Wireless sensor network (WSN) has the characteristics of large-scale, low cost, low power consumption and high network invulnerability, which can meet the needs of large-scale and fast networking of intelligent distri...
详细信息
ISBN:
(纸本)9781728186160
Wireless sensor network (WSN) has the characteristics of large-scale, low cost, low power consumption and high network invulnerability, which can meet the needs of large-scale and fast networking of intelligent distribution communication system. Because the sensor nodes in WSN of intelligent distribution network have great differences in computing power, storage space, energy and so on, in order to achieve efficient and reliable communication links, it is more appropriate to use heterogeneous nodes for WSN networking of intelligent distribution network. In this paper, the node design method, node deployment method and network routing protocol of intelligent distribution network WSN based on heterogeneous nodes are systematically studied. the transmission success rate basically meets the demand of more than 80%.
Cooperative caching is a promising technique to avoid the increasingly formidable disk bottleneck problem in distributed storage systems;it reduces the number of disk accesses by servicing client cache misses from the...
详细信息
ISBN:
(纸本)0818678135
Cooperative caching is a promising technique to avoid the increasingly formidable disk bottleneck problem in distributed storage systems;it reduces the number of disk accesses by servicing client cache misses from the caches of other clients. However, existing cooperative caching techniques do not provide adequate support for fine-grained sharing. In this paper, we describe a new storage system architecture, split caching, and a new cache coherence protocol, fragment reconstruction, that combine cooperative caching with efficient support for fine-grained sharing and transactions. We also present the results of performance studies that show that our scheme introduces little overhead over the basic cooperative caching mechanism and provides better performance when there is fine-grained sharing.
there exist many voting solutions, which have different benefits and issues. the most significant difficulties faced by such systems are lack of transparency and auditability. Recently developed blockchain technology ...
详细信息
ISBN:
(纸本)9781450371780
there exist many voting solutions, which have different benefits and issues. the most significant difficulties faced by such systems are lack of transparency and auditability. Recently developed blockchain technology may be a solution to these issues. the paper describes the use of intelligent agents and multi-agent system concept for Auditable Blockchain Voting System (ABVS), which integrates e-voting process with blockchain technology into one supervised non-remote internet voting system which is end-to-end verifiable.
In modern cities, the usage of an intelligent Transport Systems (ITS) appears as a suitable solution to reduce urban traffic jams, while minimizes accident occurrence. A crucial task inside a ITS is the Traffic Manage...
详细信息
ISBN:
(纸本)9781665439299
In modern cities, the usage of an intelligent Transport Systems (ITS) appears as a suitable solution to reduce urban traffic jams, while minimizes accident occurrence. A crucial task inside a ITS is the Traffic Management (TM) that plans the routes for the vehicle inside the urban environment. Currently, TMs approaches focus only on urban information (such as time travel, CO2 emission, etc), ignoring the network and connection issues that support the application running inside the vehicle and the technological services of the urban environment. In this way, this lack of concern about the network influences the Quality of Service (QoS) and the Quality of Experience (QoE) of the users inside the vehicle, as well as may compromise the efficiency of the urban services (for example safety solutions, useful content delivery, among others). Within this context, this paper proposes an strategy for vehicle routing (and re-routing), called Network and Urban Observations for Balance (NUOB). NUOB uses both travel time of vehicles and the network flows in a designed heuristic to reach a suitable balance between travel time and packet delivery. the experiments suggest that NUOB improves the packet delivery and reduces the average travel time of vehicles inside the urban environment.
Gigabit network technologies have made it possible to combine workstations into a distributed, massively-parallel computer system. Middleware, such as distributed shared objects (DSO), attempts to improve programmabil...
详细信息
ISBN:
(纸本)0818678135
Gigabit network technologies have made it possible to combine workstations into a distributed, massively-parallel computer system. Middleware, such as distributed shared objects (DSO), attempts to improve programmability of such systems, by providing globally accessible 'object' abstractions, Researchers have developed consistency protocols for replicated 'memory' objects. these protocols are well suited to scientific applications but less suited to multimedia or groupware applications. this paper addresses the state sharing needs of complex distributed applications with (1) high-frequency symmetric accesses to shared objects, (2) unpredictable and limited locality of accesses, (3) dynamically changing sharing behavior, and (4) potential data races. We show that a DSO system exploiting application-level temporal and spatial constraints an shared objects can outperform shared object protocols which do not exploit application-level constraints. We compare our S(emantic) DSO against entry consistency using a sample application having the four properties mentioned above.
Here, we present a distributed adaptive control scheme for cooperative tracking of a class of nonlinear multiagent systems with partially unknown dynamics. the agents should reach an agreement on a time-varying refere...
详细信息
ISBN:
(纸本)9781509049172
Here, we present a distributed adaptive control scheme for cooperative tracking of a class of nonlinear multiagent systems with partially unknown dynamics. the agents should reach an agreement on a time-varying reference trajectory as their virtual leader. the approach combines the artificial potential functions method with robust control terms to reach an appropriate controller for each agent. the unknown dynamics of each agent is approximated by an adaptive fuzzy system, with adaptive laws derived from Lyapunov stability analysis. theoretical analysis reveals that H-infinity performance criterion is satisfied and the effects of uncertainties are kept below a desired attenuation level. the proposed method is applied to the state tracking problem of five inverted pendulums. Results indicate the effectiveness of the proposed approach in handling noise and bounded uncertainties as well as reaching consensus with high precision.
the COVID-19 crisis resulted in a sudden and dramatic change in how manufacturing environments operate. Safe distancing among workers plays a pivotal role in preventing the spread of viral diseases such as COVID-19. A...
详细信息
ISBN:
(纸本)9781665439299
the COVID-19 crisis resulted in a sudden and dramatic change in how manufacturing environments operate. Safe distancing among workers plays a pivotal role in preventing the spread of viral diseases such as COVID-19. Although general purpose commercial products already help prevention, enforcing ad hoc distancing without manufacturing production optimization can significantly decrease the production performance throughput. In this paper, we highlight the intrinsic trade-off of two concepts: worker health preservation versus factory productivity. We first motivate the importance of safe distancing in manufacturing shop-floors by analyzing a worker mobility dataset in a manual assembly scenario, given the safe distancing public health recommendations. then, we suggest the quantification of the relation of the two concepts through exploiting pervasive computing technologies. Furthermore, we provide an insightful recommendation on the need of a holistic methodological framework, specifically tailored for addressing the Industry 4.0 requirements, as well as the worker necessities.
A novel low-power high-precision analog-to-digital converter (ADC) called the successive stochastic approximation ADC (SSA-ADC) has been recently proposed, which has two kinds of outputs from a stochastic flash ADC (S...
详细信息
ISBN:
(纸本)9781509049172
A novel low-power high-precision analog-to-digital converter (ADC) called the successive stochastic approximation ADC (SSA-ADC) has been recently proposed, which has two kinds of outputs from a stochastic flash ADC (SF-ADC) and a successive approximation register ADC (SAR-ADC) modes, respectively. In this paper, we propose a software-level calibration and encoding based on the machine learning for the two outputs to generate an total output. In addition, from the practical viewpoint, we propose an incremental learning which selects additional data by keeping a balance between the uniform random and preferential selections based on the Bayesian estimation at each learning.
Internet of things has emerged as a key technological enabler for broader socio-technical and socio-economic paradigms, such as smart cities and Circular Economy. However, IoT systems are characterised by constraints ...
详细信息
ISBN:
(纸本)9781665439299
Internet of things has emerged as a key technological enabler for broader socio-technical and socio-economic paradigms, such as smart cities and Circular Economy. However, IoT systems are characterised by constraints and limitations which in order to be overcome they need to be deployed in conjunction and in synergy with other emerging ICT. distributed Ledger Technologies (DLT) can help overcome challenges pertaining to data immutability, timeliness and security. However, the use of DLT does not satisfactorily mitigate security risks and vulnerabilities per se and currently cybersecurity aspects of IoT systems are addressed in a fragmented way. Furthermore, the conflict between the resource demanding Blockchains and the highly constrained nature of IoT devices hinders implementation efforts of corresponding systems. We consider networked systems that comprise both IoT and DLT technologies via the prism of intelligent Transportation Systems (ITS). We elicit a three-tier threat model identifying attack vectors at the Device, the Network and the DLT layers. the identified attacks are then ranked by using the DREAD ranking scheme. the use of the threat model is demonstrated on a novel proof-of-concept IoT networked system implemented using the IOTA Tangle distributed ledger, where it helps to critically appraise the design of the system against the most critical attacks. Furthermore, the developed system is among the first in the literature to demonstrate the synergy of IoT and DLT on actual constrained embedded devices. the performance evaluation provides insights showing that such systems can be efficient and suitable for real-life deployment.
暂无评论