships are presented...
Supporting effective and efficient data delivery in delay tolerant networks (DTNs) is a challenging problem due to the nature of the network. In this paper, we propose to use network coding technique based on Growth Code to improve the performance of data delivery in DTNs. We incorporate Growth Codes into Epidemic Routing and First Contact routing in DTNs to provide two network coding based routing...
In this paper, we propose an adaptive permission probability control mechanism that can be used in conjunction with the existing tree algorithm. This mechanism is designed to lower the risk of collision by reducing the number of accessing attempts in each subgroup. It can be observed from the results that under the heavy load condition, when the number of users is more than the number of subgroups,...
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper, we introduce a set of duty-cycle...
The core idea of cognitive radio technology is to realize the dynamic spectrum allocation and spectrum sharing through spectrum sensing and system learning. This paper sets the throughput and delays as the algorithm design target, puts forward a cognitive radio multi-channel routing algorithm based on a modified PCNN (MPCNN), which fully considered the multi-channel characteristic, through both the...
This paper examines different traffic splitting strategies for multipath IP networks. The question is whether today's widely deployed algorithms perform well in all situations. We have implemented in a simulator and analyzed different well-known algorithms. Throughout our study several kinds of traffic traces have been used: real ones captured at backbones as well as at access networks, and specially...
Nowadays Wireless Sensor Networks are increasingly accepted as a reliable solution to highly demanding and critical application scenarios such as military and medical environments, where security support is an absolute prerequisite. However, supporting security implies the execution of cipher algorithms posing significant overheads on WSN nodes, which suffer from scarce resource availability. Moreover,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.