The space radiation environment introduces multiple kinds of faults on devices used for space application. Advantages and shortages of ASIC and FPGA are compared based on different radiation effects. Most advanced and...
详细信息
The space radiation environment introduces multiple kinds of faults on devices used for space application. Advantages and shortages of ASIC and FPGA are compared based on different radiation effects. Most advanced and classical techniques for radiation tolerance adopted on both ASICs and FPGAs are discussed, including Triple Modular Redundancy (TMR), Hardened Memory Cells, Error Detection and Correction code (EDAC), etc. Fault detection, reconfiguration, and scrubbing based on SRAM-FPGAs are summarized as well. One self-developed space-level processor was demonstrated. Current status of radiation tolerance technology is analyzed, and tough challenges waited to be settled are raised.
Advances in computer networking combined with powerful home computers and modern operating systems made streaming media practical and affordable for ordinary consumers. We are enjoying different streaming services suc...
详细信息
Ambient networks aim to provide a unified networking concept that can adapt to the very heterogeneous environment of different radio technologies and service and network environments. One of the important issues in th...
详细信息
Plug-in hybrid electric vehicles (PHEVs) play an important role in making a greener future. Given a group of PHEVs distributed across a power network equipped with the smart grid technology (e.g. wireless communicatio...
详细信息
ISBN:
(纸本)9781457710001
Plug-in hybrid electric vehicles (PHEVs) play an important role in making a greener future. Given a group of PHEVs distributed across a power network equipped with the smart grid technology (e.g. wireless communication devices), the objective of this paper is to study how to schedule the charging of the PHEV batteries. To this end, we assume that each battery must be fully charged by a pre-specified time, and that the charging rate can be time-varying at discrete-time instants. The scheduling problem for the PHEV charging can be augmented into the optimal power flow (OPF) problem to obtain a joint OPF-charging (dynamic) optimization. A solution to this highly nonconvex problem optimizes the network performance by minimizing the generation and charging costs while satisfying the network, physical and inelastic-load constraints. A global optimum to the joint OPF-charging optimization can be found efficiently in polynomial time by solving its convex dual problem whenever the duality gap is zero for the joint OPF-charging problem. It is shown in a recent work that the duality gap is expected to be zero for the classical OPF problem. We build on this result and prove that the duality gap is zero for the joint OPF-charging optimization if it is zero for the classical OPF problem. The results of this work are applied to the IEEE 14 bus system.
Based on spatiotemporal properties of neighborhood and mobile properties of nodes in the networks, we propose Selective Reference Mechanism to trade off between the delay and overhead of neighbor discovery in low-duty...
详细信息
In a flocking scenario of multi-agent systems, the connectivity of the group of agents is caused either by individual's local cohesion interaction mechanism or by external boundary constraints. The latter case is ...
详细信息
In a flocking scenario of multi-agent systems, the connectivity of the group of agents is caused either by individual's local cohesion interaction mechanism or by external boundary constraints. The latter case is particularly interesting when an individual's cohesion ability is not reliable due to the limitation of communication range. The effect of external boundary constraints on the connectivity property of multi-agents has been intensively investigated in natural observation and engineering simulation. A theoretical analysis is given in this paper which reveals that a group of agents in a bounded plane can be almost always jointly connected and hence form a complete flock.
Compared to full encryption approaches, selective encryption approaches are known to protect JPEG images from attacks with minimum overhead for Wireless Sensor Networks (WSNs). Since data resulting from DCT transform ...
详细信息
Compared to full encryption approaches, selective encryption approaches are known to protect JPEG images from attacks with minimum overhead for Wireless Sensor Networks (WSNs). Since data resulting from DCT transform is correlated with each other, however, the unencrypted data in selective encryption approaches can give attackers some hint for guessing the encrypted data. In this paper, we propose away to apply full encryption to image transmission over WSNs by offloading the computational workload of sensors to a server. Based on the experimental results, we show that the proposed approach can ensure both the higher security level and the energy-efficiency at a sensor with acceptable image quality.
This paper presents a comprehensive metric to evaluate the link quality of scalable mobile sensor networks to maintain end-to-end communication links. The mobile nodes dynamically reconfigure themselves to maintain re...
详细信息
This paper presents a comprehensive metric to evaluate the link quality of scalable mobile sensor networks to maintain end-to-end communication links. The mobile nodes dynamically reconfigure themselves to maintain reliable end-to-end communication links. We present the empirical analysis and results of a link variability study for an indoor environment. All experiments are implemented on a mobile platform called PioMote team. Inspired by the Shannon-Hartley theorem, the analysis of three metrics is proposed, including received signal strength indicator (RSSI), active throughput, and packet loss rate (PLR). RSSI is adopted to reflect the basic performance of link quality in mobile sensor networks. Active throughput acting as a decaying threshold generator is used to estimate the critical point for smooth and stable communication. The metric PLR is adopted to reflect the cut-off point in end-to-end communication. The evaluation of link quality acts as feedback for the cooperative control of mobile nodes. The experimental results show the effectiveness of evaluation for link quality of scalable mobile sensor networks.
In this paper a sliding-mode observer for a class of non-linear systems is proposed. The observer is based on the equivalent control method. The mathematical tools required to design such an observer are alSão pr...
详细信息
We consider the quasispecies spectrum reconstruction problem in amplicon reads. The main contribution of this paper is several methods to reconstruct HCV quasispecies from simulated error-free amplicon reads. Our comp...
详细信息
We consider the quasispecies spectrum reconstruction problem in amplicon reads. The main contribution of this paper is several methods to reconstruct HCV quasispecies from simulated error-free amplicon reads. Our comparison with existing methods for quasispecies spectrum reconstruction both based on shotgun and amplicon reads show significant advantages of the proposed technique. In most of the cases, even low coverage allows to reconstruct majority of quasispecies and very accurately estimate their frequencies in the simulated samples. The source code for all implemented algorithms is available at https://***/nmancuso/bioa/.
暂无评论