Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastr...
详细信息
Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastructure during its working, as well as the nodes in MANETs have a freedom of movement with the ability to self-configure, in addition, to working as a router or client at the same time. Moreover, MANETs considered as an infrastructure less network, so the cost of this type of networks is less in comparison to other traditional networks. On the other hand, the routing considered one of most important challenges in MANETs due to the perpetual motion and randomness of the nodes that can causing a continuous change of the network topology and thus to all paths between nodes, where finding valid paths between the nodes is the core task of routing protocols. Recently, it has been argued that the traditional layered architecture is ineffective to deal with receiving signal strength related problems. In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. In this paper, a Cross-layer design among Network, MAC and Physical layers based on Threshold Multipath Routing Protocol (CTMRP) is proposed. The CTMRP is designed for decision maker based on threshold value of average paths signal for efficient transmission of the Text, image, audio and video as well as sending the data via multiple paths, which mitigate the negatives effects causes from forcing the nodes to send the data via single. The Route Discovery Delay, Number of RREQ Messages, Number of RREP Messages, End-to-End Delay, Packet Delivery Ratio (PDR), and Throughput were selected as the main performance evaluation metrics. The results show that the proposed algorithm has better performance and lead to increase stability of transmission link.
With the dramatic development of spatial data in- frastructure, CyberGIS has become significant for geospatial data sharing. Due to the large number of concurrent users and large volume of vector data, CyberGIS faces ...
详细信息
With the dramatic development of spatial data in- frastructure, CyberGIS has become significant for geospatial data sharing. Due to the large number of concurrent users and large volume of vector data, CyberGIS faces a great chal- lenge in how to improve performance. The real-time visual- ization of vector maps is the most common function in Cyber- GIS applications, and it is time-consuming especially when the data volume becomes large. So, how to improve the effi- ciency of visualization of large vector maps is still a signif- icant research direction for GIScience scientists. In this re- search, we review the existing three optimization strategies, and determine that the third category strategy (i.e., parallel optimization) is appropriate for the real-time visualization of large vector maps. One of the key issues of parallel optimiza- tion is how to decompose the real-time visualization tasks into balanced sub tasks while taking into consideration the spatial heterogeneous characteristics. We put forward some rules that the decomposition should conform to, and design a real-time visualization framework for large vector maps. We focus on a balanced decomposition approach that can assure efficiency and effectiveness. Considering the spatial hetero- geneous characteristic of vector data, we use a "horizontal grid, vertical multistage" approach to construct a spatial point distribution information grid. The load balancer analyzes the spatial characteristics of the map requests and decomposes the real-time viewshed into multiple balanced sub ***, all the sub viewsheds are distributed to multiple server nodes to be executed in parallel, so as to improve the real- time visualization efficiency of large vector maps. A group of experiments have been conducted by us. The analysis results demonstrate that the approach proposed in this research has the ability of balanced decomposition, and it is efficient and effective for all geometry types of vector data.
Location-Based Service has moved into indoor scene by mature Wi-Fi network infrastructure and intelligent handheld terminal device development in decade years. Traditional indoor localization systems is designed by RS...
详细信息
Location-Based Service has moved into indoor scene by mature Wi-Fi network infrastructure and intelligent handheld terminal device development in decade years. Traditional indoor localization systems is designed by RSSI fingerprint mechanism to estimate user location. This paper indicated the limitation of pure RSSI by analysing the RSSI performance in experiment and proposed an RSSI-Pro transformation algorithm for radio map construction. To verify the desired accuracy an actual indoor localization system called LocNeedle is designed to implement the method of this article. LocNeedle adopts Bhattacharyya distance as similarity measurement metric to find the target user location, which can achieve that the 95% of localization error distance is under 2.5 meters while 70% is under 1 meter.
A case study of the application of a distributed control scheme to a power system control is presented. In addition, an investigation has been conducted into voltage control. Combined injection of VAr-compensating dev...
详细信息
A case study of the application of a distributed control scheme to a power system control is presented. In addition, an investigation has been conducted into voltage control. Combined injection of VAr-compensating devices controlled by distributed expert systems has been proposed as a measure to maintain voltage stability in a power system under heavy loading conditions. A simulation study has been carried out by using five workstations that represent a power system and four VAr-compensating devices. The results demonstrate the effectiveness of the proposed system for voltage recovery.< >
This paper we show that the Schematic Protection Model (SPM) subsumes several well-known protection models as particular instances. We show this for a diverse collection of models including the Bell-LaPadula multileve...
Cyber-Physical systems (CPSs) differ from traditional Information Technology (IT) systems in such a way that they interact with the physical environment, i.e., they can monitor and manipulate real objects and processe...
详细信息
With the continuous development of the Internet of Things (IoT) technology, the large number of messages generated by the increasing number of IoT devices has brought new challenges to MQTT servers. Due to the need fo...
详细信息
Computer vision (CV) is a subfield of computer science that enables machines to perceive, interpret, and understand visual data. It combines image processing, analysis, and machine learning to extract meaningful insig...
详细信息
This paper summarizes several iterations in developing a compact set of four key principles for successful systemsengineering, which are 1) Stakeholder Value-Based Guidance 2) Incremental Commitment and Accountabilit...
详细信息
Human pose estimation technology has important applications in many fields. Existing research mainly focuses on precise localization of human key points in unobstructed situations but neglects the common occlusion pro...
详细信息
暂无评论