This paper addresses the conditional probability for undetectable burst errors when using two CRC (cyclic redundancy check) codes in tandem, given that non-guaranteed-detectable burst errors have occurred. Three disti...
详细信息
This paper addresses the conditional probability for undetectable burst errors when using two CRC (cyclic redundancy check) codes in tandem, given that non-guaranteed-detectable burst errors have occurred. Three distinctive cases are discussed based on the error positions and the conditional probability of undetectable errors under each case is derived. Because this probability depends on the exact CRC polynomials selected, an upper-bound assessment is provided to address general cases
Real-time performance evaluation of WLANs is an extremely challenging topic. The major drawback of real-time performance analysis in actual network installations is a lack of repeatability due to uncontrollable interf...
详细信息
Real-time performance evaluation of WLANs is an extremely challenging topic. The major drawback of real-time performance analysis in actual network installations is a lack of repeatability due to uncontrollable interference and propagation complexities, which are caused by unpredictable variations in the propagation channel. This stresses a need for an RF test system that provides isolation from interfering sources while simulating a real-time channel, thereby creating a realistic and controllable radio propagation test environment. In this paper we introduce a novel testbed for real-time laboratory performance evaluation of WLANs utilizing an RF isolated test system (Azimuthtrade Systems 801W) for isolation from interference and a real-time multipath channel simulator (Elektrobit PROPSimtradeC8) for channel emulation. A software protocol analyzer (WildPackets Airopeek NX) is used to capture data packets in the testbed. The relationship between the throughput and received power, under controlled propagation and interference conditions, is analyzed. We present practical models describing the throughput/power relationship for multirate IEEE 802.11b/g devices in different propagation conditions.
This study is motivated by the unexpected failure of a network-based system during the performance of corrective maintenance. This incident highlights the importance of incorporating network connectivity analysis in m...
详细信息
This study is motivated by the unexpected failure of a network-based system during the performance of corrective maintenance. This incident highlights the importance of incorporating network connectivity analysis in maintenance planning. This study shows that it is crucial to consider network connectivity when planning maintenance. Procedures to conduct maintenance planning with network connectivity consideration is proposed and discussed
This study presents a negotiation-based e-learning framework to promote learning motive and enhance the interaction between learners and instructors. In terms of learning communication, a fuzzy constraint-based agent ...
详细信息
This study presents a negotiation-based e-learning framework to promote learning motive and enhance the interaction between learners and instructors. In terms of learning communication, a fuzzy constraint-based agent negotiation mechanism is proposed as a flexible model to suggest pedagogies or learning strategies. Examples are provided to illustrate the proposed framework for constructive and collaborative learning
The Enhanced Rail Contribution by Increased Reliability (ERCIR) project aimed to enhance availability by condition monitoring of the track and vehicle suspension from in-service trains. In this project, the possibilit...
详细信息
The Enhanced Rail Contribution by Increased Reliability (ERCIR) project aimed to enhance availability by condition monitoring of the track and vehicle suspension from in-service trains. In this project, the possibility of instrumenting an inservice train is explored, with emphasis on using a minimal sensor set for the detection and diagnosis of track and vehicle faults. The use of a bogie-mounted pitch rate gyro to observe mean vertical track geometry is novel, as is using a bogie-mounted yaw rate gyro to observe mean lateral alignment as well as the more usual longer wavelength track curvature. Mathematical algorithms are developed to detect vehicle suspension faults and track irregularities. The suspension faults considered are changes in secondary lateral and anti-yaw dampers, and changes in effective conicity. Sudden changes are detected and diagnosed using a Kalman filter-based innovation approach;gradual changes in damping coefficients and effective conicity are detected by parameter estimation using a Rao-Blackwellised particle filter. Observable track geometry irregularities include mean vertical and lateral alignment irregularities, as well as crosslevel and twist faults. This paper finally describes the results of trials carried out on two different railway vehicles, using the data obtained to assess the validity of the fault detection algorithms.
The cloud microphysical properties retrieved from MODIS sub-sampling radiance dataset (MOD02SSH) over the extended GAME region are shown in this paper. The spatial distributions and temporal variations of the cloud op...
详细信息
The cloud microphysical properties retrieved from MODIS sub-sampling radiance dataset (MOD02SSH) over the extended GAME region are shown in this paper. The spatial distributions and temporal variations of the cloud optical thickness (τc) and effective particle radius (re), are important observation targets to understand the role of clouds in the radiation budget estimations, especially in the cloud-aerosol interaction studies, because they will have information of cloud growth process. Thus, the wide-area and relatively high-temporal observations of the cloud properties are necessary. The most passed researches that retrieved near-global distributions of the cloud properties, used the reduced data volume satellite radiance subset, such as the globally map-projected radiances dataset at the discretized degrees in latitude and longitude (e.g. 0.5 degrees) or narrow-swath (around nadir) radiance subset. In fact, these subsets reduced the computing time but unexpectedly reduced the observation samplings. In this study, we used MODIS 5-km subsampling radiance subsets (MOD02SSH) for the retrievals. The MOD02SSH conserves scene texture with moderately reduced data volume of 1/25 from original MODIS scene, so that they will be suitable for the more precise estimations of τc and re over synoptic to global scale. We retrieved τc and re from one-month MOD02SSH over the extended GAME region (60E-180E longitude and 20S to 60N latitude) in July 2004. In the obtained τc versus re scatter plots, we found interesting features that will be explained as the cloud properties under the pristine and polluted environments in the region. The non-hydrostatic spectral microphysics cloud model simulates these phenomena well. In the presentation, we will discuss about the MODIS radiance dataset for the cloud analysis, retrieval algorithm, then show the typical and interesting features appeared in observed τc-re scatter plots over the extended GAME regions.
A Hierarchical Sketch was implemented to summarize the hierarchical structure in stream data. The sketch used a XOR-based pair-wise independent family of hash functions on the hierarchical domain to map stream data it...
详细信息
A hierarchical sketch was implemented to summarize the hierarchical structure in stream data. The sketch used a XOR-based pair-wise independent family of hash functions on the hierarchical domain to map stream data it...
详细信息
A hierarchical sketch was implemented to summarize the hierarchical structure in stream data. The sketch used a XOR-based pair-wise independent family of hash functions on the hierarchical domain to map stream data items to a three dimensional array of counters of size LtimesDtimesW. Of the counter array, L was the layers in hierarchy, D was the number of uniformly and randomly chosen hash functions, and W was the range of hash functions. Based on the sketch, an algorithm that identified and evaluated the hierarchical frequent items over data streams approximately was implemented. This algorithm has sub-linear time and space costs and is almost exact in statistic meaning
Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. T...
详细信息
Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. To analyze DCF under statistical traffic, Foh and Zukerman introduce a model that uses Markovian Framework to compute the throughput and delay performance. In this paper, we analyze the protocol service time of EDCA mechanism and introduce a model to analyze EDCA under statistical traffic using Markovian Framework. Using this model, we analyze the throughput and delay performance of EDCA mechanism under statistical traffic.
暂无评论