A wireless sensing element network consists of hundred to thousands of little sensing element nodes that have restricted energy, all told forms of network Energy's attention is a {very important} issue and during ...
详细信息
ISBN:
(纸本)9781479972265
A wireless sensing element network consists of hundred to thousands of little sensing element nodes that have restricted energy, all told forms of network Energy's attention is a {very important} issue and during this it is very important for planning protocols. This paper discusses the common cluster protocol and improve cluster head choice criteria. By LEACH protocol cluster head is chosen on random likelihood however during this projected algorithmic program it considers the sensing element nodes residual energy so as to balance energy dissipation between all the nodes to boost the network lifetime.
Nowadays, there are many robots with the ability to move along its environment and they need a navigation system. In the semantic navigation paradigm, the ability to reason and to infer new knowledge is required. In t...
详细信息
Nowadays, there are many robots with the ability to move along its environment and they need a navigation system. In the semantic navigation paradigm, the ability to reason and to infer new knowledge is required. In this work a relational database is presented and proposed. This database allows to manage and to raise queries of semantic information from any environment in which a mobile robot would perform a semantic navigation, providing advantages such as conceptual simplicity and a fast method for switching between semantic environments, being unnecessary redefine new rules. In this paper, a target topological level is obtained from a semantic level destination.
An algorithm to maximize distributed generation (DG) hosting capacity in a system while lowering overall system cost is proposed in this paper. This algorithm considers several realistic aspects of long-term DG planni...
详细信息
An algorithm to maximize distributed generation (DG) hosting capacity in a system while lowering overall system cost is proposed in this paper. This algorithm considers several realistic aspects of long-term DG planning, such as cost effective design of feeder reinforcement. It allocates DGs and provides the type, size, location, and year of installation. Both dispatchable and non-dispatchable DG technologies are used. The complexity of the problem necessitates modeling the problem as mixed integer nonlinear programming. This is performed while considering the daily optimal operation of the allocated DGs. A case study of a test system was conducted over a planning period of 20 years, with every year consisting of eight-day patterns and each day having 24 varying hours.
This paper presents an effective power scheduling strategy for energy efficient multiple objects identification and association. The proposed method can be utilized in many heterogeneous surveillance systems with visu...
详细信息
This paper presents an effective power scheduling strategy for energy efficient multiple objects identification and association. The proposed method can be utilized in many heterogeneous surveillance systems with visual sensors and RFID (radio-frequency identification) readers where energy efficiency as well as association rate are critical Multiple objects positions and trajectory estimates are used to decide the power level of RFID readers. Several key parameters including the time windows and the distance separations are defined in the method in order to minimize the effects of RFID coverage uncertainty. The power cost model is defined and incorporated into the method to minimize energy consumption and to maximize association performance. The proposed method computes the power cost using the range of the outermost position for possible single association and group associations at every sampling time. An RFID reader is activated with the proper coverage range when the power cost for the current time is lower than the power cost for the next time sample. The simplicity of the power cost model relieves the problematic combinatorial comparisons in multiple object cases. The performance comparison simulation with the minimum and maximum energy consumption shows that the proposed method achieves fast single associations with less energy consumption. Finally, the realistic comparison simulation with the fixed range RFID readers demonstrates that the proposed method outperforms the fixed ranges in terms of single association rate and energy consumption.
Informal and semi-formal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requireme...
详细信息
ISBN:
(纸本)9781467396455
Informal and semi-formal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to the ambiguity of the natural language or graphical notation used in writing the specifications. This paper describes a tool to assist the animation of informal and semi-formal specifications intuitively and comprehensively for their validation. The underlying animation principle is called SOFL Requirements Specification Animation Framework (SOFL-RSAF). The framework integrates specification animation into the SOFL method for constructing specifications and is supported by a prototype add-in tool.
The ever increasing wireless data services, such as imaging, video, audio, multimedia, etc., have demands for the very high speed wireless communications and network, which are unfortunately a bottleneck when combinin...
The ever increasing wireless data services, such as imaging, video, audio, multimedia, etc., have demands for the very high speed wireless communications and network, which are unfortunately a bottleneck when combining with the wireline core network. Users' are now expecting high quality of experience with low-cost devices, ubiquitous connectivity, energy efficiency, high reliability, or even ultra-low latency if a vehicle terminal is applied.
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval e...
详细信息
The distributed, heterogeneous and anonymous attribute of P2 P networks make the node information sharing facing security problems. In order to prevent malicious and false service of nodes, and improve the retrieval efficiency, the primary node selection algorithm based on trust mechanism is proposed in this paper. Firstly, the network topology based on virtual community is described, and the function of primary node is discussed. Secondly, the primary node is selected according to direct trust value and recommendation trust value of each node in the virtual community. Finally, resource retrieval algorithm is designed according to the selected trust primary node, and the algorithm is experimentally verified. In some certain extent, the results show that the method is able to reduce the fraud of primary node and improve the retrieval efficiency.
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. ...
详细信息
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storage service, but the user is difficult to manage remote data in the cloud. Therefore, how users verify data integrity is a major challenge. In recent years, public audit is used to verify data integrity by which the user allows other to verify the user's data. Because the feature of cloud service allows users to communicate with each other on the cloud platform, the cloud storage service allows the data owner to share their data to other users. Therefore, public auditing extends to the share data, so the original operation becomes not the same including signature, public audits, dynamic data and user revocation which generates on the situation of shared data. In the paper, we define the requirements of public auditing with shared data and explain four representative approaches which include analysis function, security, and performance requirements. Finally, we provide some topics for future research.
An automated test system and procedure is proposed, designed to enable systematic testing of electrical impedance tomography (EIT) devices. The system is designed to calculate reliable, repeatable and accurate perform...
详细信息
暂无评论