We formulate a nonlinear distributed control law that guides the motion a group of sensors to achieve a configuration that permits them to optimally localize a hazardous source they must keep a prescribed distance fro...
详细信息
ISBN:
(纸本)9781479930807
We formulate a nonlinear distributed control law that guides the motion a group of sensors to achieve a configuration that permits them to optimally localize a hazardous source they must keep a prescribed distance from. Earlier work shows that such a configuration involves the sensors being placed in an equispaced manner on a prescribed circle. The nonlinear control law we propose assumes that each sensor resides and moves on the prescribed circle, by accessing only the states of its two immediate clockwise and counterclockwise neighbors. We theoretically prove and verify through simulations, that the law allows the sensors to achieve the desired configuration while avoiding collisions.
Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information tech...
详细信息
Community Cloud computing is a new trend on cloud computing that aims to build service infrastructures upon Wireless Community Networks taking advantage of underused community physical resources. Service allocation pr...
详细信息
A Multi-agent System can be considered as distributed system consisting of multiple interacting intelligent agents acting on a common environment. Agents in multi-agent system achieve the global objective of the syste...
详细信息
ISBN:
(纸本)9781479930807
A Multi-agent System can be considered as distributed system consisting of multiple interacting intelligent agents acting on a common environment. Agents in multi-agent system achieve the global objective of the system by controlling the local parameters of individual agent. Self-organizing, self-steering and self-configuring capabilities are highly desired in the functioning of a distributed system. Nature inspired Flocking Algorithms have the potential to introduce these capabilities in the functioning of distributed system due to their inherent emergent behaviour. The contribution of this paper is twofold. Firstly, a novel algorithm is proposed for achieving self-organized circular formation control while tracking a target. Second, the proposed algorithm is analyzed for performance parameters and is found to be efficient. Simulations are carried out and the proposed algorithm is verified.
Wireless communication can provide ubiquitous access to the internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicat...
详细信息
ISBN:
(纸本)9783038351559
Wireless communication can provide ubiquitous access to the internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted computing can be used to improve security status of endpoint. Applying Trusted computingtechnology can solve these challenges and enhance WLAN security.
With the rapid development of network technology, network scale, the increasing complexity, traditional centralized network data collecting the methods already cannot adapt to this situation, a web-based distributed c...
详细信息
This paper discusses the application of cloud computing in the logistics information platform, First introduced the basic concept and advantages of cloud computing, cloud computing architecture, cloud computing applic...
详细信息
ISBN:
(纸本)9783037859100
This paper discusses the application of cloud computing in the logistics information platform, First introduced the basic concept and advantages of cloud computing, cloud computing architecture, cloud computing applications in the logistics information platform mode and the basic framework.
This article points out the views from "Software manufacturing Instrument" to "Software manufacturing Everything" and to "software rebuilds, rules, and defines the world", as well as show...
详细信息
ISBN:
(纸本)9783038352914
This article points out the views from "Software manufacturing Instrument" to "Software manufacturing Everything" and to "software rebuilds, rules, and defines the world", as well as shows the agreement and support at home and abroad to "Software manufacturing Everything". Software is the crystallization of human's intelligence, and the new wave of software has become the main competitive force of mainstay industry. This article also provides the consequence that the DASP of COINV measured, an the accuracy reached 10<^>(-17).
作者:
Li, GuangyaHenan Univ
Inst Management Sci & Engn Kaifeng 475000 Henan Peoples R China
The most important and concerned problem with the internet electronic registration is security problem. This contribution uses conic curve method to verify the generating license in servers. In order to ensure the val...
详细信息
ISBN:
(纸本)9783037859100
The most important and concerned problem with the internet electronic registration is security problem. This contribution uses conic curve method to verify the generating license in servers. In order to ensure the validity and security of license, the process of license distribution apply a verifiable code distribution scheme based on conic curve to make the electronic registration process more secure. In this paper, we propose a distributed electronic authentication scheme based on conic curves. As an alternative algebra curve technology, we believe conic deserves the further study in cryptography.
For the lack of safety and reliability of the information in the cloud computing environment, in order to create a more flexible and adaptable security mechanism, the combination of cloud computing and credible concep...
详细信息
暂无评论