The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the distributed containment control problem for networked multiple quadrotors with multiple stationary leaders under a directed graph which is the communication topology between the leaders and the followers for arbitrary initial states. Necessary and sufficient conditions on the communication topology are shown. The model of a quadrotor is divided into two subsystems, one is under-actuated...
We propose a procedure for the synthesis of control protocols for systems governed by nonlinear differential equations and constrained by temporal logic specifications. This procedure relies on a particular finite-state abstraction of the underlying continuous dynamics and a discrete representation of the external environmental signals. A two-player game formulation provides computationally efficient...
An earlier investigation on leader-follower consensus protocols for double integrators with multiple time delays [1] is revisited in this paper from two completely different and novel perspectives. First, the crucial stability analysis of time delayed system is replaced with a recent technique called the Cluster Treatment of Characteristic Roots (CTCR). CTCR paradigm is pursued after a block-diagonalization...
Recently, researchers have shown an increased interest in the area of energy efficient operation of the sensors inside the wireless sensor networks (WSNs). The energy efficiency could be achieved by designing an effective routing protocol. Cluster based routing protocol is a well known technique to increase the energy efficiency of the sensor nodes as well as extending the lifetime of the network...
In this paper, we consider group consensus problem by giving a kind of new protocol in which communication graph weights are all nonnegative. This is also consistent with classic protocols. The sufficient conditions which group consensus under this kind of protocols can reach for both single and second order multi-agent system are obtained. Finally, numerical examples are given to illustrate our theoretical...
Distributed imaging using sensor arrays has grown rapidly over past several years. Because image data is characterized by is high volume, an architecture of two tiered visual sensor network is proposed, where storage nodes gather image data from nearby sensors and process sink's query to transmit a time-specific image. However the importance of storage nodes is attractive to attackers. In this paper,...
The use of cluster-based networks is a well known technique to prolong the lifetime of wireless sensor networks (WSNs). In a cluster-based network, a node can be partitioned into a number of small groups called clusters. Each cluster has a cluster-head (CH) node which transmits data collected by each member to the sink node. One of the important issues in cluster-based networks are determining the...
Wireless Sensor Networks (WSNs) contain numerous sensor nodes having limited power resource, which report sensed data to the Base Station (BS) that requires high energy usage. Many routing protocols have been proposed in this regard achieving energy efficiency in heterogeneous scenarios. However, every protocol is not suitable for heterogeneous WSNs. Efficiency of protocol degrades while changing...
Time synchronization plays an important role in UANs, which need fine-grained coordination among nodes. Precise time synchronization is also needed for a variety of other coordinate tasks in UANs such as data fusion, TDMA scheduling, localization, power-saving and so on. Recently, time synchronization protocol for point-to-point with high propagation delay has been proposed, while time synchronization...
The purpose of anonymous credentials is to bring more privacy to digital communication. By using anonymous credentials, users can anonymously prove the possession of personal attributes. The attributes can represent any personal information, including age, citizenship or birthplace. Unfortunately, existing credential schemes miss practical revocation features for revoking invalid, malicious or expired...
Today, the churn phenomenon has been considered in many applications as an important outcome. Social networks can be considered as one of the most important applications with the mentioned outcome. Churn in social networks depends on the users' activity in a communication environment and appears if this activity is less than a required extent. Swarm Intelligence algorithms(SI), assumed to be the proper...
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area,...
One of the most powerful ways to achieve transmission reliability over wireless links is to employ efficient coding techniques. This paper investigates the performance of a transmission over a relay channel where information is protected by two layers of coding. In the first layer, transmission reliability is ensured by fountain coding at the source. The second layer incorporates network coding at...
In recent years, wireless technology has enjoyed a tremendous rise in popularity and its usage opens new fields of applications. Due to their possible deployment in remote locations for civil, educational, scientific, military purposes and security which includes intrusion detection and intrusion prevention are of utmost importance. Distributed wireless sensor networks have problems on detecting and...
This paper presents an efficient approach to an existing batch verification system on Identity based group signature(IBGS)which can be applied to any Mobile ad hoc network device including Vehicle Ad hoc Networks (VANET). We propose an optimized way to batch signatures in order to get maximum throughput from a device in runtime environment. In addition, we minimize the number of pairing computations...
Recently, Wireless Sensor Network (WSN) had grown rapidly. But, The WSN operates as a restricted energy in vulnerable environment. LEACH is a hierarchical clustering protocol that provides efficient consumption of energy. Existences of very large and very small clusters affect performance. FZ-LEACH improves performance for Large-scale WSN. In this paper, we find problem of FZ-LEACH and propose a solution...
Opportunistic scheduling in multiuser system can improves the achievable sum-rate capacity when the number of users increases. The scheduling requires the knowledge of channel state information (CSI) which is generated and sent from the users. In this chapter, the achievable sum rate of multiuser systems with multiple feedback thresholds is formulated. It is demonstrated that the system with two thresholds...
The shortage of parking in crowded urban areas causes severe societal problems such as traffic congestion, environmental pollution, and many others. Recently, crowdsourced parking, where smartphone users are exploited to collect realtime parking availability information, has attracted significant attention. However, existing crowdsourced parking information systems suffer from low user participation...
This study concerns output consensus problems of linear multi-agent systems with fixed topologies and agents described by homogeneous or heterogeneous linear systems. Based on generalized inverse, graph and linear system theory, conditions are investigated for output consensusability with respect to a set of admissible consensus protocols. The given output consensus conditions depend on both topologies...
In Underwater sensor networks (UWSN), Nodes are powered by battery. So saving energy is an important factor to estimate routing protocol. In this paper, we briefly introduced the vector-Based Forwarding and proposed an energy balance method to improve the lifetime of originate VBF. We sensor the energy information of neighbor nodes and decide whether participate in transport packets according the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.