In Opportunistic Networks (Oppnets), the link performance is highly unpredictable and the connections are broken frequently. The TCP protocol will perform badly in Oppnet because the end-to-end connection always needs...
详细信息
Nonresonant detection on terahertz radiation of field effect transistors by the influence of magnetic field is studied in this paper. The influence of the magnetic field upon the electron mobility in the transistor ch...
详细信息
ISBN:
(纸本)9781439834022
Nonresonant detection on terahertz radiation of field effect transistors by the influence of magnetic field is studied in this paper. The influence of the magnetic field upon the electron mobility in the transistor channel is discussed and the corresponding influence on the nonresonant detection photoresponse is analyzed in detail. Based on the work before, the numerical tool has been modified by adding the influence of magnetic field, and the nonresonant photoresponse characteristics are investigated. The result of simulation has verified the theory, and the work mechanism of this influence has been revealed in this paper.
A new numerical method is proposed to study nonlinear response of two-dimensional electron plasmas in the channel of field effect transistor structures. The numerical simulations are not only in accordance with the ex...
详细信息
ISBN:
(纸本)9781439834022
A new numerical method is proposed to study nonlinear response of two-dimensional electron plasmas in the channel of field effect transistor structures. The numerical simulations are not only in accordance with the existing theory, but also illustrate how phase shift influences the plasma wave transmission in the conduction channels of field effect transistor structures. The numerical simulations contain the nonlinear effects when the boundary conditions are asymmetric, i.e., when a frequency, amplitude, or phase shift exists between ac signals applied at drain and source sides of the field effect transistor (FET). The plasma wave transmission under nonresonant and resonant conditions is simulated by changing certain structure parameters with our developed simulator. These results demonstrate that the developed simulator is a useful tool in THz detector design and optimization.
In this paper, we present the implementation and analysis of our implemented testbed considering the Optimized Link State Routing (OLSR) protocol for Mobile Ad hoc Networks (MANET). We investigate the effect of mobili...
详细信息
ISBN:
(纸本)9781424459179;9780769539676
In this paper, we present the implementation and analysis of our implemented testbed considering the Optimized Link State Routing (OLSR) protocol for Mobile Ad hoc Networks (MANET). We investigate the effect of mobility and topology changing in the throughput of MANETs. We study the impact of best-effort traffic for Mesh Topology. Experimental time is 150 seconds. In this work, we consider 6 experimental models and we assess the performance of our testbed in terms of throughput, round trip time and packet loss. From our experiments, we found that the OLSR protocol has a good performance when the source node is moving. However, the performance is not good when the three relay nodes are moving.
This paper presents a comparison among different strategies to coordinate the use of heterogeneous wireless sensors aimed for area surveillance. The heterogeneity among the sensor nodes is related to their sensing and...
详细信息
This paper presents a comparison among different strategies to coordinate the use of heterogeneous wireless sensors aimed for area surveillance. The heterogeneity among the sensor nodes is related to their sensing and mobility capabilities. The goal of the strategies is to provide coordination among the different nodes, in order to make the wireless sensor network perform its missions with higher efficiency. Strategies combine advantages of bio-inspired and utility-based approaches to coordination. Simulations of scenarios with different characteristics were performed and the results are compared and analyzed.
In this paper, we consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, we analyse the performance of AODV protocol. In t...
详细信息
ISBN:
(纸本)9781424459179;9780769539676
In this paper, we consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, we analyse the performance of AODV protocol. In the previous work, we considered that the event node is stationary in the observation field. In this work, we want to investigate how the sensor network performs in the case when the event node moves. The simulation results show that the shadowing phenomena, by destroying the regularity of the network, reduce the mean distance among nodes and at the same time increase the interference level and the latency of packet transmission. We found that for mobile event, the Goodput and routing efficiency of TwoRayGround is better than Shadowing, but the Depletion of Shadowing is better than TwoRayGround.
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementati...
详细信息
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based Vehicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.
It is possible to reasonably measure the security quality of individual security patterns. However, more interesting is to ask: Can we show that a system built using security patterns is secure in some sense? We discu...
详细信息
ISBN:
(纸本)9781424458790
It is possible to reasonably measure the security quality of individual security patterns. However, more interesting is to ask: Can we show that a system built using security patterns is secure in some sense? We discuss here some issues about evaluating the security of a system built using security patterns. We consider the use of threats and misuse patterns to perform this evaluation.
Background: Text mining challenges have been organised to measure the performance of automatic text mining solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is timeconsuming...
详细信息
Background: Text mining challenges have been organised to measure the performance of automatic text mining solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is timeconsuming and costly and the final corpus consists at the most of a few thousand documents annotated with a limited set of semantic groups. To overcome these shortcomings, the CALBC project partners (PPs) have produced a large-scale annotated biomedical corpus with four different semantic groups through the harmonisation of annotations from automatic text mining solutions, the first version of the Silver Standard Corpus (SSC-I). The four semantic groups were chemical entities and drugs (CHED), genes and proteins (PRGE), diseases and disorders (DISO) and species (SPE). This corpus has been used for the First CALBC Challenge asking the participants to annotate the corpus with their annotation solutions.
暂无评论