Molecular communication networks (MC) consisting of biosensors and bioprocessors have unique characteristics that distinguish them from traditional electromagnetic networks. MC networks are super-slow owing to high pr...
详细信息
ISBN:
(纸本)9781450368971
Molecular communication networks (MC) consisting of biosensors and bioprocessors have unique characteristics that distinguish them from traditional electromagnetic networks. MC networks are super-slow owing to high processing and propagation delays, need algorithms that are ultra-simple due to the limited computational capabilities of biological circuits, and are highly asymmetric as the receiver/gateway have access to electronic components and other resources. These characteristics demand a re-thinking in the design of communication algorithms for MC networks. In this work, LMN, a link layer protocol specifically focusing on the above three characteristics of an MC network is proposed. LMN proposes a time interval modulation that reduces the overall communication delay and an embedded medium access control that is simple to implement and offloads computational complexity to the receiver.
In this study, a smart home automation system has been developed to automatically achieve some activities performed frequently in daily life to obtain more comfortable and easier life environment. In the system develo...
详细信息
The calling of users is very uneven and the channel collision detection ability is quite weak in communication system in near space (CSNS). To ensure quality of service (QoS), a novel load measurement access control (...
详细信息
ISBN:
(纸本)9781424413119
The calling of users is very uneven and the channel collision detection ability is quite weak in communication system in near space (CSNS). To ensure quality of service (QoS), a novel load measurement access control (LMAC) protocol is proposed. Combined with Markov M/M/n queue model, integrated theoretical analytical model is established for CSNS. The effect which the waiting probability of calling service, calling number and measure parameter have on the performance of the networks are analyzed. Besides, the LMAC scheme Is introduced to greatly increase the maximum throughput to 0.33 and improves the maximum throughput nearly one time compared to the maximum throughput 0.18 of the simple ALOHA protocol and closed to the theoretical bound.
This paper presents two cooperative strategies that employ implicit communication (information inferred through action, in this case through sensed force) and explicit communication (information directly transferred f...
详细信息
ISBN:
(纸本)9781728103563
This paper presents two cooperative strategies that employ implicit communication (information inferred through action, in this case through sensed force) and explicit communication (information directly transferred from one individual to another, in this case through wireless data transmission) within an object manipulation task between two robots. Qualities such as reliability, efficiency and care for the object are evaluated for each strategy in a series of simple object manipulation tasks in order to produce a performance profile for the two strategies. Results show that implicit communication is the most effective strategy in simple environments, but that explicit communication outperforms implicit communication in cluttered environments.
Wireless mobile charging can be used in wireless sensor networks for energy replenishing of sensor nodes by RF energy transmission, where the mobile charging device is employed for charging multiple sensors distribute...
详细信息
ISBN:
(纸本)9781728111643
Wireless mobile charging can be used in wireless sensor networks for energy replenishing of sensor nodes by RF energy transmission, where the mobile charging device is employed for charging multiple sensors distributed in different geographical locations. The scheduling of nodes in wireless mobile charging directly affects the energy acquisition effects and work efficiency of the nodes, which is difficult. In this paper, we will propose a novel algorithm-Adaptive Dynamic Programming (ADP) for wireless mobile charging optimization scheduling (ADP-WMCS). ADP-WMCS can jointly schedule node visit sequence and charging starting time for the visiting sensor node by optimizing the overall the energy run out times (i.e. death moment) of the sensor nodes using quadratic performance index, over the infinite horizon. Simulation results show that ADP-WMCS can effectively improve the charging performance of the sensor network.
In this paper, we consider the problem of controlling the connectivity of a network of mobile agents under local topology constraints and proximity-limited communication. The inverse iteration algorithm for spectral a...
详细信息
ISBN:
(纸本)9781467356411;9781467356435
In this paper, we consider the problem of controlling the connectivity of a network of mobile agents under local topology constraints and proximity-limited communication. The inverse iteration algorithm for spectral analysis is formulated in a distributed manner to allow each agent to estimate a component of global network connectivity, improving on the convergence rate issues of previous approaches. Potential-based controls drive the agents to maximize connectivity under local degree constraints, maintain established links to guarantee connectivity, and avoid collisions. To achieve constraint satisfaction we exploit a switched model of interaction that regulates link addition through symmetric, repulsive potentials between constraint violators, enforcing discernment in communication through spatial organization. Simulations of connectivity estimation as well as agent aggregation and leader-following applications demonstrate the ability of our proposed methods to generate connectivity maximizing, constraint-aware self organization.
All visions of pervasive computing share the idea of smart, small, and cheap devices that improve our everyday life. Their applications typically fall under sensor-based communication-enabled autonomous and deeply emb...
详细信息
ISBN:
(纸本)9781479984251
All visions of pervasive computing share the idea of smart, small, and cheap devices that improve our everyday life. Their applications typically fall under sensor-based communication-enabled autonomous and deeply embedded monitor and control systems. But common smart sensors and deeply embedded controllers are also able to do many things that we do not want. In fact, they will be always vulnerable to doing the bidding of attackers, to the detriment of their owners. This work presents a concept of a security architecture for tiny scale devices, which are typically close to the physical elements and featured with very limited resources. The concept describes a compile- and run-time co-design process to bring a tailor-made implementation of well-understood technologies of desktop systems on this type of devices to enforce an adequate security level.
In recent years, humanoids have been expected to play an important part in disaster response due to safety concerns. For disaster response, humanoids should do tasks in unknown and unstructured environments possibly w...
详细信息
ISBN:
(纸本)9781479968855
In recent years, humanoids have been expected to play an important part in disaster response due to safety concerns. For disaster response, humanoids should do tasks in unknown and unstructured environments possibly with limited communications. Firstly this paper presents a robot operating system in which complementary integration of autonomous and manual functions is achieved. In our system operator can change the level of automation depending on the situation: operator can modify the result of recognition in 3D Viewer, and can transfer from auto motion generating mode to manual control mode at any time with inheriting some motion parameters. Secondly for the purpose of overcoming communication-limit in disaster site, we propose the method of generating robot motion with little communication between operator and robot. Even when communication is limited, our System can convey necessary information to user by processing past data, always transferring small important data, and showing future motion plans.
Robots deployed in Search and Rescue missions are required to act autonomously, since in disaster scenarios even a remote control of the robots might not be possible anymore. Additionally it is desirable to use severa...
详细信息
ISBN:
(纸本)9781467379298
Robots deployed in Search and Rescue missions are required to act autonomously, since in disaster scenarios even a remote control of the robots might not be possible anymore. Additionally it is desirable to use several of these robots at once, since the search for survivors is a time-critical task, and the time to find victims should in the best case scale with the number of robots. In order to achieve this scaling the robots have to communicate and cooperate. This paper discusses how to optimize the search and rescue mission with multiple autonomous yet cooperating robots, evaluating different communication patterns to speed up the search process. Emphasis lies on the evaluation of the diverse types of communication methods, which can be direct, indirect or a combination thereof. Our studies show, that the combination of direct and indirect communication optimizes the search and rescue process. Further using a combined method of data transfer between the agents provides robust communication between the robots, improving the search efficiency.
Simulation is a common way to analyze the performance of a manufacturing system. On a system level, entities are modeled based on production and failure rates using Discrete Event Simulation (DES). On a machine level,...
详细信息
ISBN:
(纸本)9781467381833
Simulation is a common way to analyze the performance of a manufacturing system. On a system level, entities are modeled based on production and failure rates using Discrete Event Simulation (DES). On a machine level, the Continuous Dynamics (CD) of machines are studied based on position, velocity, and acceleration. However, these models are usually run separately, losing key information that could be used for more accurate control of the system performance. In this paper, we merge DES and CD in a single hybrid simulation environment. By synchronizing the simulations to run in real-time, the results can be compared with information from the plant floor. Using the simulation outcome as a reference, any significant deviation of the plant floor performance would represent an error and would trigger an event that can be automated or inform an operator of a required action.
暂无评论