It has been widely recognized that placing cloud data centers near clean energy sources or in cooler environments may reduce the operational cost and carbon footprint. But when the scale of the system, in terms of the...
详细信息
Wireless sensor Networks (WSN) are crucial in modern communication systems, requiring the use of effective routing strategies to reduce energy usage and prolong the network's lifespan. This study presents an innov...
详细信息
The outlier-resistant distributed fusion estimation (DFE) issue is researched in this paper for cyber-physical systems (CPSs) with bandwidth constraints. The weighted try-once-discard (WTO D) protocol is used on the s...
详细信息
In this paper, we study gossip algorithms in communication models that describe the peer-to-peer networking functionality included in most standard smartphone operating systems. We begin by describing and analyzing a ...
详细信息
ISBN:
(纸本)9781665439299
In this paper, we study gossip algorithms in communication models that describe the peer-to-peer networking functionality included in most standard smartphone operating systems. We begin by describing and analyzing a new synchronous gossip algorithm in this setting that features both a faster round complexity and simpler operation than the best-known existing solutions. We also prove a new lower bound on the rounds required to solve gossip that resolves a minor open question by establishing that existing synchronous solutions are within logarithmic factors of optimal. We then adapt our synchronous algorithm to produce a novel gossip strategy for an asynchronous model that directly captures the interface of a standard smartphone peer-to-peer networking library (enabling algorithms described in this model to be easily implemented on real phones). Using new analysis techniques, we prove that this asynchronous strategy efficiently solves gossip. This is the first known efficient asynchronous information dissemination result for the smartphone peer-to-peer setting. We argue that our new strategy can be used to implement effective information spreading subroutines in real world smartphone peer-to-peer network applications, and that the analytical tools we developed to analyze it can be leveraged to produce other broadly useful algorithmic strategies for this increasingly important setting.
The mission-critical decisions are usually made by a central node in connected autonomous systems enabled by IoT, AI and 5G etc. The reliability of decision-making largely depends on the condition of the central node,...
详细信息
ISBN:
(纸本)9798350396355
The mission-critical decisions are usually made by a central node in connected autonomous systems enabled by IoT, AI and 5G etc. The reliability of decision-making largely depends on the condition of the central node, which can have unaffordable costs and low scalability in a massive-scale mobility network. Therefore, mission-critical IoT networks have been seeking new methods to achieve the growing reliability and latency requirement of cooperative decision-making. The distributed consensus protocol, which has been widely used in distributedcomputingsystems, can provide robustness to the liveness of mission-critical decisions that may encounter node faults. This article first analytically derives the performance of two distributed consensus protocols: Raft and Hotstuff BFT, with the extra synchronization phases. In the presence of communication failure, the results are compared with the analytically derived performance of a centralized consensus. The comparison indicates the strengths and weaknesses of these consensus mechanisms from the perspective of full consensus reliability and communication latency, which provides guidelines for deploying the appropriate distributed autonomous systems in the future.
The proceedings contain 68 papers. The topics discussed include: AnguLoc: concurrent angle of arrival estimation for indoor localization with UWB radios;social-aware energy balancing in mobile opportunistic networks;a...
ISBN:
(纸本)9781728143514
The proceedings contain 68 papers. The topics discussed include: AnguLoc: concurrent angle of arrival estimation for indoor localization with UWB radios;social-aware energy balancing in mobile opportunistic networks;an IoT based solar park health monitoring system for PID and hotspots effects;RIDER: proactive and reactive approach for urban traffic management in vehicular networks;privacy-preserving solutions in the industrial Internet of things;a gesture recognition approach to classifying allergic rhinitis gestures using wrist-worn devices - a multidisciplinary case study;improving the vehicular mobility analysis using time-varying graphs;and a SLIPT-assisted visible light communication scheme.
In this paper, we propose a preliminary definition and analysis of the novel concept of sensor observability index. The goal is to analyse and evaluate the performance of distributed directional or axial-based sensors...
详细信息
ISBN:
(数字)9781665479271
ISBN:
(纸本)9781665479271
In this paper, we propose a preliminary definition and analysis of the novel concept of sensor observability index. The goal is to analyse and evaluate the performance of distributed directional or axial-based sensors to observe specific axes in task space as a function of joint configuration in serial robot manipulators. For example, joint torque sensors are often used in serial robot manipulators and assumed to be perfectly capable of estimating end effector forces, but certain joint configurations may cause one or more task-space axes to be unobservable as a result of how the joint torque sensors are aligned. The proposed sensor observability provides a method to analyse the quality of the current robot configuration to observe the task space. Parallels are drawn between sensor observability and the traditional kinematic Jacobian for the particular case of joint torque sensors in serial robot manipulators. Although similar information can be retrieved from kinematic analysis of the Jacobian transpose in serial manipulators, sensor observability is shown to be more generalizable in terms of analysing non-joint-mounted sensors and other sensor types. In addition, null-space analysis of the Jacobian transpose is susceptible to false observability singularities. Simulations and experiments using the robot Baxter demonstrate the importance of maintaining proper sensor observability in physical interactions.
Binary Sparse Matrix storage is one of the critical problems in embedded system applications. Storing these matrices in the memory efficiently is important. Magnitude of increase in matrix size also has significant im...
详细信息
The increasing integration of renewable energy sources, and the widespread use of electric vehicles have introduced greater complexity and dynamics in power flows in distribution systems. With bidirectional power flow...
详细信息
The operation of Internet of Things (IoT) networks and Wireless sensor Networks (WSN) is often disrupted by a number of problems, such as path disconnections, network segmentations, node faults, security attacks, etc....
详细信息
ISBN:
(纸本)9781665439299
The operation of Internet of Things (IoT) networks and Wireless sensor Networks (WSN) is often disrupted by a number of problems, such as path disconnections, network segmentations, node faults, security attacks, etc. A method that gains momentum in resolving some of those issues is the use of mobile nodes or nodes deployed by mobile robots. The use of mobile elements essentially increases the resources and the capacity of the network. In this work, we propose a scheme that utilizes mobile nodes for the creation of alternative paths from source to sink by also accounting the energy levels of the nodes as a contributing factor regarding the creation of alternative paths. We offer both a high level description of the concept and also a detailed algorithmic solution. The evaluation of the solution was performed in a case study of resolving congestion in the network. Results have shown that the proposed algorithm can significantly contribute to the alleviation of the problem of congestion in IoT and WSNs and can easily be used for other types of network problems.
暂无评论