In this article, we have concentrated on selecting the reliable path from source to destination in a mobile ad-hoc network (MANET) framework using Dempster-Shafer Theory (DST) of evidence. The belief and plausibility ...
详细信息
ISBN:
(纸本)9780769535135
In this article, we have concentrated on selecting the reliable path from source to destination in a mobile ad-hoc network (MANET) framework using Dempster-Shafer Theory (DST) of evidence. The belief and plausibility functions are used here for calculating the suitable path for sending data packet from source to destination selecting the proper neighborhood oil the basis of radio range of the source node. The radio range is determined depending on the Proximity Index and birth rate and death rate of the neighborhood nodes of the source node. Whenever data packet is changing hops within source and destination some credit and penalty are introduced to the next and previous hops respectively. In the concluding section of the present article a measure of gain (in delay) has been introduced for comparison of the existing methods vis-a-vis that of the proposed one.
In the paper, a new parallel LZW-Like algorithm, bidirectory LZW algorithm (BD-LZW) will be interpreted The new algorithm can be used in data compression/decompression system which runs on multi-microprocessor system,...
详细信息
The data analysis involves the performance of different tasks, which can be performed by many different techniques and strategies. This research emphasizes the performance of the Data Clustering task using the artific...
详细信息
ISBN:
(纸本)9781601320728
The data analysis involves the performance of different tasks, which can be performed by many different techniques and strategies. This research emphasizes the performance of the Data Clustering task using the artificial neural network Self-Organizing Maps as the main artifact. SOM is an Artificial Neural Network based in a competitive unsupervised learning, what implies in the training being entirely guided by the data and the neurons of the map compete among themselves. This neural network has the ability to form mappings that quantify the data, preserving its topology. This work introduces a new methodology of data clustering since SOM, that considers the topological map generated by him and the data topology in the clustering process, once considers the neighborhood of the input data.
The problem of multiple data sources selection (MDSS) in DSE (data-sharing environments) is addressed and the algorithm MDSSA (MDSS algorithm) is presented. MDSSA introduces the concept of Pareto optimization which re...
详细信息
The problem of multiple data sources selection (MDSS) in DSE (data-sharing environments) is addressed and the algorithm MDSSA (MDSS algorithm) is presented. MDSSA introduces the concept of Pareto optimization which reduces the search space greatly. By means of a novel normal-measure based nonlinear cost function, MDSSA computes approximate Pareto optimal paths to each data source first, and then gives the optimal data source and its corresponding path by comparing the cost of all candidate paths, resulting in finding more effective paths and much shorter response time. Extensive simulations show the efficiency of the algorithm.
This paper proposes a distributed energy efficient clustering protocol for target surveillance in sensor networks (EECTS). The protocol selects cluster heads according to a hybrid of node's residual energy and dis...
详细信息
This paper proposes a distributed energy efficient clustering protocol for target surveillance in sensor networks (EECTS). The protocol selects cluster heads according to a hybrid of node's residual energy and distribution of its neighbors. In addition, for the sake of reducing the energy dissipation of the cluster head, a minimum spanning tree with root of the base station is constructed among the cluster heads. Then it sends the gathered data to its upstream node along the spanning tree. The chief task of surveillance sensor networks is to sensing the moving target. So an intra-cluster node schedule method named EECTS-1 that can senses the most part of the network and it's enhanced method EECTS-2 are introduced. The two methods can obtain the high continuous surveillance degree when the moving target enters into the network. EECTS produces a linear network lifetime in the number of nodes and keeps good continuous surveillance degree simultaneously. The simulation results show that with the same performance of surveillance the EECTS-1 achieves the same lifetime as that HEED obtains and outperforms DEEG with up to 35% improvement. The EECTS-2 outperforms HEED significantly with prolonging the network lifetime about 70%-80%. Therefore the EECTS is suitable for military target surveillance and has high reliability of the sensing information.
Faced with the challenge of finding ways to use an evergrowing transistor budget, microarchitects have begun to move towards the chip multiprocessors (CMPs) as an attractive solution. CMPs have become a common way of ...
详细信息
ISBN:
(纸本)9781595939999
Faced with the challenge of finding ways to use an evergrowing transistor budget, microarchitects have begun to move towards the chip multiprocessors (CMPs) as an attractive solution. CMPs have become a common way of reducing chip complexity and power consumption while maintaining high performance. Multiple cores are replicated on a single chip, resulting in a potential linear scaling of performance. Cores are becoming sufficiently small with technology scaling. As technology continues to scale, inter-die and intra-die variations in process parameters can result in significant impact on performance and power consumption, leading to asymmetry among the cores that were designed to be symmetric. Adaptive voltage scaling can be used to bring all cores to the same performance level leaving only core-to-core power variations. The goal of our work is to find the optimal frequency that balances performance with power against asymmetry. We also demonstrate that traditional task scheduling techniques need to be revisited to mitigate the effects of process variations. Copyright 2008 ACM.
Past research and recent lessons learned suggest that large-scale wind farms not only have to operate in the maximum power tracking (MPT) mode to maximize capture of wind energy, they also have to be able to quickly r...
详细信息
Past research and recent lessons learned suggest that large-scale wind farms not only have to operate in the maximum power tracking (MPT) mode to maximize capture of wind energy, they also have to be able to quickly respond to system reliability and economic conditions by operating in the power regulation (PR) mode. This paper discusses several newly identified, critical issues that need to be addressed for satisfactory operation of large-scale wind farms. We first present a nonlinear controller that enables seamless operation in both the MPT and PR modes-a feature not available in existing schemes-but suffers from limited robustness. We then present the result of an empirical study on the loss of power generation in wind farms and discuss its impact on wind farm operation. Finally, we propose a controller for potentially overcoming these issues and conclude with future research directions.
With reducing feature size, the effects of process variations are becoming more and more predominant. Memory components such as on-chip caches are more susceptible to such variations because of high density and small ...
详细信息
Radio frequency identification (RFID) technology has become more sophisticated in recent years and is being developed rapidly for a variety of applications. The problem of eliminating redundant readers has been reduce...
详细信息
ISBN:
(纸本)9781424440085
Radio frequency identification (RFID) technology has become more sophisticated in recent years and is being developed rapidly for a variety of applications. The problem of eliminating redundant readers has been reduced to the minimum cover problem and proved to be NP-hard. In this paper, a density-based redundant reader elimination algorithm (DRRE) is presented; DRRE eliminates the redundant readers without influencing the number of usable tags. Simulation results demonstrate that the DRRE algorithm performed better in all instances in a variety of environments compared with other algorithms. In a densely deployed RFID network, the DRRE algorithm detected 85% more redundant readers than others.
This paper presents a torque and rotational speed estimation method for line-start induction motor operated valves. Routine inspections are carried out to those valves, because motor operated valves are used in the se...
详细信息
This paper presents a torque and rotational speed estimation method for line-start induction motor operated valves. Routine inspections are carried out to those valves, because motor operated valves are used in the serious plant such as power plant. and securing reliability is an extreme important matter for these systems. Movement environments in these plants are high temperature and humidity, so it is difficult to put sensors near motors. In such a case, we must find the trouble of the system without torque sensor or speed sensor. The proposal method can estimate the torque and rotational speed of induction motor by using time-series data of voltages and currents at the switchboard. Furthermore, we propose the parameter identification method of mutual inductance by comparing the inner and outer products between voltages and currents. First, a torque and rotational speed of induction motor are estimated. Next, a mutual inductance parameter is got. Last, the proposed estimation method is verified by results of experiment.
暂无评论