Over the past decade, wireless sensor networks have advanced in terms of hardware design, communication protocols, resource efficiency, and other aspects. Recently, there has been growing interest in mobile wireless s...
详细信息
Over the past decade, wireless sensor networks have advanced in terms of hardware design, communication protocols, resource efficiency, and other aspects. Recently, there has been growing interest in mobile wireless sensor networks, and several small-profile sensing devices that are able to control their own movement have already been developed. Unfortunately, resource constraints inhibit the use of traditional navigation methods, because these typically require bulky, expensive, and sophisticated sensors, substantial memory and processor allocation, and a generous power supply. Therefore, alternative navigation techniques are required. In this paper we present TripNav, a localization and navigation system that is implemented entirely on resource-constrained wireless sensor nodes. Localization is realized using radio interferometric angle of arrival estimation, in which bearings to a mobile node from a small number of infrastructure nodes are estimated based on the observed phase differences of an RF interference signal. The position of the mobile node is then determined using triangulation. A digital compass is also employed to keep the mobile node from deviating from the desired trajectory. We demonstrate using a real-world implementation that a resource-constrained mobile sensor node can accurately perform waypoint navigation with an average position error of 0.95 m.
A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled design approach typically used to desig...
详细信息
A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled design approach typically used to design communication networks, where each network layer is designed independently, does not lead to the desired optimal detection performance. Recent work on decentralized detection has addressed the design of MAC and routing protocols for detection applications by considering independently the Quality of Information (QoI), Channel State Information (CSI), and Residual Energy Information (REI) for each sensor. However, little attention has been given to integrate the three quality measures (QoI, CSI, REI) in the complete system design. In this work, we pursue a cross-layer approach to design a QoI, CSI, and REI-aware Transmission Control Policy (TCP) that coordinates communication between local sensors and the fusion center, in order to maximize the detection performance. We formulate and solve a constrained nonlinear optimization problem to find the optimal TCP design variables. We compare our design with the decoupled approach, where each layer is designed separately, in terms of the delay for detection and WSN lifetime.
The rapidly increasing use of information technology in constructing real-world systems has led to the urgent need for a sound systematic approach in designing networked control systems. Communication delays and other...
详细信息
The rapidly increasing use of information technology in constructing real-world systems has led to the urgent need for a sound systematic approach in designing networked control systems. Communication delays and other uncertainties complicate the development and analysis of these systems. This paper describes a prototype modeling language for the design of networked control systems using passivity to decouple control design from network uncertainties. The modeling language includes an integrated analysis tool to check for passivity and code generators for simulation in MATLAB/Simulink using the TrueTime platform modeling toolbox and for running actual experiments. The resulting designs are by construction robust to platform effects and implementation uncertainties.
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i...
详细信息
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-52 and spin-32 systems. It is, of course, desirable to have a natural resource state in a spin-12, that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-12 frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.
Research has shown that most learning in the workplace takes place outside of formal training and, given the swiftly changing nature of the field, computer science graduates more than most workers, need to be able to ...
详细信息
Consider a backoff algorithm for medium access in wireless networks where a node chooses with probability 1-q to transmit right away and with probability q to transmit after CW slots, where CW is the maximum value of ...
详细信息
Consider a backoff algorithm for medium access in wireless networks where a node chooses with probability 1-q to transmit right away and with probability q to transmit after CW slots, where CW is the maximum value of the contention window. We study a variation of the 802.11 protocol called XVBEB which uses the above backoff scheme and give a theoretical analysis of its saturation throughput. Simulation results show that the throughput of XVBEB is better than that of 802.11 for saturated CBR traffic. Furthermore, XVBEB also exhibits lower packet loss, delay and delay variation than 802.11 for both VBR and VoIP traffic for a variety of load conditions.
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases. I...
详细信息
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases. It includes the encoding of the evidence (representing the context of evaluation) and the crime scene modeling in order to validate claims against the model and perform event reconstruction, potentially within large swaths of digital evidence. To aid investigators to model the scene and evaluate it, instead of typing a Forensic Lucid program, we propose to expand the design and implementation of the Lucid DFG programming onto Forensic Lucid case modeling and specification to enhance the usability of the language and the system. We briefly discuss the related work on visual programming and DFG modeling in an attempt to define and select one approach or a composition of approaches for Forensic Lucid based on various criteria such as previous implementation, wide use, formal backing in terms of semantics and translation. In the end, we solicit the readers' constructive, opinions, feedback, comments, and recommendations within the context of this short discussion.
Nowadays, wireless sensor networks are widely used to monitor real time events and answer the ad hoc queries from a certain member node. However, computing and maintaining the information of aggregate queries in event...
详细信息
Cloud computing paradigm allows on-demand access to computing and storages services over the Internet. To solve the complexity of application deployment in Cloud infrastructure, virtual appliances, pre-configured, rea...
详细信息
Cloud computing paradigm allows on-demand access to computing and storages services over the Internet. To solve the complexity of application deployment in Cloud infrastructure, virtual appliances, pre-configured, ready-to-run applications are emerging as a breakthrough technology. However, an automated approach for deploying network of appliances is required to guarantee minimum deployment cost, low latency, and high reliability. In this paper, we propose and compare two different deployment approaches: Forward-checking-based backtracking (FCBB) and genetic-based. They take into account Quality of Service (QoS) criteria such as reliability, data communication cost, and latency between multiple Clouds to choose the most appropriate combination of virtual machines and appliances. We evaluate our approach using a real case study and different request types. Experimental results show both algorithms reach near optimal solution. Further, we investigate effects of factors such as latency requirements, and data communication between appliances on the performance of the algorithms and placement of appliances across multiple Clouds.
Robotic simulators, frameworks, and related toolkits are very important in today's research community. The need to accurately simulate movements, algorithms, and interactions with the real world is quickly becomin...
详细信息
Robotic simulators, frameworks, and related toolkits are very important in today's research community. The need to accurately simulate movements, algorithms, and interactions with the real world is quickly becoming a major research focus as humans and robots interact in more situations and differently than ever before. This is a survey of popular robotics simulators and some of the main frameworks and toolkits that are used to help bring robotics simulations to a one-to-one relationship with real-world interaction.
暂无评论