In this paper, we propose discrete-time and continuous-time consensus update schemes motivated by the discrete-time and continuous-time Kalman filters. With certainty information encoded into each agent, the proposed ...
详细信息
A comparative study between Java and Avaj, a concurrent programming language, is presented. java uses wait (), notify (), and notifyAll () construct to support monitors, while Avaj simply supports the construct await ...
详细信息
A comparative study between Java and Avaj, a concurrent programming language, is presented. java uses wait (), notify (), and notifyAll () construct to support monitors, while Avaj simply supports the construct await (B), where B is any Boolean expression. The syntax for the Avaj abort () construct is simple and allows programmer to call abort () inside any method. Avaj also incorporates the selective communication construct in the language. The invariant (B) construct in Avaj allows a Boolean expression to be invariant in a program.
This paper illustrates three agent technologies deployed in the Unmanned Aerial Vehicle (UAV) target tracking domain. These capabilities enable: (1) coordination of the tracking of multiple targets among a set of UAVs...
详细信息
The advent of network coding has blurred the line between compression and routing in networks. In this talk, we overview the main principles of network coding and discuss the applicability of network coding to wireles...
详细信息
The advent of network coding has blurred the line between compression and routing in networks. In this talk, we overview the main principles of network coding and discuss the applicability of network coding to wireless network settings. In particular, we argue that the ablity to construct both network codes and minimum-cost subgraphs in a completely distributed fashion may provide considerable improvements, in performance and in ease of network management, over current routing-based approaches.
Rapid loss of blood, in the operating room or trauma, necessitates a need for hastening coagulation Attempts to hasten coagulation include electrocautery based on thermal plasma discharges. Although there have been ot...
Rapid loss of blood, in the operating room or trauma, necessitates a need for hastening coagulation Attempts to hasten coagulation include electrocautery based on thermal plasma discharges. Although there have been other effective attempts to prevent further loss of blood via coagulation, tissue damage and dessication can occur as a result of the high temperatures 2 . Our group has developed a method to initiate rapid coagulation with dielectric plasma discharge (cold). Initial experiments were performed using fresh blood from volunteers to compare time for coagulation of whole blood exposed to plasma, one minute versus 10 minutes. We tried same experiments on cut cadaver organs such as spleen and placenta which showed evidence of rapid coagulation compared to control without evidence of tissue damage. Our research team has developed a novel method using non-thermal dielectric barrier discharge plasma (DBD plasma) to coagulate blood and sterilize tissues without causing thermal damage. This treatment would be safe to patients because no exposed electrodes are involved and high frequency current (under 10 KHz) is kept below mili-ampere. Our experiments have shown that such plasma treatment hastens blood coagulation and causes simultaneous wound sterilization via a large concentration of chemically active species in plasma that are ions, radicals (O, OH, N) and electronically-excited atoms and molecules. A kinetic model of blood coagulation under influence of DBD plasma was constructed. The model assumes contact flux of positive ions from DBD plasma into the surface of the blood being treated. Once at the surface, these ions recombine, leading to formation of aqueous Hydrogen ions which catalyze the release of Calcium ions into the blood. The addition of Calcium ions to blood speeds up the coagulation process proportionally to the amount of ions added. The model demonstrates thrombin formation in the presence of DBD plasma peaking and occurring within significantly le
There are many applications where a team of mobile robots may be more suitable than a single vehicle, especially where a distributed system of sensors is advantageous. For example, in search-and-rescue operations, dep...
详细信息
In this paper, we will present our efforts on the modeling of electrical equipments for integrated drive simulations. FE-based phase variable model is proposed to pursue an accurate and fast simulation of various equi...
详细信息
With high-speed space optical crosslinks, an optical satellite network as part of a larger integrated space-terrestrial network is now feasible. This radical technology building block can have profound transforming ef...
详细信息
The need for mass-produced inexpensive wireless devices operating under strict energy constraints poses new challenges in the system design methodology. This paper presents a methodology for designing wireless nodes i...
详细信息
The need for mass-produced inexpensive wireless devices operating under strict energy constraints poses new challenges in the system design methodology. This paper presents a methodology for designing wireless nodes in which a low cost, reliable antenna is realized by printed circuit traces. We show how to combine the analysis from 2.5D and 3D EM simulators with the PCB design tools to create predictable nodes with printed antennas that meet stringent power and data transmission range goals. The presented approach is applied to the design of a IEEE802.15.4 wireless node deployed in several indoor environments. Copyright 2005 ACM.
Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect t...
详细信息
ISBN:
(纸本)9728865252
Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defend against distributed denial of service attacks by coordinating across the Internet. Unlike traditional IDS, we detect and stop DDoS attacks within the intermediate network. In the proposed approach, DDoS defense systems are deployed in the network to detect DDoS attacks independently. A gossip based communication mechanism is used to exchange information about network attacks between these independent detection nodes to aggregate information about the overall network attacks observed. Using the aggregated information, the individual defense nodes have approximate information about global network attacks and can stop them more effectively and accurately. To provide reliable, rapid and widespread dissemination of attack information, the system is built as a peer to peer overlay network on top of the internet.
暂无评论