The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Services are increasingly being hosted on cloud nodes to enhance their performance and increase their availability. The virtually unlimited availability of cloud resources enables service owners to consume resources without quantitative restrictions, paying only for what they use. To avoid cost overruns, resource consumption must be controlled and capped when necessary. We present a distributed tree-based...
This paper provides an analysis of the Dynamic frame Aloha (DFA) protocol with frame Restart. Although a previous work has numerically provided the best restarting strategy when the number of tags N is known, that strategy is represented by a table whose entries are so many to be impractical for high values of N. Here we provide a simpler set of equations that, besides the optimal strategy, lead to...
This paper investigates the problem of distributed formation control for perturbed and delayed MASs (Multi-Agent Systems) with multiple dynamic leaders in directed topologies. Based on the established stable theory of stochastic delay differential equations, some sufficient conditions are obtained that allow the required formations to be gained at exponentially converging speeds with probability one...
In this paper we develop an approach for the control of evolution of a multi agent system (MAS) based on a new local inter-agent communication protocol. The agents of the MAS occupy a compact region, have n-D dynamics, and are guided by n+ 1 special leader agents that can move independently. The rest of the agents, called followers, have the ability to update their positions via local communication...
In this paper a convergent, nearest-neighbor, consensus control protocol is suggested for agents with nontrivial dynamics. The protocol guarantees convergence to a common point in space even if each agent is restricted to communicate with its nearest neighbor. The neighbor, however, is restricted to lie outside an arbitrarily small priority zone surrounding the agent. The control protocol consists...
Real-time train localization using wireless sensor networks (WSNs) offers huge benefits in terms of cost reduction and safety enhancement in railway environments. A challenging problem in WSN-based train localization is how to guarantee timely communication between the anchor sensors deployed along the track and the gateway deployed on the train with minimum energy consumption. This paper presents...
A novel multi-tracking problem is introduced in multi-agent networks. The states of multiple agents in each subnetwork asymptotically converge to the same desired trajectory in the presence of information exchanges among subnetworks. A protocol with aperiodic sampled-data is proposed to achieve the multi-tracking of second order discrete-time multi-agent networks. The stability of dynamic systems...
This article is devoted to consensus control problem for discrete-time higher-order multi-agent systems. A novel distributed control protocol with one-step predictive output feedback is proposed to improve dynamic performance for consensus convergence. It is shown that consensus is reached if and only if there exists a common control gain which simultaneously stabilizes N−1 systems in a special form,...
This paper studies privacy issues related to epidemiological studies. Epidemiological studies need to preserve the privacy of subjects because they use personal information. Thus, privacy is preserved using a secure scalar product protocol based on a public-key cryptosystem and the secure function evaluation. However, the secure function evaluation has performance limitations in evaluating a product...
In military operation or emergency response situations, very frequently a commander will need to assemble and dynamically manage Community of Interest (COI) mobile groups to achieve a critical mission assigned despite failure, disconnection or compromise of COI members. We combine the designs of COI hierarchical management for scalability and reconfigurability with COI dynamic trust management for...
In this paper, we propose and investigate a simple, low-complexity and deterministic cooperative protocol that exploits Network Coding (NC) within a wireless network. The scenario under investigation is for Long Term Evaluation Advanced (LTE-A) downlink communication system network, where a source of data sends k stream of packets to a Pico relay which forwards them to two Femto relays via fiber optic...
In this paper, we present the analysis of the new transmission algorithm of RFID in form of multichannel which has been developed from frame slotted ALOHA protocol. By using concept of the tag transmission group division which differ in slot access ability and the multinomial distribution foundation for calculate each probability of successful transmission slots. And compare with the ordinary frame...
In this paper we derive a new upper bound on the quantum key distillation capacity. This upper bound is an extension of the classical bound of Gohari and Anantharam on the source model problem. Our bound strictly improves the quantum extension of reduced intrinsic information bound of Christandl et al. Although this bound is proposed for quantum settings, it also serves as an upper bound for the special...
Wireless sensor network is an important part of the Internet of Things. Preservation of privacy and integrity in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper an efficient and secure range query protocol in two-tiered wireless sensor networks introducing master nodes. Our proposal not only prevents adversaries from gaining sensitive...
Algorithm Based Fault Tolerant (ABFT) approaches promise unparalleled scalability and performance in failure-prone environments. With the advances in the theoretical and practical understanding of algorithmic traits enabling such approaches, a growing number of frequently used algorithms (including all widely used factorization) have been proven ABFT-capable. In the context of larger applications,...
Cognitive radio (CR) technique is considered an effective mechanism to relieve the spectrum scarcity issue, where the secondary users (SUs) can utilize the idle spectrum of the primary users (PUs). How the performance of the wireless network will be influenced by the introduction of CR technique has been attracting much attention in past years. While many efforts have been made to study the cognitive...
We address the problem of shock wave formation in uncoordinated highway traffic. First, we identify the combination of heavy traffic and small traffic perturbations or unexpected driver actions as the main causes of highway traffic jams. Then we introduce a novel distributed communication protocol that enables us to eliminate upstream shock wave formation even with low system penetration rates. Based...
The formation of Autonomous Underwater Vehicles (AUV) has been increasingly researched with tremendous amount of potential applications, e.g., environment monitoring or surveillance, self-localization and mapping, as well as security patrol. However, acoustic modem is almost the only instrument up to now can effectively work for multi-AUV communications, which is a big limitation in comparing with...
An Internet of Things (IoT) system connects a large amount of tags, sensors, and smart devices often with mobility to facilitate information sharing, enabling a variety of attractive applications. On the one hand, the service oriented architecture (SOA) can provide connectivity and interoperability among heterogeneous IoT devices in the physical network. On the other hand, IoT devices are virtually...
Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.