WorldWideScience

Sample records for network control scheme

  1. Controllable and Anonymous Authentication Scheme for Space Networks

    Directory of Open Access Journals (Sweden)

    Hu Zhi-Yan

    2017-01-01

    Full Text Available This paper analyzed the existing anonymous authentication schemes which have the weakness of high calculation and communication cost and weak security. So we designed a secure and efficient anonymous authentication scheme to meet the need of the space network, which has the characteristic of resource limited, high exposure and intermittent connectivity. At first we proposed a signature algorithm based on certificateless public key cryptosystem and one-off public key, and then presented an anonymous authentication scheme according to the proposed signature algorithm, it needs two message interaction to complete the mutual authentication and key agreement. When the user has the illegal behavior, the service provider can reveal the illegal user’s real identity through cooperation with the trusted center. Compared with the similar literature, the proposed scheme achieves high security with low computation and communication cost. (Abstract

  2. Controllability of Boolean networks via input controls under Harvey's update scheme

    Science.gov (United States)

    Luo, Chao; Zhang, Xiaolin; Shao, Rui; Zheng, YuanJie

    2016-02-01

    In this article, the controllability of Boolean networks via input controls under Harvey's update scheme is investigated. First, the model of Boolean control networks under Harvey's stochastic update is proposed, by means of semi-tensor product approach, which is converted into discrete-time linear representation. And, a general formula of control-depending network transition matrix is provided. Second, based on discrete-time dynamics, controllability of the proposed model is analytically discussed by revealing the necessary and sufficient conditions of the reachable sets, respectively, for three kinds of controls, i.e., free Boolean control sequence, input control networks, and close-loop control. Examples are showed to demonstrate the effectiveness and feasibility of the proposed scheme.

  3. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...... classical forwarding when both systems implement the improved MAC. However, our measurement results show an even larger gain for network coding, namely, up to 65 % over forwarding, as it copes better with channel losses under high load scenarios....

  4. Autonomous Distributed Congestion Control Scheme in WCDMA Network

    Science.gov (United States)

    Ahmad, Hafiz Farooq; Suguri, Hiroki; Choudhary, Muhammad Qaisar; Hassan, Ammar; Liaqat, Ali; Khan, Muhammad Umer

    Wireless technology has become widely popular and an important means of communication. A key issue in delivering wireless services is the problem of congestion which has an adverse impact on the Quality of Service (QoS), especially timeliness. Although a lot of work has been done in the context of RRM (Radio Resource Management), the deliverance of quality service to the end user still remains a challenge. Therefore there is need for a system that provides real-time services to the users through high assurance. We propose an intelligent agent-based approach to guarantee a predefined Service Level Agreement (SLA) with heterogeneous user requirements for appropriate bandwidth allocation in QoS sensitive cellular networks. The proposed system architecture exploits Case Based Reasoning (CBR) technique to handle RRM process of congestion management. The system accomplishes predefined SLA through the use of Retrieval and Adaptation Algorithm based on CBR case library. The proposed intelligent agent architecture gives autonomy to Radio Network Controller (RNC) or Base Station (BS) in accepting, rejecting or buffering a connection request to manage system bandwidth. Instead of simply blocking the connection request as congestion hits the system, different buffering durations are allocated to diverse classes of users based on their SLA. This increases the opportunity of connection establishment and reduces the call blocking rate extensively in changing environment. We carry out simulation of the proposed system that verifies efficient performance for congestion handling. The results also show built-in dynamism of our system to cater for variety of SLA requirements.

  5. Pre-Allocation Based Flow Control Scheme for Networks-On-Chip

    Science.gov (United States)

    Lin, Shijun; Su, Li; Su, Haibo; Jin, Depeng; Zeng, Lieguang

    Based on the traffic predictability characteristic of Networks-on-Chip (NoC), we propose a pre-allocation based flow control scheme to improve the performance of NoC. In this scheme, routes are pre-allocated and the injection rates of all routes are regulated at the traffic sources according to the average available bandwidths in the links. Then, the number of packets in the network is decreased and thus, the congestion probability is reduced and the communication performance is improved. Simulation results show that this scheme greatly increases the throughput and cuts down the average latency with little area and energy overhead, compared with the switch-to-switch flow control scheme.

  6. Active defense scheme against DDoS based on mobile agent and network control in network confrontation

    Science.gov (United States)

    Luo, Rong; Li, Junshan; Ye, Xia; Wang, Rui

    2013-03-01

    In order to effective defend DDoS attacks in network confrontation, an active defense scheme against DDoS is built based on Mobile Agent and network control. A distributed collaborative active defense model is constructed by using mobile agent technology and encapsulating a variety of DDoS defense techniques. Meanwhile the network control theory is applied to establish a network confrontation's control model for DDoS to control the active defense process. It provides a new idea to solve the DDoS problem.

  7. Optimization of a Traffic Control Scheme for a Post-Disaster Urban Road Network

    Directory of Open Access Journals (Sweden)

    Zengzhen Shao

    2017-12-01

    Full Text Available Traffic control of urban road networks during emergency rescues is conducive to rapid rescue in the affected areas. However, excessive control will lead to negative impacts on the normal traffic order. We propose a novel model to optimize the traffic control scheme during the post-disaster emergency rescue period named PD-TCM (post-disaster traffic control model. In this model, the vertex and edge betweenness indexes of urban road networks are introduced to evaluate the controllability of the road sections. The gravity field model is also used to adjust the travel time function of different road sections in the control and diverging domains. Experimental results demonstrate that the proposed model can obtain the optimal traffic control scheme efficiently, which gives it the ability to meet the demand of emergency rescues as well as reducing the disturbances caused by controls.

  8. Design and implementation of a topology control scheme for wireless mesh networks

    CSIR Research Space (South Africa)

    Mudali, P

    2009-09-01

    Full Text Available investigate the feasibility of power control in a popular WMN backbone device and design and evaluate an autonomous, light-weight TC scheme called PlainTC. An indoor test-bed evaluation shows that PlainTC is able to maintain network connectivity, achieve...

  9. Reliable, Efficient, and Power Optimized Control-Channel Selection Scheme for Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2013-01-01

    Full Text Available This paper presents a centralized control-channel selection scheme for cognitive radio networks (CRNs by exploiting the variation in the spectrum across capacity, occupancy, and error rate. We address the fundamental challenges in the design of the control-channel for CRNs: (1 random licensed users (LUs activity and (2 the economical and vulnerability concerns for a dedicated control-channel. We develop a knapsack problem (KP based reliable, efficient, and power optimized (REPO control-channel selection scheme with an optimal data rate, bit error rate (BER, and idle time. Moreover, we introduce the concept of the backup channels in the context of control-channel selection, which assists the CRs to quickly move on to the next stable channel in order to cater for the sudden appearance of LUs. Based on the KP and its dynamic programming solution, simulation results show that the proposed scheme is highly adaptable and resilient to random LU activity. The REPO scheme reduces collisions with the LUs, minimizes the alternate channel selection time, and reduces the bit error rate (BER. Moreover, it reduces the power consumed during channel switching and provides a performance, that is, competitive with those schemes that are using a static control-channel for the management of control traffic in CRNs.

  10. A self-learning call admission control scheme for CDMA cellular networks.

    Science.gov (United States)

    Liu, Derong; Zhang, Yi; Zhang, Huaguang

    2005-09-01

    In the present paper, a call admission control scheme that can learn from the network environment and user behavior is developed for code division multiple access (CDMA) cellular networks that handle both voice and data services. The idea is built upon a novel learning control architecture with only a single module instead of two or three modules in adaptive critic designs (ACDs). The use of adaptive critic approach for call admission control in wireless cellular networks is new. The call admission controller can perform learning in real-time as well as in offline environments and the controller improves its performance as it gains more experience. Another important contribution in the present work is the choice of utility function for the present self-learning control approach which makes the present learning process much more efficient than existing learning control methods. The performance of our algorithm will be shown through computer simulation and compared with existing algorithms.

  11. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  12. Simulation and stability analysis of neural network based control scheme for switched linear systems.

    Science.gov (United States)

    Singh, H P; Sukavanam, N

    2012-01-01

    This paper proposes a new adaptive neural network based control scheme for switched linear systems with parametric uncertainty and external disturbance. A key feature of this scheme is that the prior information of the possible upper bound of the uncertainty is not required. A feedforward neural network is employed to learn this upper bound. The adaptive learning algorithm is derived from Lyapunov stability analysis so that the system response under arbitrary switching laws is guaranteed uniformly ultimately bounded. A comparative simulation study with robust controller given in [Zhang L, Lu Y, Chen Y, Mastorakis NE. Robust uniformly ultimate boundedness control for uncertain switched linear systems. Computers and Mathematics with Applications 2008; 56: 1709-14] is presented. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  13. Stability of multiple access network control schemes with carrier sensing and exponential backoff

    Science.gov (United States)

    Barany, Ernest; Krupa, Maciej

    2006-05-01

    A new approach to determine the stability of multiple access network control schemes is presented. A “busy” network (the precise meaning of the term “busy” will be presented in the text) is modelled as a switched single-server hybrid dynamical system whose switching laws are stochastic and are based on typical multiple access network control protocols such as ALOHA and ethernet. The techniques are used to compute the critical ratio of traffic production per network node to total available bandwidth that ensures that data packets will not accumulate unboundedly in waiting queues at each node. This is a measure of stability of the network and is an emergent, global, property determined by decentralized, autonomous behavior of each node. The behavior of each individual node is regarded as “microscopic” and the collective behavior of the network as a whole are emergent consequences of such microscopic laws. The results follow from the stationary distribution property of ergodic Markov chains.

  14. Robust fuzzy neural network sliding mode control scheme for IPMSM drives

    Science.gov (United States)

    Leu, V. Q.; Mwasilu, F.; Choi, H. H.; Lee, J.; Jung, J. W.

    2014-07-01

    This article proposes a robust fuzzy neural network sliding mode control (FNNSMC) law for interior permanent magnet synchronous motor (IPMSM) drives. The proposed control strategy not only guarantees accurate and fast command speed tracking but also it ensures the robustness to system uncertainties and sudden speed and load changes. The proposed speed controller encompasses three control terms: a decoupling control term which compensates for nonlinear coupling factors using nominal parameters, a fuzzy neural network (FNN) control term which approximates the ideal control components and a sliding mode control (SMC) term which is proposed to compensate for the errors of that approximation. Next, an online FNN training methodology, which is developed using the Lyapunov stability theorem and the gradient descent method, is proposed to enhance the learning capability of the FNN. Moreover, the maximum torque per ampere (MTPA) control is incorporated to maximise the torque generation in the constant torque region and increase the efficiency of the IPMSM drives. To verify the effectiveness of the proposed robust FNNSMC, simulations and experiments are performed by using MATLAB/Simulink platform and a TI TMS320F28335 DSP on a prototype IPMSM drive setup, respectively. Finally, the simulated and experimental results indicate that the proposed design scheme can achieve much better control performances (e.g. more rapid transient response and smaller steady-state error) when compared to the conventional SMC method, especially in the case that there exist system uncertainties.

  15. An Improved Call Admission Control Mechanism with Prioritized Handoff Queuing Scheme for BWA Networks

    Science.gov (United States)

    Chowdhury, Prasun; Saha Misra, Iti

    2014-10-01

    Nowadays, due to increased demand for using the Broadband Wireless Access (BWA) networks in a satisfactory manner a promised Quality of Service (QoS) is required to manage the seamless transmission of the heterogeneous handoff calls. To this end, this paper proposes an improved Call Admission Control (CAC) mechanism with prioritized handoff queuing scheme that aims to reduce dropping probability of handoff calls. Handoff calls are queued when no bandwidth is available even after the allowable bandwidth degradation of the ongoing calls and get admitted into the network when an ongoing call is terminated with a higher priority than the newly originated call. An analytical Markov model for the proposed CAC mechanism is developed to analyze various performance parameters. Analytical results show that our proposed CAC with handoff queuing scheme prioritizes the handoff calls effectively and reduces dropping probability of the system by 78.57% for real-time traffic without degrading the number of failed new call attempts. This results in the increased bandwidth utilization of the network.

  16. Coordinated single-phase control scheme for voltage unbalance reduction in low voltage network.

    Science.gov (United States)

    Pullaguram, Deepak; Mishra, Sukumar; Senroy, Nilanjan

    2017-08-13

    Low voltage (LV) distribution systems are typically unbalanced in nature due to unbalanced loading and unsymmetrical line configuration. This situation is further aggravated by single-phase power injections. A coordinated control scheme is proposed for single-phase sources, to reduce voltage unbalance. A consensus-based coordination is achieved using a multi-agent system, where each agent estimates the averaged global voltage and current magnitudes of individual phases in the LV network. These estimated values are used to modify the reference power of individual single-phase sources, to ensure system-wide balanced voltages and proper power sharing among sources connected to the same phase. Further, the high X / R ratio of the filter, used in the inverter of the single-phase source, enables control of reactive power, to minimize voltage unbalance locally. The proposed scheme is validated by simulating a LV distribution network with multiple single-phase sources subjected to various perturbations.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  17. Performance Analysis and Optimization of an Adaptive Admission Control Scheme in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Shunfu Jin

    2013-01-01

    Full Text Available In cognitive radio networks, if all the secondary user (SU packets join the system without any restrictions, the average latency of the SU packets will be greater, especially when the traffic load of the system is higher. For this, we propose an adaptive admission control scheme with a system access probability for the SU packets in this paper. We suppose the system access probability is inversely proportional to the total number of packets in the system and introduce an Adaptive Factor to adjust the system access probability. Accordingly, we build a discrete-time preemptive queueing model with adjustable joining rate. In order to obtain the steady-state distribution of the queueing model exactly, we construct a two-dimensional Markov chain. Moreover, we derive the formulas for the blocking rate, the throughput, and the average latency of the SU packets. Afterwards, we provide numerical results to investigate the influence of the Adaptive Factor on different performance measures. We also give the individually optimal strategy and the socially optimal strategy from the standpoints of the SU packets. Finally, we provide a pricing mechanism to coordinate the two optimal strategies.

  18. Controlled retransmission scheme for prioritized burst segmentation to support quality-of-service in optical burst switching networks

    Science.gov (United States)

    Hou, Rui; He, Tingting; Mao, Tengyue

    2012-10-01

    In optical burst switching (OBS) networks, burst contentions in OBS core nodes may cause data loss. To reduce this data loss, a retransmission scheme has been applied. However, uncontrolled retransmission may significantly increase network load and data loss probability, thus defeating the retransmission purpose. In addition, in a priority traffic existing OBS network, OBS nodes may apply different retransmission mechanisms to priority bursts for quality-of-service (QoS) support. We present a controlled retransmission scheme for prioritized burst segmentation to support QoS in OBS networks. Different from previous work in the literature, we set a different value to retransmission probability at each contention and propose a retransmission analytical model for a burst segmentation contention resolution scheme. In addition, we apply the proposed retransmission scheme to the prioritized burst segmentation for QoS support. We take into account the load at each link due to both the fresh and the retransmitted traffic and calculate the path-blocking probability and the byte loss probability for high-priority and low-priority bursts to evaluate the network performance. An extensive simulation is proposed to validate our analytical model.

  19. Robust Networked Control Scheme for Distributed Secondary Control of Islanded MicroGrids

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Stefanovic, Cedomir; Dragicevic, Tomislav

    2014-01-01

    couples the communication and the control functionality, such that the transmission errors are absorbed through an averaging operation performed in each local controller, resulting in a very high reliability. Furthermore, transmissions from each DG are periodic and prescheduled broadcasts, and in this way...

  20. Hybrid ARQ Error-Controlling Scheme for Robust and Efficient Transmission of UWB Body Area Networks

    Science.gov (United States)

    Suzuki, Haruka; Hernandez, Marco; Kohno, Ryuji

    This paper presents hybrid type-II automatic repeat request (H-ARQ) for wireless wearable body area networks (BANs) based on ultra wideband (UWB) technology. The proposed model is based on three schemes, namely, high rate optimized rate compatible punctured convolutional codes (HRO-RCPC), Reed Solomon (RS) invertible codes and their concatenation. Forward error correction (FEC) coding is combined with simple cyclic redundancy check (CRC) error detection. The performance is investigated for two channels: CM3 (on-body to on-body) and CM4 (on-body to a gateway) scenarios of the IEEE802.15.6 BAN channel models for BANs. It is shown that the improvement in performance in terms of throughput and error protection robustness is very significant. Thus, the proposed H-ARQ schemes can be employed and optimized to suit medical and non-medical applications. In particular we propose the use of FEC coding for non-medical applications as those require less stringent quality of service (QoS), while the incremental redundancy and ARQ configuration is utilized only for medical applications. Thus, higher QoS is guaranteed for medical application of BANs while allowing coexistence with non-medical applications.

  1. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  2. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed...

  3. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  4. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  5. Simulation and Modeling of a New Medium Access Control Scheme for Multi-Beam Directional Networking

    Science.gov (United States)

    2017-03-03

    implement our protocol in both simula- tion and a new Extendable Mobile Ad -hoc Network Emula- tor (EMANE) model that allows for real-time, high fidelity...issues, where the amount of data passed between the servers is too high, and 2) computation issues, where calculating the interference on the packets...developed a custom discrete event simulator in C++, and a new Ex- tendable Mobile Ad -hoc Network Emulator (EMANE) [10] model. These tools are used to both

  6. PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET)

    NARCIS (Netherlands)

    Förster, David; Kargl, Frank; Löhr, Hans

    2014-01-01

    Envisioned vehicular ad-hoc networks (VANET) standards use pseudonym certificates to provide secure and privacy-friendly message authentication. Revocation of long-term credentials is required to remove participants from the system, e.g. in case of vehicle theft. However, the current approach to

  7. Simulation and Modeling of a Novel Medium Access Control Scheme for Multi-Beam Directional Networking

    Science.gov (United States)

    2017-03-03

    several novel MAC features are added that allow for robust communication, such as location tracking and tracking neighbor’s transmit or receive state. For...this paper, we implement this protocol in both simula- tion and a new Extendable Mobile Ad -hoc Network Emula- tor (EMANE) model that allows for real...infrastructure issues, where the amount of data passed between the servers is too high, and 2) computation issues, where calculating the interference on the

  8. Design and Performance Evaluation of Cooperative Retransmission Scheme for Reliable Multicast Services in Cellular Controlled P2P Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, F.H.P.; Iversen, Villy Bæk

    2007-01-01

    Reliable multicast applications such as software distribution, data distribution and replication and mailing list delivery, etc. [1] are getting more and more interests from network and service providers. The conventional error/loss recovery schemes are not efficient when they are applied to mult...

  9. Channel Aggregation Schemes for Cognitive Radio Networks

    Science.gov (United States)

    Lee, Jongheon; So, Jaewoo

    This paper proposed three channel aggregation schemes for cognitive radio networks, a constant channel aggregation scheme, a probability distribution-based variable channel aggregation scheme, and a residual channel-based variable channel aggregation scheme. A cognitive radio network can have a wide bandwidth if unused channels in the primary networks are aggregated. Channel aggregation schemes involve either constant channel aggregation or variable channel aggregation. In this paper, a Markov chain is used to develop an analytical model of channel aggregation schemes; and the performance of the model is evaluated in terms of the average sojourn time, the average throughput, the forced termination probability, and the blocking probability. Simulation results show that channel aggregation schemes can reduce the average sojourn time of cognitive users by increasing the channel occupation rate of unused channels in a primary network.

  10. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  11. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  12. Multiplexing schemes for quantum repeater networks

    Science.gov (United States)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  13. Deflection routing scheme for GMPLS-based OBS networks

    DEFF Research Database (Denmark)

    Eid, Arafat; Mahmood, Waqar; Alomar, Anwar

    2010-01-01

    Integrating the Generalized Multi-Protocol Label Switching (GMPLS) framework into an Optical Burst Switching (OBS) Control Plane is a promising solution to alleviating most of OBS performance and design issues. However, implementing the already proposed OBS deflection routing schemes is not appli......Integrating the Generalized Multi-Protocol Label Switching (GMPLS) framework into an Optical Burst Switching (OBS) Control Plane is a promising solution to alleviating most of OBS performance and design issues. However, implementing the already proposed OBS deflection routing schemes...... is not applicable in such an integrated solution. This is due to the existence of already established Label Switched Paths (LSPs) between edge nodes in a GMPLS-based OBS network which guide the Data Burst Headers (DBHs) through the network. In this paper we propose a novel deflection routing scheme which can...... be implemented in GMPLS-based OBS Control Plane. In this scheme, deflection routes or LSPs are designed and pre-established for the whole network. The ingress nodes are responsible for enabling DBHs for deflection at contending core ports prior to DBHs transmission. Moreover, we propose an object extension...

  14. On QoS Guarantees of Error Control Schemes for Data Dissemination in a Chain-based Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Zahra Taghikhaki; Nirvana Meratnia; Paul J M Havinga

    2013-01-01

      Time-critical applications of Wireless Sensor Networks (WSNs) demand timely data delivery for fast identification of out-of-ordinary situations and fast and reliable delivery of notification and warning messages...

  15. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  16. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    Directory of Open Access Journals (Sweden)

    Paul Havinga

    2013-06-01

    Full Text Available Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  17. D-MSR: a distributed network management scheme for real-time monitoring and process control applications in wireless industrial automation.

    Science.gov (United States)

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-06-27

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  18. An Error Control Scheme for Delay Constrained Data Communication in a Chain-Based Wireless Sensor Network

    NARCIS (Netherlands)

    Taghikhaki, Zahra; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    Delay sensitive applications of Wireless Sensor Networks (WSNs) demand timely data delivery for fast identification of out-of-ordinary situations and fast and reliable delivery of notification and warning messages. Due to unreliable nature of WSNs, achieving real-time guarantees and providing

  19. A theoretical bilevel control scheme for power networks with large-scale penetration of distributed renewable resources

    DEFF Research Database (Denmark)

    Boroojeni, Kianoosh; Amini, M. Hadi; Nejadpak, Arash

    2016-01-01

    the residential demand and DRRs, we use the Gaussian white noise added to some periodic signals, formulated as a stochastic process. In the second level of the proposed control framework, we take the advantage of bulk generation units to improve the reliability by a global flow controller. In other words, we get...

  20. Novel coupling scheme to control dynamics of coupled discrete systems

    Science.gov (United States)

    Shekatkar, Snehal M.; Ambika, G.

    2015-08-01

    We present a new coupling scheme to control spatio-temporal patterns and chimeras on 1-d and 2-d lattices and random networks of discrete dynamical systems. The scheme involves coupling with an external lattice or network of damped systems. When the system network and external network are set in a feedback loop, the system network can be controlled to a homogeneous steady state or synchronized periodic state with suppression of the chaotic dynamics of the individual units. The control scheme has the advantage that its design does not require any prior information about the system dynamics or its parameters and works effectively for a range of parameters of the control network. We analyze the stability of the controlled steady state or amplitude death state of lattices using the theory of circulant matrices and Routh-Hurwitz criterion for discrete systems and this helps to isolate regions of effective control in the relevant parameter planes. The conditions thus obtained are found to agree well with those obtained from direct numerical simulations in the specific context of lattices with logistic map and Henon map as on-site system dynamics. We show how chimera states developed in an experimentally realizable 2-d lattice can be controlled using this scheme. We propose this mechanism can provide a phenomenological model for the control of spatio-temporal patterns in coupled neurons due to non-synaptic coupling with the extra cellular medium. We extend the control scheme to regulate dynamics on random networks and adapt the master stability function method to analyze the stability of the controlled state for various topologies and coupling strengths.

  1. Energy Aware Cluster Based Routing Scheme For Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Roy Sohini

    2015-09-01

    Full Text Available Wireless Sensor Network (WSN has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The recent researches are facing the various challenges of the sensor network more gracefully. However, energy efficiency has still remained a matter of concern for the researches. Meeting the countless security needs, timely data delivery and taking a quick action, efficient route selection and multi-path routing etc. can only be achieved at the cost of energy. Hierarchical routing is more useful in this regard. The proposed algorithm Energy Aware Cluster Based Routing Scheme (EACBRS aims at conserving energy with the help of hierarchical routing by calculating the optimum number of cluster heads for the network, selecting energy-efficient route to the sink and by offering congestion control. Simulation results prove that EACBRS performs better than existing hierarchical routing algorithms like Distributed Energy-Efficient Clustering (DEEC algorithm for heterogeneous wireless sensor networks and Energy Efficient Heterogeneous Clustered scheme for Wireless Sensor Network (EEHC.

  2. Adaptive Decision-Making Scheme for Cognitive Radio Networks

    KAUST Repository

    Alqerm, Ismail

    2014-05-01

    Radio resource management becomes an important aspect of the current wireless networks because of spectrum scarcity and applications heterogeneity. Cognitive radio is a potential candidate for resource management because of its capability to satisfy the growing wireless demand and improve network efficiency. Decision-making is the main function of the radio resources management process as it determines the radio parameters that control the use of these resources. In this paper, we propose an adaptive decision-making scheme (ADMS) for radio resources management of different types of network applications including: power consuming, emergency, multimedia, and spectrum sharing. ADMS exploits genetic algorithm (GA) as an optimization tool for decision-making. It consists of the several objective functions for the decision-making process such as minimizing power consumption, packet error rate (PER), delay, and interference. On the other hand, maximizing throughput and spectral efficiency. Simulation results and test bed evaluation demonstrate ADMS functionality and efficiency.

  3. A Novel Congestion Detection Scheme in TCP Over OBS Networks

    KAUST Repository

    Shihada, Basem

    2009-02-01

    This paper introduces a novel congestion detection scheme for high-bandwidth TCP flows over optical burst switching (OBS) networks, called statistical additive increase multiplicative decrease (SAIMD). SAIMD maintains and analyzes a number of previous round-trip time (RTTs) at the TCP senders in order to identify the confidence with which a packet loss event is due to network congestion. The confidence is derived by positioning short-term RTT in the spectrum of long-term historical RTTs. The derived confidence corresponding to the packet loss is then taken in the developed policy for TCP congestion window adjustment. We will show through extensive simulation that the proposed scheme can effectively solve the false congestion detection problem and significantly outperform the conventional TCP counterparts without losing fairness. The advantages gained in our scheme are at the expense of introducing more overhead in the SAIMD TCP senders. Based on the proposed congestion control algorithm, a throughput model is formulated, and is further verified by simulation results.

  4. The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

    Directory of Open Access Journals (Sweden)

    Y. Chen

    2013-08-01

    Full Text Available With the ever-increasing wireless data application recently, considerable efforts have been focused on the designof distributed explicit rate scheme based on Network Utility Maximization (NUM or wireless multi-hop meshnetworks. This paper describes a novel wireless multi-hop multicast flow control scheme for wireless meshnetworks via 802.11, which is based on the distributed self-turning Optimal Proportional plus Second-orderDifferential (OPSD controller. The control scheme, which is located at the sources in the wireless multicastnetworks, can ensure short convergence time by regulating the transmission rate. We further analyze thetheoretical aspects of the proposed algorithm. Simulation results demonstrate the efficiency of the proposedscheme in terms of fast response time, low packet loss and error ration.

  5. Analyses of resource reservation schemes for optical burst switching networks

    Science.gov (United States)

    Solanska, Michaela; Scholtz, Lubomir; Ladanyi, Libor; Mullerova, Jarmila

    2017-12-01

    With growing demands of Internet Protocol services for transmission capacity and speed, the Optical Burst Switching presents the solution for future high-speed optical networks. Optical Burst Switching is a technology for transmitting large amounts of data bursts through a transparent optical switching network. To successfully transmit bursts over OBS network and reach the destination node, resource reservation schemes have to be implemented to allocate resources and configure optical switches for that burst at each node. The one-way resource reservation schemes and the performance evaluation of reservation schemes are presented. The OBS network model is performed using OMNeT++ simulation environment. During the reservation of network resources, the optical cross-connect based on semiconductor optical amplifier is used as the core node. Optical switches based on semiconductor optical amplifiers are a promising technology for high-speed optical communication networks.

  6. Efficient Video Streaming Scheme for Next Generations of Mobile Networks

    Directory of Open Access Journals (Sweden)

    Majdi Ashibani

    2005-04-01

    Full Text Available Video streaming over next generations of mobile networks has undergone enormous development recently due to the continuing growth in wireless communication, especially since the emergence of 3G wireless networks. The new generations of wireless networks pose many challenges, including supporting quality of service over wireless communication links. This is due to the time-varying characteristics of wireless channel. Therefore, a more flexible and efficient bandwidth allocation scheme is needed. This paper is a part of ongoing work to come up with a more robust scheme that is capable of rapidly adapting to changes in network conditions. The proposed scheme focuses on the wireless part of the network, providing high quality video service and better utilization of network resources.

  7. Verifiable Rational Secret Sharing Scheme in Mobile Networks

    Directory of Open Access Journals (Sweden)

    En Zhang

    2015-01-01

    Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

  8. Precise control of a four degree-of-freedom permanent magnet biased active magnetic bearing system in a magnetically suspended direct-driven spindle using neural network inverse scheme

    Science.gov (United States)

    Sun, Xiaodong; Su, Bokai; Chen, Long; Yang, Zebin; Xu, Xing; Shi, Zhou

    2017-05-01

    The capacity of improving the control accuracy and dynamic performance of a four degree-of-freedom (DOF) permanent magnet biased active magnetic bearing (PMBAMB) system is critical to developing and maintaining a high precision application in a magnetically suspended direct-driven spindle system. The 4-DOF PMBAMB system, however, is a multivariable, strong coupled and nonlinear system with unavoidable and unmeasured external disturbances, in addition to having parameter variations. The satisfactory control performance cannot be obtained by using traditional strategies. Therefore, it is important to present a novel control scheme to construct a robust controller with good closed-loop capability. This paper proposes a new decoupling control scheme for a 4-DOF PMBAMB in a direct-driven spindle system based on the neural network inverse (NNI) and 2- degree-of-freedom (DOF) internal model control method. By combining the inversion of the 4-DOF PMBAMB system with its original system, a new pseudolinear system can be developed. In addition, by introducing the 2-DOF internal model controller into the pseudolinear system to design extra closed-loop controllers, we can effectively eliminate the influence of the unmodeled dynamics to the decoupling control accuracy, as well as adjust the properties of tracking and disturbance rejection independently. The experimental results demonstrate the effectiveness of the proposed control scheme.

  9. Controlling Congestion on Complex Networks

    CERN Document Server

    Buzna, Lubos

    2016-01-01

    From the Internet to road networks and the power grid, modern life depends on controlling flows on critical infrastructure networks that often operate in a congested state. Yet, we have a limited understanding of the relative performance of the control mechanisms available to manage congestion and of the interplay between network topology, path layout and congestion control algorithms. Here, we consider two flow algorithms (max-flow and uniform-flow), and two more realistic congestion control schemes (max-min fairness and proportional fairness). We analyse how the algorithms and network topology affect throughput, fairness and the location of bottleneck edges. Our results show that on large random networks a network operator can implement the trade-off (proportional fairness) instead of the fair allocation (max-min fairness) with little sacrifice in throughput. We illustrate how the previously studied uniform-flow approach leaves networks severely underutilised in comparison with congestion control algorithms...

  10. Experimental Results of Network-Assisted Interference Suppression Scheme Using Adaptive Beam-Tilt Switching

    Directory of Open Access Journals (Sweden)

    Tomoki Murakami

    2017-01-01

    Full Text Available This paper introduces a network-assisted interference suppression scheme using beam-tilt switching per frame for wireless local area network systems and its effectiveness in an actual indoor environment. In the proposed scheme, two access points simultaneously transmit to their own desired station by adjusting angle of beam-tilt including transmit power assisted from network server for the improvement of system throughput. In the conventional researches, it is widely known that beam-tilt is effective for ICI suppression in the outdoor scenario. However, the indoor effectiveness of beam-tilt for ICI suppression has not yet been indicated from the experimental evaluation. Thus, this paper indicates the effectiveness of the proposed scheme by analyzing multiple-input multiple-output channel matrices from experimental measurements in an office environment. The experimental results clearly show that the proposed scheme offers higher system throughput than the conventional scheme using just transmit power control.

  11. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  12. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  13. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  14. Multi-domain service dispatching scheme based on SDON virtualized network

    Science.gov (United States)

    Zheng, Mingfang; Li, Hui; Ji, Yuefeng

    2017-10-01

    With the information flow in the network growing rapidly and the size of network extending gradually, it is essential that SDON networking supports multi-domain optical services. Since the type of network has moved toward complicated and converged, the disparate network resource has interlaced, an isomerized network situation is the trend in the future. Accordingly, end-to-end (E2E) services have shifted from a single service provider domain towards a multi-domain service provider. On this condition, the traditional isolated networking mode is so difficult to meet the current demand. E2E multi-domain services are the trend in the future. This paper proposes a multi-domain service dispatching scheme based on SDON virtualized network. By sending concurrent http requests to controller multiple single-domain controllers, web service management will manage optical devices and achieve E2E multi-domain service requests over this scheme. The management layer establishes E2E services dispatching system in multi-domain virtual optical network and it changes the present situation of disparate single service provider incompatibility. The experiment also indicates the reality possibility of the multi-domain dispatching scheme. This scheme will provide basis for the large scale multi-domain networking based on SDON in the future.

  15. Intelligent control schemes applied to Automatic Generation Control

    Directory of Open Access Journals (Sweden)

    Dingguo Chen

    2016-04-01

    Full Text Available Integrating ever increasing amount of renewable generating resources to interconnected power systems has created new challenges to the safety and reliability of today‟s power grids and posed new questions to be answered in the power system modeling, analysis and control. Automatic Generation Control (AGC must be extended to be able to accommodate the control of renewable generating assets. In addition, AGC is mandated to operate in accordance with the NERC‟s Control Performance Standard (CPS criteria, which represent a greater flexibility in relaxing the control of generating resources and yet assuring the stability and reliability of interconnected power systems when each balancing authority operates in full compliance. Enhancements in several aspects to the traditional AGC must be made in order to meet the aforementioned challenges. It is the intention of this paper to provide a systematic, mathematical formulation for AGC as a first attempt in the context of meeting the NERC CPS requirements and integrating renewable generating assets, which has not been seen reported in the literature to the best knowledge of the authors. Furthermore, this paper proposes neural network based predictive control schemes for AGC. The proposed controller is capable of handling complicated nonlinear dynamics in comparison with the conventional Proportional Integral (PI controller which is typically most effective to handle linear dynamics. The neural controller is designed in such a way that it has the capability of controlling the system generation in the relaxed manner so the ACE is controlled to a desired range instead of driving it to zero which would otherwise increase the control effort and cost; and most importantly the resulting system control performance meets the NERC CPS requirements and/or the NERC Balancing Authority’s ACE Limit (BAAL compliance requirements whichever are applicable.

  16. A New Graph Drawing Scheme for Social Network

    Directory of Open Access Journals (Sweden)

    Eric Ke Wang

    2014-01-01

    visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.

  17. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    This paper examines the optimal sequencing of sales in the presence of network externalities. A firm sells a good to a group of consumers whose payoff from buying is increasing in total quantity sold. The firm selects the order to serve consumers so as to maximize expected sales. It can serve all...

  18. Lossless Compression Schemes for ECG Signals Using Neural Network Predictors

    Directory of Open Access Journals (Sweden)

    C. Eswaran

    2007-01-01

    Full Text Available This paper presents lossless compression schemes for ECG signals based on neural network predictors and entropy encoders. Decorrelation is achieved by nonlinear prediction in the first stage and encoding of the residues is done by using lossless entropy encoders in the second stage. Different types of lossless encoders, such as Huffman, arithmetic, and runlength encoders, are used. The performances of the proposed neural network predictor-based compression schemes are evaluated using standard distortion and compression efficiency measures. Selected records from MIT-BIH arrhythmia database are used for performance evaluation. The proposed compression schemes are compared with linear predictor-based compression schemes and it is shown that about 11% improvement in compression efficiency can be achieved for neural network predictor-based schemes with the same quality and similar setup. They are also compared with other known ECG compression methods and the experimental results show that superior performances in terms of the distortion parameters of the reconstructed signals can be achieved with the proposed schemes.

  19. An Optimized Network Selection and Handover Triggering Scheme for Heterogeneous Self-Organized Wireless Networks

    Directory of Open Access Journals (Sweden)

    Murad Khan

    2014-01-01

    Full Text Available Optimizing the balance between different handover parameters for network selection is one of the challenging tasks for seamless communication in heterogeneous networks. Traditional approaches for network selection are mostly based on the Receive Signal Strength (RSS from the Point of Attachment (PoA of a network. Most of these schemes are suffered from high handover delay, false handover indications, and inappropriate network selection for handover. To address these problems, we present an optimized network selection scheme based on the speed of a mobile node. A mechanism based on two different thresholds on the speed of a Mobile Node (MN is integrated in the proposed scheme. If the speed of an MN is greater than any of the threshold, the MN performs handover to a particular network. We employ Grey Relational Analysis (GRA in the proposed scheme to select the best PoA of the selected network. Similarly, to deal with false handover indications, we proposed an optimized handover triggering technique. We compare our proposed scheme with existing schemes in context of energy consumption for scanning, frequent and failed handovers, packet loss ratio, and handover delay. The proposed scheme shows superior performance and it outperforms existing schemes used for similar purpose. Moreover, simulation results show the accuracy and performance of the proposed scheme.

  20. SDN-Based Mobile Data Offloading Scheme Using a Femtocell and WiFi Networks

    Directory of Open Access Journals (Sweden)

    Chang-Woo Ahn

    2017-01-01

    Full Text Available Because of the many applications running on smartphones, the load of mobile data traffic on cellular networks is increasing rapidly. A femtocell is a solution to increase the cellular network capacity and coverage. However, because it uses the same frequency bands as a macrocell, interference problems have prevented its widespread adoption. In this paper, we propose a scheme for traffic offloading between femtocells and WiFi networks utilizing software-defined networking (SDN technology. In the proposed offloading scheme, the SDN technology allows a terminal to maintain existing sessions after offloading through a centralized control of the SDN-based equipment. We also propose an offloading target selection scheme based on available bandwidth estimation and an association control mechanism to reduce the femtocell load while ensuring quality of service (QoS in terms of throughput. Experimental results on an actual testbed showed that the proposed offloading scheme provides seamless connectivity and reduces the femtocell load by up to 46% with the aid of the proposed target selection scheme, while ensuring QoS after offloading. We also observed that the proposed target selection scheme offloads 28% more traffic to WiFi networks compared to received signal strength indicator-based target selection in a low background traffic environment.

  1. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    Science.gov (United States)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  2. Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yung-Cheng Lee

    2012-10-01

    Full Text Available Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels.

  3. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2015-03-01

    Full Text Available Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  4. Efficient JPEG 2000 Image Compression Scheme for Multihop Wireless Networks

    OpenAIRE

    Halim Sghaier; Abdelhamid Helali; Mohsen Nasri; Hassen Maaref

    2011-01-01

    When using wireless sensor networks for real-time data transmission, some critical points should be considered. Restricted computational power, reduced memory, narrow bandwidth and energy supplied present strong limits in sensor nodes. Therefore, maximizing network lifetime and minimizing energy consumption are always optimization goals. To overcome the computation and energy limitation of individual sensor nodes during image transmission, an energy efficient image transport scheme is propose...

  5. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  6. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  7. Combined Control Scheme for Monitoring Quality Characteristics

    Directory of Open Access Journals (Sweden)

    Adekeye K.S.

    2014-07-01

    Full Text Available In the literature, the Exponentially Weighted Moving Average (EWMA and Exponentially Weighted Moving Variance (EMWV control schemes have been used separately to monitor the process average and process variability respectively. Here the two are combined and applied on simulated process with different level of variation. The control limit interval (CLI and the average run length (ARL were evaluated for the combined chart. The combined chart performed better than the two independently. Furthermore, an algorithm was developed for the two control charts and implemented on visual basic VB6.0. The obtained results show that the combined EWMA and EWMV control chart is very sensitive in detecting shift in production process and every shift in the process mean is always preceded by shift in the process variability.

  8. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  9. An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.

  10. ACO-Based Sweep Coverage Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Huang

    2015-01-01

    Full Text Available Coverage problem is one of the major issues in wireless sensor networks (WSN. In order to optimize the network coverage, different coverage formulations have been proposed. Recently, a newly emerging coverage scheme in wireless sensor networks, sweep coverage, which uses mobile sensors to monitor certain points of interest (POIs, is proposed. However, the data delivery to sink, an important problem in WSN, is not considered in original sweep coverage and many of the existing works did not consider it yet. In this work, a novel algorithm named ACOSC (ACO-based sweep coverage to solve the sweep coverage problem considering periodical coverage of POIs and delivery of data simultaneously is proposed. The evaluation results show that our algorithm has better performance than existing schemes.

  11. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  12. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  13. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  14. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  15. Green frame aggregation scheme for Wi-Fi networks

    KAUST Repository

    Alaslani, Maha S.

    2015-07-01

    Frame aggregation is a major enhancement in the IEEE 802.11 family to boost the network performance. The increasing awareness about energy efficiency motivates the re-think of frame aggregation design. In this paper, we propose a novel Green Frame Aggregation (GFA) scheduling scheme that optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects an optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel. This scheme is implemented and evaluated using a testbed deployment. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy efficiency by about 6x in the presence of severe interference conditions. Moreover, GFA outperforms the static frame sizing method in terms of network goodput while maintaining the same end-to-end latency.

  16. An Efficient Location Verification Scheme for Static Wireless Sensor Networks.

    Science.gov (United States)

    Kim, In-Hwan; Kim, Bo-Sung; Song, JooSeok

    2017-01-24

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors.

  17. Efficient JPEG 2000 Image Compression Scheme for Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Halim Sghaier

    2011-08-01

    Full Text Available When using wireless sensor networks for real-time data transmission, some critical points should be considered. Restricted computational power, reduced memory, narrow bandwidth and energy supplied present strong limits in sensor nodes. Therefore, maximizing network lifetime and minimizing energy consumption are always optimization goals. To overcome the computation and energy limitation of individual sensor nodes during image transmission, an energy efficient image transport scheme is proposed, taking advantage of JPEG2000 still image compression standard using MATLAB and C from Jasper. JPEG2000 provides a practical set of features, not necessarily available in the previous standards. These features were achieved using techniques: the discrete wavelet transform (DWT, and embedded block coding with optimized truncation (EBCOT. Performance of the proposed image transport scheme is investigated with respect to image quality and energy consumption. Simulation results are presented and show that the proposed scheme optimizes network lifetime and reduces significantly the amount of required memory by analyzing the functional influence of each parameter of this distributed image compression algorithm.

  18. Privacy-preserving schemes for Ad Hoc Social Networks: A survey

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros; Ahmim, Ahmed

    2016-01-01

    In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and in-detail examine thirty-three privacy preserving schemes developed for or applied in the context of ad hoc social networks. These schemes are published between 2008 and 2016. Based on this existing privacy preservation schemes, we survey privacy preservation models, including location...

  19. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    NARCIS (Netherlands)

    Zand, P.; Dilo, Arta; Havinga, Paul J.M.

    2013-01-01

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot

  20. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Xin; Zhang, Ruisheng; Liu, Qidong

    2017-01-01

    Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.

  1. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  2. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  3. Towards a Fair and Efficient Packet Scheduling Scheme in Inter-Flow Network Coding

    Directory of Open Access Journals (Sweden)

    Jin Wang

    2014-11-01

    Full Text Available Network coding techniques are usually applied upon network-layer protocols to improve throughput in wireless networks. In scenarios with multiple unicast sessions, fairness is also an important factor. Therefore, a network coding-aware packet-scheduling algorithm is required. A packet-scheduling algorithm determines which packet to send next from a node’s packet backlog. Existing protocols mostly employ a basic round-robin scheduling algorithm to give “equal” opportunities to different packet flows. In fact, this “equal”-opportunity scheduling is neither fair, nor efficient. This paper intends to accentuate the importance of a coding-aware scheduling scheme. With a good scheduling scheme, we can gain more control over the per-flow throughput and fairness. Specifically, we first formulate a static scheduling problem and propose an algorithm to find the optimal scheduling scheme. We then extend the technique to a dynamic setting and, later, to practical routing protocols. Results show that the algorithm is comparatively scalable, and it can improve the throughput gain when the network is not severely saturated. The fairness among flows is drastically improved as a result of this scheduling scheme.

  4. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  5. A Lightweight Data Integrity Scheme for Sensor Networks

    Science.gov (United States)

    Kamel, Ibrahim; Juma, Hussam

    2011-01-01

    Limited energy is the most critical constraint that limits the capabilities of wireless sensor networks (WSNs). Most sensors operate on batteries with limited power. Battery recharging or replacement may be impossible. Security mechanisms that are based on public key cryptographic algorithms such as RSA and digital signatures are prohibitively expensive in terms of energy consumption and storage requirements, and thus unsuitable for WSN applications. This paper proposes a new fragile watermarking technique to detect unauthorized alterations in WSN data streams. We propose the FWC-D scheme, which uses group delimiters to keep the sender and receivers synchronized and help them to avoid ambiguity in the event of data insertion or deletion. The watermark, which is computed using a hash function, is stored in the previous group in a linked-list fashion to ensure data freshness and mitigate replay attacks, FWC-D generates a serial number SN that is attached to each group to help the receiver determines how many group insertions or deletions occurred. Detailed security analysis that compares the proposed FWC-D scheme with SGW, one of the latest integrity schemes for WSNs, shows that FWC-D is more robust than SGW. Simulation results further show that the proposed scheme is much faster than SGW. PMID:22163840

  6. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  7. Sensor data security level estimation scheme for wireless sensor networks.

    Science.gov (United States)

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-19

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.

  8. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  9. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  10. Adaptive Tracking Control for Robots With an Interneural Computing Scheme.

    Science.gov (United States)

    Tsai, Feng-Sheng; Hsu, Sheng-Yi; Shih, Mau-Hsiang

    2017-01-24

    Adaptive tracking control of mobile robots requires the ability to follow a trajectory generated by a moving target. The conventional analysis of adaptive tracking uses energy minimization to study the convergence and robustness of the tracking error when the mobile robot follows a desired trajectory. However, in the case that the moving target generates trajectories with uncertainties, a common Lyapunov-like function for energy minimization may be extremely difficult to determine. Here, to solve the adaptive tracking problem with uncertainties, we wish to implement an interneural computing scheme in the design of a mobile robot for behavior-based navigation. The behavior-based navigation adopts an adaptive plan of behavior patterns learning from the uncertainties of the environment. The characteristic feature of the interneural computing scheme is the use of neural path pruning with rewards and punishment interacting with the environment. On this basis, the mobile robot can be exploited to change its coupling weights in paths of neural connections systematically, which can then inhibit or enhance the effect of flow elimination in the dynamics of the evolutionary neural network. Such dynamical flow translation ultimately leads to robust sensory-to-motor transformations adapting to the uncertainties of the environment. A simulation result shows that the mobile robot with the interneural computing scheme can perform fault-tolerant behavior of tracking by maintaining suitable behavior patterns at high frequency levels.

  11. Optimal Retrofit Scheme for Highway Network under Seismic Hazards

    Directory of Open Access Journals (Sweden)

    Yongxi Huang

    2014-06-01

    Full Text Available Many older highway bridges in the United States (US are inadequate for seismic loads and could be severely damaged or collapsed in a relatively small earthquake. According to the most recent American Society of Civil Engineers’ infrastructure report card, one-third of the bridges in the US are rated as structurally deficient and many of these structurally deficient bridges are located in seismic zones. To improve this situation, at-risk bridges must be identified and evaluated and effective retrofitting programs should be in place to reduce their seismic vulnerabilities. In this study, a new retrofit strategy decision scheme for highway bridges under seismic hazards is developed and seamlessly integrate the scenario-based seismic analysis of bridges and the traffic network into the proposed optimization modeling framework. A full spectrum of bridge retrofit strategies is considered based on explicit structural assessment for each seismic damage state. As an empirical case study, the proposed retrofit strategy decision scheme is utilized to evaluate the bridge network in one of the active seismic zones in the US, Charleston, South Carolina. The developed modeling framework, on average, will help increase network throughput traffic capacity by 45% with a cost increase of only $15million for the Mw 5.5 event and increase the capacity fourfold with a cost of only $32m for the Mw 7.0 event.

  12. A Practical Resource Management Scheme for Cellular Underlaid D2D Networks

    Directory of Open Access Journals (Sweden)

    Tae-Won Ban

    2017-10-01

    Full Text Available In this paper, we investigate a resource management scheme for cellular underlaid device-to-device (D2D communications, which are an integral part of mobile caching networks. D2D communications are allowed to share radio resources with cellular communications as long as the generating interference of D2D communications satisfies an interference constraint to secure cellular communications. Contrary to most of the other studies, we propose a distributed resource management scheme for cellular underlaid D2D communications focusing on a practical feasibility. In the proposed scheme, the feedback of channel information is not required because all D2D transmitters use a fixed transmit power and every D2D transmitter determines when to transmit data on its own without centralized control. We analyze the average sum-rates to evaluate the proposed scheme and compare them with optimal values, which can be achieved when a central controller has the perfect entire channel information and the full control of all D2D communications. Our numerical results show that the average sum-rates of the proposed scheme approach the optimal values in low or high signal-to-noise power ratio (SNR regions. In particular, the proposed scheme achieves almost optimal average sum-rates in the entire SNR values in practical environments.

  13. Modeling and Simulation of Handover Scheme in Integrated EPON-WiMAX Networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    In this paper, we tackle the seamless handover problem in integrated optical wireless networks. Our model applies for the convergence network of EPON and WiMAX and a mobilityaware signaling protocol is proposed. The proposed handover scheme, Integrated Mobility Management Scheme (IMMS), is assisted...... by enhancing the traditional MPCP signaling protocol, which cooperatively collects mobility information from the front-end wireless network and makes centralized bandwidth allocation decisions in the backhaul optical network. The integrated network architecture and the joint handover scheme are simulated using...... OPNET modeler. Results show validation of the protocol, i.e., integrated handover scheme gains better network performances....

  14. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  15. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  16. Power Saving Scheduling Scheme for Internet of Things over LTE/LTE-Advanced Networks

    Directory of Open Access Journals (Sweden)

    Yen-Wei Kuo

    2015-01-01

    Full Text Available The devices of Internet of Things (IoT will grow rapidly in the near future, and the power consumption and radio spectrum management will become the most critical issues in the IoT networks. Long Term Evolution (LTE technology will become a promising technology used in IoT networks due to its flat architecture, all-IP network, and greater spectrum efficiency. The 3rd Generation Partnership Project (3GPP specified the Discontinuous Reception (DRX to reduce device’s power consumption. However, the DRX may pose unexpected communication delay due to missing Physical Downlink Control Channel (PDCCH information in sleep mode. Recent studies mainly focus on optimizing DRX parameters to manage the tradeoff between the energy consumption and communication latency. In this paper, we proposed a fuzzy-based power saving scheduling scheme for IoT over the LTE/LTE-Advanced networks to deal with the issues of the radio resource management and power consumption from the scheduling and resource allocation perspective. The proposed scheme considers not only individual IoT device’s real-time requirement but also the overall network performance. The simulation results show that our proposed scheme can meet the requirements of the DRX cycle and scheduling latency and can save about half of energy consumption for IoT devices compared to conventional approaches.

  17. Designing Structure-Dependent MPC-Based AGC Schemes Considering Network Topology

    Directory of Open Access Journals (Sweden)

    Young-Sik Jang

    2015-04-01

    Full Text Available This paper presents the important features of structure-dependent model predictive control (MPC-based approaches for automatic generation control (AGC considering network topology. Since power systems have various generators under different topologies, it is necessary to reflect the characteristics of generators in power networks and the control system structures in order to improve the dynamic performance of AGC. Specifically, considering control system structures is very important because not only can the topological problems be reduced, but also a computing system for AGC in a bulk-power system can be realized. Based on these considerations, we propose new schemes in the proposed controller for minimizing inadvertent line flows and computational burden, which strengthen the advantages of MPC-based approach for AGC. Analysis and simulation results in the IEEE 39-bus model system show different dynamic behaviors among structure-dependent control schemes and possible improvements in computational burden via the proposed control scheme while system operators in each balancing area consider physical load reference ramp constraints among generators.

  18. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  19. A NOVEL HYBRID SCHEME FOR CONTENTION MINIMIZATION IN OPTICAL BURST SWITCHED NETWORK

    Directory of Open Access Journals (Sweden)

    Dilip H. Patel

    2015-12-01

    Full Text Available In Optical Burst Switched (OBS Networks, data is transported in a bufferless network and hence there is fair amount of possibility of contention among the data bursts. This occurs when multiple bursts contend for the same link. The existing reactive contention resolution schemes attempt to address issue of contention without making any efforts to minimize the occurrences of contention in the network. Also, the existing proactive contention minimization schemes fail to provide improvement in contention loss at a very high load. Therefore, we are presenting new scheme for reducing the occurrence of contention in OBS network and it is known as Dynamic Hybrid Cluster and Deflection Feedback (DHCF scheme. In proposed DHCF scheme entire OBS network is partitioned into many small clusters. In each cluster, one node acts as cluster head for gathering the information of resources in the network. The contention is minimized using clustering approach and it can be further improved with the help of deflection feedback mechanism. A performance metrics is considered to evaluate merits of the proposed DHCF scheme and its effects on overall network performance. Also, the comparison of the performance of the DHCF scheme with limited hybrid deflection and retransmission (LHDR scheme and dynamic hybrid retransmission in deflection routing (DHRD scheme is made. The simulation results show that the proposed scheme gives improvement in Burst Loss Probability (BLP in the range of 31% to 38% and delay improvement in the range of 64% to 74% on vBSN network. The vBSN is network topology.

  20. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  1. Energy efficient in-network RFID data filtering scheme in wireless sensor networks.

    Science.gov (United States)

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes' energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  2. Spectrum handoff scheme with multiple attributes decision making for optimal network selection in cognitive radio networks

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2017-08-01

    Full Text Available It is envisaged that in future Cognitive Radio (CR networks deployment, multiple radio access networks may coexist. The networks may have different characteristics in terms of multiple attributes. CRs will have choices of selecting the optimal network out of the available networks. Optimal network selection is a challenging task that can be performed by spectrum handoff with Multiple Attribute Decision Making (MADM. The spectrum handoff decision with MADM provides wider and optimal choice with quality of service. This motivates the devolopment of a spectrum handoff scheme with MADM methods such as simple additive weighting, a technique for order preference by similarity to the ideal solution, a grey relational analysis and a cost function based method, which is the objective of this study. The CR preferences are based on voice, video and data services, called triple play services. The numerical results show that all MADM methods are effective for selecting the optimal network for spectrum handoff with a reduced complexity for the spectrum handoff decision. The paper shows that the proposed spectrum handoff scheme can be effectively implemented to select the optimal network according to triple play services in CR networks.

  3. Adaptive Transmission Opportunity Scheme Based on Delay Bound and Network Load in IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    S. Kim

    2013-08-01

    Full Text Available The IEEE 802.11e EDCA (Enhanced Distributed Channel Access is able to provide QoS (Quality of Service by adjusting the transmission opportunities (TXOPs, which control the period to access the medium. The EDCA has a fairness problem among competing stations, which support multimedia applications with different delay bounds. In this paper, we propose a simple and effective scheme for alleviating the fairness problem. The proposed scheme dynamically allocates the TXOP value based on the delay bounds of the data packets in a queue and the traffic load of network. Performance of the proposed scheme is investigated by simulation. Our results show that compared to conventional scheme, the proposed scheme significantly improves network performance, and achieves a high degree of fairness among stations with different multimedia applications.

  4. Reliable and Fault-Tolerant Software-Defined Network Operations Scheme for Remote 3D Printing

    Science.gov (United States)

    Kim, Dongkyun; Gil, Joon-Min

    2015-03-01

    The recent wide expansion of applicable three-dimensional (3D) printing and software-defined networking (SDN) technologies has led to a great deal of attention being focused on efficient remote control of manufacturing processes. SDN is a renowned paradigm for network softwarization, which has helped facilitate remote manufacturing in association with high network performance, since SDN is designed to control network paths and traffic flows, guaranteeing improved quality of services by obtaining network requests from end-applications on demand through the separated SDN controller or control plane. However, current SDN approaches are generally focused on the controls and automation of the networks, which indicates that there is a lack of management plane development designed for a reliable and fault-tolerant SDN environment. Therefore, in addition to the inherent advantage of SDN, this paper proposes a new software-defined network operations center (SD-NOC) architecture to strengthen the reliability and fault-tolerance of SDN in terms of network operations and management in particular. The cooperation and orchestration between SDN and SD-NOC are also introduced for the SDN failover processes based on four principal SDN breakdown scenarios derived from the failures of the controller, SDN nodes, and connected links. The abovementioned SDN troubles significantly reduce the network reachability to remote devices (e.g., 3D printers, super high-definition cameras, etc.) and the reliability of relevant control processes. Our performance consideration and analysis results show that the proposed scheme can shrink operations and management overheads of SDN, which leads to the enhancement of responsiveness and reliability of SDN for remote 3D printing and control processes.

  5. A scalable key management scheme with minimizing rekey cost for secure multicast over satellite networks

    Science.gov (United States)

    Gao, Junwei; Yang, Zongkai; Xie, Haitao

    2007-11-01

    Satellite networks are playing a more and more important role in network infrastructure. They are useful in providing broadband connectivity to remote locations which are harder to reach through terrestrial infrastructure. Data confidentiality and integrity are two critical issues for satellite networks. The multicast traffic should be accessible only to subscribers, this requires security and efficient methods to generate, distribute and update the keys. Access control can be achieved by data encryption, such as end to end security mechanisms----IPSec. Due to the high rekeying cost, most current key management protocols do not scale well for secure multicast over satellite networks. In this article we proposed a scalable key management scheme to provide secure communication in satellite networks with minimal key management overhead. The principle of this approach is to break up IPSec encryption into multiple encryption zones on a single packet and encrypts different regions of the IP packet using different keys. All of those keys are composed into just only one multi group key tree for secure multicast over satellite networks. The proposed scheme can reduce the communication and storage overhead significantly. In addition, the proposed key graph is scalable well.

  6. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  7. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.

    Science.gov (United States)

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-11-24

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  8. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xuran Li

    2016-11-01

    Full Text Available Wireless sensor networks (WSNs play an important role in Cyber Physical Social Sensing (CPSS systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs. In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  9. Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks

    Science.gov (United States)

    Lee, Jihoon; Jeon, Seungwoo; Kim, Jaehoon

    Multi-hop Wireless LAN-based mesh network (WMN) provides high capacity and self-configuring capabilities. Due to data forwarding and path selection based on MAC address, WMN requires additional operations to achieve global connectivity using IPv6 address. The neighbor discovery operation over WLAN mesh networks requires repeated all-node broadcasting and this gives rise to a big burden in the entire mesh networks. In this letter, we propose the proxy neighbor discovery scheme for optimized IPv6 communication over WMN to reduce network overhead and communication latency. Using simulation experiments, we show that the control overhead and communication setup latency can be significantly reduced using the proxy-based neighbor discovery mechanism.

  10. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes. PMID:22368459

  11. An energy efficient cooperative hierarchical MIMO clustering scheme for wireless sensor networks.

    Science.gov (United States)

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  12. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  13. Controllability of Complex Networks

    Science.gov (United States)

    Liu, Yang; Slotine, Jean-Jacques; Barabasi, Albert-Laszlo

    2011-03-01

    The ultimate proof of our understanding of natural or technological systems is reflected in our ability to control them. While control theory offers mathematical tools to steer engineered systems towards a desired state, we lack a general framework to control complex self-organized systems, like the regulatory network of a cell or the Internet. Here we develop analytical tools to study the controllability of an arbitrary complex directed network, identifying the set of driver nodes whose time-dependent control can guide the system's dynamics. We apply these tools to real and model networks, finding that sparse inhomogeneous networks, which emerge in many real complex systems, are the most difficult to control. In contrast, dense and homogeneous networks can be controlled via a few driver nodes. Counterintuitively, we find that in both model and real systems the driver nodes tend to avoid the hubs. We show that the robustness of control to link failure is determined by a core percolation problem, helping us understand why many complex systems are relatively insensitive to link deletion. The developed approach offers a framework to address the controllability of an arbitrary network, representing a key step towards the eventual control of complex systems.

  14. An adaptive routing scheme in scale-free networks

    Science.gov (United States)

    Ben Haddou, Nora; Ez-Zahraouy, Hamid; Benyoussef, Abdelilah

    2015-05-01

    We suggest an optimal form of traffic awareness already introduced as a routing protocol which combines structural and local dynamic properties of the network to determine the followed path between source and destination of the packet. Instead of using the shortest path, we incorporate the "efficient path" in the protocol and we propose a new parameter α that controls the contribution of the queue in the routing process. Compared to the original model, the capacity of the network can be improved more than twice when using the optimal conditions of our model. Moreover, the adjustment of the proposed parameter allows the minimization of the travel time.

  15. A Microprocessor Control Scheme For Switched Reluctance Motor Drives

    Science.gov (United States)

    Oza, A. R.; Krishnan, R.; Adkar, S.

    1987-10-01

    A microprocessor control scheme for a switched reluctance motor(SRM) drive is discussed. A SRM is inherently a variable speed machine since it requires a converter even for constant speed running. Starting with a conceptual development, a particular hardware scheme is discussed for controller implementation. Hardware-software tradeoffs incorporated in the design are discussed. Some results of an actual system are evaluated. It is shown that a microprocessor controller has many advantages over conventional controllers. The controller design uses rotor position and speed feedbacks. Self-starting is incorporated into the design. Use of off-the-shelf components makes the controller simple, reliable, and economical.

  16. A Spectrum Handoff Scheme for Optimal Network Selection in NEMO Based Cognitive Radio Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2017-01-01

    Full Text Available When a mobile network changes its point of attachments in Cognitive Radio (CR vehicular networks, the Mobile Router (MR requires spectrum handoff. Network Mobility (NEMO in CR vehicular networks is concerned with the management of this movement. In future NEMO based CR vehicular networks deployment, multiple radio access networks may coexist in the overlapping areas having different characteristics in terms of multiple attributes. The CR vehicular node may have the capability to make call for two or more types of nonsafety services such as voice, video, and best effort simultaneously. Hence, it becomes difficult for MR to select optimal network for the spectrum handoff. This can be done by performing spectrum handoff using Multiple Attributes Decision Making (MADM methods which is the objective of the paper. The MADM methods such as grey relational analysis and cost based methods are used. The application of MADM methods provides wider and optimum choice among the available networks with quality of service. Numerical results reveal that the proposed scheme is effective for spectrum handoff decision for optimal network selection with reduced complexity in NEMO based CR vehicular networks.

  17. Time-division-multiplex control scheme for voltage multiplier rectifiers

    Directory of Open Access Journals (Sweden)

    Bin-Han Liu

    2017-03-01

    Full Text Available A voltage multiplier rectifier with a novel time-division-multiplexing (TDM control scheme for high step-up converters is proposed in this study. In the proposed TDM control scheme, two full-wave voltage doubler rectifiers can be combined to realise a voltage quadrupler rectifier. The proposed voltage quadrupler rectifier can reduce transformer turn ratio and transformer size for high step-up converters and also reduce voltage stress for the output capacitors and rectifier diodes. An N-times voltage rectifier can be straightforwardly produced by extending the concepts from the proposed TDM control scheme. A phase-shift full-bridge (PSFB converter is adopted in the primary side of the proposed voltage quadrupler rectifier to construct a PSFB quadrupler converter. Experimental results for the PSFB quadrupler converter demonstrate the performance of the proposed TDM control scheme for voltage quadrupler rectifiers. An 8-times voltage rectifier is simulated to determine the validity of extending the proposed TDM control scheme to realise an N-times voltage rectifier. Experimental and simulation results show that the proposed TDM control scheme has great potential to be used in high step-up converters.

  18. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  19. Knowledge-Based Trajectory Error Pattern Method Applied to an Active Force Control Scheme

    Directory of Open Access Journals (Sweden)

    Endra Pitowarno, Musa Mailah, Hishamuddin Jamaluddin

    2012-08-01

    Full Text Available The active force control (AFC method is known as a robust control scheme that dramatically enhances the performance of a robot arm particularly in compensating the disturbance effects. The main task of the AFC method is to estimate the inertia matrix in the feedback loop to provide the correct (motor torque required to cancel out these disturbances. Several intelligent control schemes have already been introduced to enhance the estimation methods of acquiring the inertia matrix such as those using neural network, iterative learning and fuzzy logic. In this paper, we propose an alternative scheme called Knowledge-Based Trajectory Error Pattern Method (KBTEPM to suppress the trajectory track error of the AFC scheme. The knowledge is developed from the trajectory track error characteristic based on the previous experimental results of the crude approximation method. It produces a unique, new and desirable error pattern when a trajectory command is forced. An experimental study was performed using simulation work on the AFC scheme with KBTEPM applied to a two-planar manipulator in which a set of rule-based algorithm is derived. A number of previous AFC schemes are also reviewed as benchmark. The simulation results show that the AFC-KBTEPM scheme successfully reduces the trajectory track error significantly even in the presence of the introduced disturbances.Key Words:  Active force control, estimated inertia matrix, robot arm, trajectory error pattern, knowledge-based.

  20. Cooperation Scheme For Distributed Spectrum Sensing In Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Ying Dai

    2014-09-01

    Full Text Available Spectrum sensing is an essential phase in cognitive radio networks (CRNs. It enables secondary users (SUs to access licensed spectrum, which is temporarily not occupied by the primary users (PUs. The widely used scheme of spectrum sensing is cooperative sensing, in which an SU shares its sensing results with other SUs to improve the overall sensing performance, while maximizing its throughput. For a single SU, if its sensing results are shared early, it would have more time for data transmission, which improves the throughput. However, when multiple SUs send their sensing results early, they are more likely to send out their sensing results simultaneously over the same signaling channel. Under these conditions, conflicts would likely happen. Then, both the sensing performance and throughput would be affected. Therefore, it is important to take when-to-share into account. We model the spectrum sensing as an evolutionary game. Different from previous works, the strategy set for each player in our game model contains not only whether to share its sensing results, but also when to share. The payoff for each player is defined based on the throughput, which considers the influence of the time spent both on sensing and sharing. We prove the existence of the evolutionarily stable strategy (ESS. In addition, we propose a practical algorithm for each secondary user to converge to the ESS. We conduct experiments on our testbed consisting of 4 USRP N200s. The experimental results verify for our model, including the convergence to the ESS.

  1. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  2. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    Science.gov (United States)

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  3. Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available Privacy-preserving in wireless sensor networks is one of the key problems to be solved in practical applications. It is of great significance to solve the problem of data privacy protection for large-scale applications of wireless sensor networks. The characteristics of wireless sensor networks make data privacy protection technology face serious challenges. At present, the technology of data privacy protection in wireless sensor networks has become a hot research topic, mainly for data aggregation, data query, and access control of data privacy protection. In this paper, multiorder fusion data privacy-preserving scheme (MOFDAP is proposed. Random interference code, random decomposition of function library, and cryptographic vector are introduced for our proposed scheme. In multiple stages and multiple aspects, the difficulty of cracking and crack costs are increased. The simulation results demonstrate that, compared with the typical Slice-Mix-AggRegaTe (SMART algorithm, the algorithm proposed in this paper has a better data privacy-preserving ability when the traffic load is not very heavy.

  4. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    Science.gov (United States)

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  5. A New Wavelength Optimization and Energy-Saving Scheme Based on Network Coding in Software-Defined WDM-PON Networks

    Science.gov (United States)

    Ren, Danping; Wu, Shanshan; Zhang, Lijing

    2016-09-01

    In view of the characteristics of the global control and flexible monitor of software-defined networks (SDN), we proposes a new optical access network architecture dedicated to Wavelength Division Multiplexing-Passive Optical Network (WDM-PON) systems based on SDN. The network coding (NC) technology is also applied into this architecture to enhance the utilization of wavelength resource and reduce the costs of light source. Simulation results show that this scheme can optimize the throughput of the WDM-PON network, greatly reduce the system time delay and energy consumption.

  6. Sophisticated Online Learning Scheme for Green Resource Allocation in 5G Heterogeneous Cloud Radio Access Networks

    KAUST Repository

    Alqerm, Ismail

    2018-01-23

    5G is the upcoming evolution for the current cellular networks that aims at satisfying the future demand for data services. Heterogeneous cloud radio access networks (H-CRANs) are envisioned as a new trend of 5G that exploits the advantages of heterogeneous and cloud radio access networks to enhance spectral and energy efficiency. Remote radio heads (RRHs) are small cells utilized to provide high data rates for users with high quality of service (QoS) requirements, while high power macro base station (BS) is deployed for coverage maintenance and low QoS users service. Inter-tier interference between macro BSs and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRANs. Therefore, we propose an efficient resource allocation scheme using online learning, which mitigates interference and maximizes energy efficiency while maintaining QoS requirements for all users. The resource allocation includes resource blocks (RBs) and power. The proposed scheme is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster the performance of such sophisticated scheme with a model free learning, we consider users\\' priority in RB allocation and compact state representation learning methodology to improve the speed of convergence and account for the curse of dimensionality during the learning process. The proposed scheme including both approaches is implemented using software defined radios testbed. The obtained results and simulation results confirm that the proposed resource allocation solution in H-CRANs increases the energy efficiency significantly and maintains users\\' QoS.

  7. Advanced neural network-based computational schemes for robust fault diagnosis

    CERN Document Server

    Mrugalski, Marcin

    2014-01-01

    The present book is devoted to problems of adaptation of artificial neural networks to robust fault diagnosis schemes. It presents neural networks-based modelling and estimation techniques used for designing robust fault diagnosis schemes for non-linear dynamic systems. A part of the book focuses on fundamental issues such as architectures of dynamic neural networks, methods for designing of neural networks and fault diagnosis schemes as well as the importance of robustness. The book is of a tutorial value and can be perceived as a good starting point for the new-comers to this field. The book is also devoted to advanced schemes of description of neural model uncertainty. In particular, the methods of computation of neural networks uncertainty with robust parameter estimation are presented. Moreover, a novel approach for system identification with the state-space GMDH neural network is delivered. All the concepts described in this book are illustrated by both simple academic illustrative examples and practica...

  8. An Industrial Model Based Disturbance Feedback Control Scheme

    DEFF Research Database (Denmark)

    Kawai, Fukiko; Nakazawa, Chikashi; Vinther, Kasper

    2014-01-01

    This paper presents a model based disturbance feedback control scheme. Industrial process systems have been traditionally controlled by using relay and PID controller. However these controllers are affected by disturbances and model errors and these effects degrade control performance. The authors...... propose a new control method that can decrease the negative impact of disturbance and model errors. The control method is motivated by industrial practice by Fuji Electric. Simulation tests are examined with a conventional PID controller and the disturbance feedback control. The simulation results...... demonstrate the effectiveness of the proposed method comparing with the conventional PID controller...

  9. A complete hierarchical key management scheme for heterogeneous wireless sensor networks.

    Science.gov (United States)

    Chen, Chien-Ming; Zheng, Xinying; Wu, Tsu-Yang

    2014-01-01

    Heterogeneous cluster-based wireless sensor networks (WSN) attracted increasing attention recently. Obviously, the clustering makes the entire networks hierarchical; thus, several kinds of keys are required for hierarchical network topology. However, most existing key management schemes for it place more emphasis on pairwise key management schemes or key predistribution schemes and neglect the property of hierarchy. In this paper, we propose a complete hierarchical key management scheme which only utilizes symmetric cryptographic algorithms and low cost operations for heterogeneous cluster-based WSN. Our scheme considers four kinds of keys, which are an individual key, a cluster key, a master key, and pairwise keys, for each sensor node. Finally, the analysis and experiments demonstrate that the proposed scheme is secure and efficient; thus, it is suitable for heterogeneous cluster-based WSN.

  10. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  11. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  12. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  13. Robust Fallback Scheme for the Danish Automatic Voltage Control System

    DEFF Research Database (Denmark)

    Qin, Nan; Dmitrova, Evgenia; Lund, Torsten

    2015-01-01

    This paper proposes a fallback scheme for the Danish automatic voltage control system. It will be activated in case of the local station loses telecommunication to the control center and/or the local station voltage violates the acceptable operational limits. It cuts in/out switchable and tap...

  14. New scheme of variable optical buffer for IP packets used in access control of HORNET

    Science.gov (United States)

    Fang, Nian; Wang, Lutang; Huang, Zhaoming

    2002-09-01

    A new scheme of variable optical buffer for IP packets is reported. It may be used in access control of HORNET (Hybrid Optoelectronic Ring NETwork), to avoid collision of added packet and the packet already on the ring and improve the loss ratio of the packets. In this scheme, a new multi-wavelength fiber loop memory technique is employed. This architecture uses the wavelength converter (WC) to specify the packets delay and wavelength conversion is accomplished by the technique of four-wave-mixing (FWM) with a semiconductor optical amplifier (SOA). The range of delay is 10 to 9990 bytes periods. First, architecture, operation principle, characteristics and applications of this scheme of variable optical buffer are introduced. Next, a new unslotted CSMA/CA MAC scheme based on the variable optical buffer is briefly introduced too. Finally, the simulation results are presented.

  15. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  16. Hybrid Scheme for Modeling Local Field Potentials from Point-Neuron Networks

    DEFF Research Database (Denmark)

    Hagen, Espen; Dahmen, David; Stavrinou, Maria L

    2016-01-01

    on populations of network-equivalent multicompartment neuron models with layer-specific synaptic connectivity, can be used with an arbitrary number of point-neuron network populations, and allows for a full separation of simulated network dynamics and LFPs. We apply the scheme to a full-scale cortical network...... and electrophysiological features of neurons near the recording electrode, as well as synaptic inputs from the entire network. Here we propose a hybrid modeling scheme combining efficient point-neuron network models with biophysical principles underlying LFP generation by real neurons. The LFP predictions rely...... model for a ∼1 mm(2) patch of primary visual cortex, predict laminar LFPs for different network states, assess the relative LFP contribution from different laminar populations, and investigate effects of input correlations and neuron density on the LFP. The generic nature of the hybrid scheme and its...

  17. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  18. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  19. A soft-hard combination-based cooperative spectrum sensing scheme for cognitive radio networks.

    Science.gov (United States)

    Do, Nhu Tri; An, Beongku

    2015-02-13

    In this paper we propose a soft-hard combination scheme, called SHC scheme, for cooperative spectrum sensing in cognitive radio networks. The SHC scheme deploys a cluster based network in which Likelihood Ratio Test (LRT)-based soft combination is applied at each cluster, and weighted decision fusion rule-based hard combination is utilized at the fusion center. The novelties of the SHC scheme are as follows: the structure of the SHC scheme reduces the complexity of cooperative detection which is an inherent limitation of soft combination schemes. By using the LRT, we can detect primary signals in a low signal-to-noise ratio regime (around an average of -15 dB). In addition, the computational complexity of the LRT is reduced since we derive the closed-form expression of the probability density function of LRT value. The SHC scheme also takes into account the different effects of large scale fading on different users in the wide area network. The simulation results show that the SHC scheme not only provides the better sensing performance compared to the conventional hard combination schemes, but also reduces sensing overhead in terms of reporting time compared to the conventional soft combination scheme using the LRT.

  20. An improved auto-tuning scheme for PID controllers.

    Science.gov (United States)

    Dey, Chanchal; Mudi, Rajani K

    2009-10-01

    An improved auto-tuning scheme is proposed for Ziegler-Nichols (ZN) tuned PID controllers (ZNPIDs), which usually provide excessively large overshoots, not tolerable in most of the situations, for high-order and nonlinear processes. To overcome this limitation ZNPIDs are upgraded by some easily interpretable heuristic rules through an online gain modifying factor defined on the instantaneous process states. This study is an extension of our earlier work [Mudi RK., Dey C. Lee TT. An improved auto-tuning scheme for PI controllers. ISA Trans 2008; 47: 45-52] to ZNPIDs, thereby making the scheme suitable for a wide range of processes and more generalized too. The proposed augmented ZNPID (AZNPID) is tested on various high-order linear and nonlinear dead-time processes with improved performance over ZNPID, refined ZNPID (RZNPID), and other schemes reported in the literature. Stability issues are addressed for linear processes. Robust performance of AZNPID is observed while changing its tunable parameters as well as the process dead-time. The proposed scheme is also implemented on a real time servo-based position control system.

  1. Hierarchical Control Scheme for Voltage Unbalance Compensation in Islanded Microgrids

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Guerrero, Josep M.; Jalilian, Alireza

    2011-01-01

    The concept of microgrid hierarchical control is presented, recently. In this paper, a hierarchical scheme which includes primary and secondary control levels is proposed for islanded microgrids. The primary control level consists of DG local controllers. Local controller of each DG comprises...... active and reactive power controllers, virtual impedance loop and voltage and current controllers. The secondary level is designed to compensate the voltage unbalance at the load bus (LB) of the islanded microgrid. Also, restoration of LB voltage amplitude and microgrid frequency to the rated values...

  2. Fault tolerant control schemes using integral sliding modes

    CERN Document Server

    Hamayun, Mirza Tariq; Alwi, Halim

    2016-01-01

    The key attribute of a Fault Tolerant Control (FTC) system is its ability to maintain overall system stability and acceptable performance in the face of faults and failures within the feedback system. In this book Integral Sliding Mode (ISM) Control Allocation (CA) schemes for FTC are described, which have the potential to maintain close to nominal fault-free performance (for the entire system response), in the face of actuator faults and even complete failures of certain actuators. Broadly an ISM controller based around a model of the plant with the aim of creating a nonlinear fault tolerant feedback controller whose closed-loop performance is established during the design process. The second approach involves retro-fitting an ISM scheme to an existing feedback controller to introduce fault tolerance. This may be advantageous from an industrial perspective, because fault tolerance can be introduced without changing the existing control loops. A high fidelity benchmark model of a large transport aircraft is u...

  3. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  4. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  5. Adaptive protection coordination scheme for distribution network with distributed generation using ABC

    Directory of Open Access Journals (Sweden)

    A.M. Ibrahim

    2016-09-01

    Full Text Available This paper presents an adaptive protection coordination scheme for optimal coordination of DOCRs in interconnected power networks with the impact of DG, the used coordination technique is the Artificial Bee Colony (ABC. The scheme adapts to system changes; new relays settings are obtained as generation-level or system-topology changes. The developed adaptive scheme is applied on the IEEE 30-bus test system for both single- and multi-DG existence where results are shown and discussed.

  6. A Scheme to Optimize Flow Routing and Polling Switch Selection of Software Defined Networks

    Science.gov (United States)

    Chen, Huan; Li, Lemin; Ren, Jing; Wang, Yang; Zhao, Yangming; Wang, Xiong; Wang, Sheng; Xu, Shizhong

    2015-01-01

    This paper aims at minimizing the communication cost for collecting flow information in Software Defined Networks (SDN). Since flow-based information collecting method requires too much communication cost, and switch-based method proposed recently cannot benefit from controlling flow routing, jointly optimize flow routing and polling switch selection is proposed to reduce the communication cost. To this end, joint optimization problem is formulated as an Integer Linear Programming (ILP) model firstly. Since the ILP model is intractable in large size network, we also design an optimal algorithm for the multi-rooted tree topology and an efficient heuristic algorithm for general topology. According to extensive simulations, it is found that our method can save up to 55.76% communication cost compared with the state-of-the-art switch-based scheme. PMID:26690571

  7. A Scheme to Optimize Flow Routing and Polling Switch Selection of Software Defined Networks.

    Directory of Open Access Journals (Sweden)

    Huan Chen

    Full Text Available This paper aims at minimizing the communication cost for collecting flow information in Software Defined Networks (SDN. Since flow-based information collecting method requires too much communication cost, and switch-based method proposed recently cannot benefit from controlling flow routing, jointly optimize flow routing and polling switch selection is proposed to reduce the communication cost. To this end, joint optimization problem is formulated as an Integer Linear Programming (ILP model firstly. Since the ILP model is intractable in large size network, we also design an optimal algorithm for the multi-rooted tree topology and an efficient heuristic algorithm for general topology. According to extensive simulations, it is found that our method can save up to 55.76% communication cost compared with the state-of-the-art switch-based scheme.

  8. A hybrid iterative scheme for optimal control problems governed by ...

    African Journals Online (AJOL)

    This paper presents an iterative approach based on hybrid of perturbation and parametrization methods for obtaining approximate solutions of optimal control problems governed by some Fredholm integral equations. By some numerical examples, it is emphasized that this scheme is very effective and it produces ...

  9. Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Yang Jiyun [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)], E-mail: yangjy@cqu.edu.cn; Liao Xiaofeng [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Key Laboratory of Optoelectric Technology and Systems, Ministry of Education (China); Yu Wenwu [Department of Mathematics, Southeast University, Nanjing 210096 (China); Wong Kwokwo [Department of Computer Engineering and Information Technology, City University of Hong Kong (Hong Kong); Wei Jun [Zhunyi Medical College, Zhunyi 563000, Guizhou (China)

    2009-04-30

    Recently, Yu et al. presented a new cryptographic scheme based on delayed chaotic neural networks. In this letter, a fundamental flaw in Yu's scheme is described. By means of chosen plaintext attack, the secret keystream used can easily be obtained.

  10. Cooperative spectrum sensing schemes with the interference constraint in cognitive radio networks.

    Science.gov (United States)

    Do, Tri-Nhu; An, Beongku

    2014-05-05

    In this paper, we propose cooperative spectrum sensing schemes, called decode-and-forward cooperative spectrum sensing (DF-CSS) scheme and amplify-and-forward cooperative spectrum sensing (AF-CSS) scheme, in cognitive radio networks. The main goals and features of the proposed cooperative spectrum sensing schemes are as follows: first, we solve the problem of high demand for bandwidth in a soft decision scheme using in our proposed schemes. Furthermore, the impact of transmission power of relaying users which is determined by the interference constraint on sensing performance of cooperative spectrum sensing schemes is also investigated. Second, we analyze the sensing performance of our proposed cooperative spectrum sensing schemes in terms of detection probability and interference probability, respectively. We take into account the interference caused by secondary user (SU) to primary user (PU) in the case that the transmission power of the relaying users exceeds a predefined interference constraint assigned by the primary user. The simulation results show that in cooperative spectrum sensing schemes the total sensing performance depends not only on the interference tolerance level, but also on the relay protocols used. We also prove that high transmission power of relaying users increases the interference between the secondary networks and the primary network.

  11. Adaptive protection coordination scheme for distribution network with distributed generation using ABC

    National Research Council Canada - National Science Library

    Ibrahim, A.M; El-Khattam, W; ElMesallamy, M; Talaat, H.A

    2016-01-01

    This paper presents an adaptive protection coordination scheme for optimal coordination of DOCRs in interconnected power networks with the impact of DG, the used coordination technique is the Artificial Bee Colony (ABC...

  12. A New Pricing Scheme for Controlling Energy Storage Devices in Future Smart Grid

    Directory of Open Access Journals (Sweden)

    Jingwei Zhu

    2014-01-01

    Full Text Available Improvement of the overall efficiency of energy infrastructure is one of the main anticipated benefits of the deployment of smart grid technology. Advancement in energy storage technology and two-way communication in the electric network are indispensable components to achieve such a vision, while efficient pricing schemes and appropriate storage management are also essential. In this paper, we propose a universal pricing scheme which permits one to indirectly control the energy storage devices in the grid to achieve a more desirable aggregate demand profile that meets a particular target of the grid operator such as energy generation cost minimization and carbon emission reduction. Such a pricing scheme can potentially be applied to control the behavior of energy storage devices installed for integration of intermittent renewable energy sources that have permission to grid connection and will have broader applications as an increasing number of novel and low-cost energy storage technologies emerge.

  13. An Efficient Multibit Aggregation Scheme for Multihop Wireless Sensor Networks

    OpenAIRE

    Dey BikashK; Merchant SN; Desai UB; Jagyasi BhushanG

    2008-01-01

    Abstract A single-hop wireless sensor network for distributed detection has been considered in the majority of the existing literature. However, a wireless sensor network for an event detection application with cheap and short range sensors is likely to be a multihop network. Here we consider a distributed detection problem in a multihop wireless sensor network with tree topology. We propose an optimum multibit decision fusion rule derived from the previously known optimum likelihood ratio fo...

  14. An active interferometer-stabilization scheme with linear phase control

    DEFF Research Database (Denmark)

    Vardhan Krishnamachari, Vishnu; Andresen, Esben Ravn; Potma, Eric Olaf

    2006-01-01

    We report a simple and robust computer-based active interferometer stabilization scheme which does not require modulation of the interfering beams and relies on an error signal which is linearly related to the optical path difference. In this setup, a non-collinearly propagating reference laser b...... beam stabilizes the interference output of the laser light propagating collinearly through the interferometer. This stabilization scheme enables adjustable phase control with 20 ms switching times in the range from 0.02π radians to 6π radians at 632.8 nm....

  15. Synchronization and Desynchronizing Control Schemes for Supermarket Refrigeration Systems

    DEFF Research Database (Denmark)

    Larsen, Lars Finn Sloth; Thybo, Claus Thybo; Izadi-Zamanabadi, Roozbeh

    2007-01-01

    A supermarket refrigeration system is a hybrid system with switched nonlinear dynamics and discrete-valued input variables such as opening/closing of valves and start/stop of compressors. Practical and simulation studies have shown that the use of distributed hysteresis controllers to operate...... the valves leads to synchronization, meaning that the opening and closing actions of the valves coincide. Consequently, the compressor periodically has to work hard resulting in low efficiency, inferior control performance and a high wear on the compressor. In this paper we propose two control schemes of low...... complexity for desynchronizing the valve operations while improving performance. Simulation results indicate the potential increase in efficiency and reduction in wear comparing with traditional control schemes....

  16. Low-complexity co-tier interference reduction scheme in open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2011-12-01

    This paper addresses the effect of co-tier interference on the performance of multiuser overlaid cellular networks that share the same available resources. It assumed that each macrocell contains a number of self-configurable and randomly located femtocells that employ the open-access control strategy to reduce the effect of cross-tier interference. It is also assumed that the desired user equipment (UE) can access only one of the available channels, maintains simple decoding circuitry with single receive antenna, and has limited knowledge of the instantaneous channel state information (CSI) due to resource limitation. To mitigate the effect of co-tier interference in the absence of the CSI of the desired UE, a low-complexity switched-based scheme for single channel selection based on the predicted interference levels associated with available channels is proposed for the case of over-loaded channels. Through the analysis, new general formulation for the statistics of the resulting instantaneous interference power and some performance measures are presented. The effect of the switching threshold on the efficiency and performance of the proposed scheme is studied. Numerical and simulation results to clarify the usefulness of the proposed scheme in reducing the impact of co-tier interference are also provided. © 2011 IEEE.

  17. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  18. An optimal performance control scheme for a 3D crane

    Science.gov (United States)

    Maghsoudi, Mohammad Javad; Mohamed, Z.; Husain, A. R.; Tokhi, M. O.

    2016-01-01

    This paper presents an optimal performance control scheme for control of a three dimensional (3D) crane system including a Zero Vibration shaper which considers two control objectives concurrently. The control objectives are fast and accurate positioning of a trolley and minimum sway of a payload. A complete mathematical model of a lab-scaled 3D crane is simulated in Simulink. With a specific cost function the proposed controller is designed to cater both control objectives similar to a skilled operator. Simulation and experimental studies on a 3D crane show that the proposed controller has better performance as compared to a sequentially tuned PID-PID anti swing controller. The controller provides better position response with satisfactory payload sway in both rail and trolley responses. Experiments with different payloads and cable lengths show that the proposed controller is robust to changes in payload with satisfactory responses.

  19. Local Approximation Schemes for Ad Hoc and Sensor Networks

    NARCIS (Netherlands)

    Kuhn, F.; Moscibroda, T.; Nieberg, T.; Wattenhofer, R.; Banerjee, S; Ganguly, S.

    2005-01-01

    We present two local approaches that yield polynomial-time approximation schemes (PTAS) for the Maximum Independent Set and Minimum Dominating Set problem in unit disk graphs. The algorithms run locally in each node and compute a (1+ε)-approximation to the problems at hand for any given ε > 0. The

  20. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Salim, Shelly; Moh, Sangman

    2016-06-30

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  1. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shelly Salim

    2016-06-01

    Full Text Available A cognitive radio sensor network (CRSN is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  2. A remote password authentication scheme for multiserver architecture using neural networks.

    Science.gov (United States)

    Li, L H; Lin, L C; Hwang, M S

    2001-01-01

    Conventional remote password authentication schemes allow a serviceable server to authenticate the legitimacy of a remote login user. However, these schemes are not used for multiserver architecture environments. We present a remote password authentication scheme for multiserver environments. The password authentication system is a pattern classification system based on an artificial neural network. In this scheme, the users only remember user identity and password numbers to log in to various servers. Users can freely choose their password. Furthermore, the system is not required to maintain a verification table and can withstand the replay attack.

  3. Controlling congestion on complex networks: fairness, efficiency and network structure.

    Science.gov (United States)

    Buzna, Ľuboš; Carvalho, Rui

    2017-08-22

    We consider two elementary (max-flow and uniform-flow) and two realistic (max-min fairness and proportional fairness) congestion control schemes, and analyse how the algorithms and network structure affect throughput, the fairness of flow allocation, and the location of bottleneck edges. The more realistic proportional fairness and max-min fairness algorithms have similar throughput, but path flow allocations are more unequal in scale-free than in random regular networks. Scale-free networks have lower throughput than their random regular counterparts in the uniform-flow algorithm, which is favoured in the complex networks literature. We show, however, that this relation is reversed on all other congestion control algorithms for a region of the parameter space given by the degree exponent γ and average degree 〈k〉. Moreover, the uniform-flow algorithm severely underestimates the network throughput of congested networks, and a rich phenomenology of path flow allocations is only present in the more realistic α-fair family of algorithms. Finally, we show that the number of paths passing through an edge characterises the location of a wide range of bottleneck edges in these algorithms. Such identification of bottlenecks could provide a bridge between the two fields of complex networks and congestion control.

  4. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Science.gov (United States)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  5. Control and management scheme in a DWDM EPON

    NARCIS (Netherlands)

    Roy, R.; Manhoudt, Gert; Roeloffzen, C.G.H.; van Etten, Wim

    2006-01-01

    Passive Optical Networks (PONs) are a preferred architecture for distribution of bandwidth in the access network. The BSIK Freeband Broadband Photonics Project(BBP) looks at the design of a flexible DWDM PON which can be used to increase the bandwidth provided to the user. We present a control and

  6. An efficient Quality of Service (QoS) scheme for all optical networks

    Science.gov (United States)

    Garg, Amit Kumar; Kaler, R. S.

    2011-01-01

    This paper addresses the issue of providing Quality of Service (QoS) for optical burst switching (OBS) systems. In this paper, an efficient QoS oriented integrated scheme based on Optical Burst/Circuit Switching network architecture has been proposed. The proposed scheme utilizes the modified Just-Enough-Time (JET) protocol and advanced reservation based on Linear Predictive Filter (LPF), which can provide differentiated services for optical burst switching (OBS) network. Simulation results show that the proposed scheme is reasonably better than a First Come First Served (FCFS) protocol in guaranteeing QoS of real-time traffic. Also, the results yield significant delay reduction for time-critical traffic, while maintaining the bandwidth overhead within limits. As a result, the proposed scheme has achieved QoS differentiation in terms of burst loss rate in comparison to conventional schemes.

  7. A Sentiment Delivering Estimate Scheme Based on Trust Chain in Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Meizi Li

    2015-01-01

    Full Text Available User sentiment analysis has become a flourishing frontier in data mining mobile social network platform since the mobile social network plays a significant role in users’ daily communication and sentiment interaction. This study studies the scheme of sentiment estimate by using the users’ trustworthy relationships for evaluating sentiment delivering. First, we address an overview of sentiment delivering estimate scheme and propose its related definitions, that is, trust chain among users, sentiment semantics, and sentiment ontology. Second, this study proposes the trust chain model and its evaluation method, which is composed of evaluation of atomic, serial, parallel, and combined trust chains. Then, we propose sentiment modeling method by presenting its modeling rules. Further, we propose the sentiment delivering estimate scheme from two aspects: explicit and implicit sentiment delivering estimate schemes, based on trust chain and sentiment modeling method. Finally, examinations and results are given to further explain effectiveness and feasibility of our scheme.

  8. Anti-Windup Scheme for Practical Control of Positioning Systems

    Directory of Open Access Journals (Sweden)

    Wahyudi Tarig Faisal and Abdulgani Albagul

    2012-10-01

    Full Text Available Positioning systems generally need a good controller to achieve high accuracy, fast response and robustness. In addition, ease of controller design and simplicity of controller structure are very important for practical application.  For satisfying these requirements, nominal characteristic trajectory following controller (NCTF has been proposed as a practical point-to-point (PTP positioning control. However, the effect of actuator saturation can not be completely compensated for due to the integrator windup as the plant parameters vary. This paper presents a method to improve the NCTF controller for overcoming the problem of integrator windup using simple and classical tracking anti-windup scheme. The improved NCTF controller is evaluated through simulation using a rotary positioning system. The results show that the improved NCTF controller is adequate to compensate for the effect of integrator windup. Keywords: Positioning, point-to-point, integrator windup, compensation, controller, robustness.

  9. Proposal of dynamic protection/restoration schemes for QoS support in labeled optical burst switching networks

    Science.gov (United States)

    Yin, Yawei; Chi, Shuli; Shi, Jindan; Wu, Jian; Hong, Xiaobin; Lin, Jintong

    2008-11-01

    In this paper, two novel protection and restoration schemes were proposed by using the BC and BR schemes which were originally designed to reduce the bursts loss probability due to contention in OBS network. The 1+1 protection scheme in LOBS can be easily carried out using the MPLS 1+1 protection scheme in the 2.5 layer and burst cloning scheme in the OBS layer. By introducing some new OSPF-TE opaque LSA messages, the burst retransmission scheme can be transplanted into the restoration scheme in LOBS network. Furthermore, the dynamic quality of resilience mechanism to inherit these two schemes according to the QoS requirement of the traffic was also investigated. Experimental study using a LOBS network test bed verified that the proposed schemes suited well in the LOBS network.

  10. KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Moniava, G.; Gong, Zheng; Hartel, Pieter H.; Palaniswami, M

    2008-01-01

    Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made. The challenge is taken on, and the result is

  11. KALwEN: a new practical and interoperable key management scheme for body sensor networks

    NARCIS (Netherlands)

    Law, Y.W.; Moniava, G.; Gong, Zheng; Hartel, Pieter H.; Palaniswami, Marimuthu

    Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made. The challenge is taken on, and the result is KALwEN,

  12. A Fault-tolerable Control Scheme for an Open-frame Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Huang Hai

    2014-05-01

    Full Text Available Open-frame is one of the major types of structures of Remote Operated Vehicles (ROV because it is easy to place sensors and operations equipment onboard. Firstly, this paper designed a petri-based recurrent neural network (PRFNN to improve the robustness with response to nonlinear characteristics and strong disturbance of an open-frame underwater vehicle. A threshold has been set in the third layer to reduce the amount of calculations and regulate the training process. The whole network convergence is guaranteed with the selection of learning rate parameters. Secondly, a fault tolerance control (FTC scheme is established with the optimal allocation of thrust. Infinity-norm optimization has been combined with 2-norm optimization to construct a bi-criteria primal-dual neural network FTC scheme. In the experiments and simulation, PRFNN outperformed fuzzy neural networks in motion control, while bi-criteria optimization outperformed 2-norm optimization in FTC, which demonstrates that the FTC controller can improve computational efficiency, reduce control errors, and implement fault tolerable thrust allocation.

  13. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  14. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-11-01

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000. Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC, and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure schemes.

  15. Low Complexity Transmission Scheme with Full Diversity for Two-Path Relay Networks

    KAUST Repository

    Fareed, Muhammad Mehboob

    2014-01-06

    In this work, we present a new low complexity scheme for two-path relay network to harvest maximum achievable diversity. We analyze the performance of the newly proposed two-path relay network by calculating the symbol error rate (SER) for arbitrary location of relays. It is shown that with this newly proposed scheme, two-path relay networks can mimic a 2x2 multiple-input mulitple-output (MIMO) system and achieve full diversity order of four. Simulations results are provided to verify and illustrate the analytical results.

  16. Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Li, Yahui; Ma, Jianfeng; Moon, Sangjae

    Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor networks security consider homogenous sensor networks. To achieve better security and performance, we adopt a heterogeneous wireless sensor network (HWSN) model that consists of physically different types of sensor nodes. This paper presents a secure message distribution scheme with configurable privacy for HWSNs, which takes advantage of powerful high-end sensor nodes. The scheme establishes a message distribution topology in an efficient and secure manner. The sensor node only need generate one signature for all the messages for all the users, which can greatly save the communication and computation cost of the sensor node. On the other hand, the user can only know the messages that let him know based on a pre-set policy, which can meet the requirement of the privacy. We show that the scheme has small bandwidth requirements and it is resilient against the node compromise attack.

  17. Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh Networks

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md. Jalil; Suh, Doug Young

    2014-01-01

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment. PMID:25111241

  18. Resource optimization scheme for multimedia-enabled wireless mesh networks.

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md Jalil; Suh, Doug Young

    2014-08-08

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment.

  19. Farmer Attitudes and Livestock Disease: Exploring Citizenship Behaviour and Peer Monitoring across Two BVD Control Schemes in the UK.

    Directory of Open Access Journals (Sweden)

    Claire Heffernan

    Full Text Available The eradication of BVD in the UK is technically possible but appears to be socially untenable. The following study explored farmer attitudes to BVD control schemes in relation to advice networks and information sharing, shared aims and goals, motivation and benefits of membership, notions of BVD as a priority disease and attitudes toward regulation. Two concepts from the organisational management literature framed the study: citizenship behaviour where actions of individuals support the collective good (but are not explicitly recognised as such and peer to peer monitoring (where individuals evaluate other's behaviour. Farmers from two BVD control schemes in the UK participated in the study: Orkney Livestock Association BVD Eradication Scheme and Norfolk and Suffolk Cattle Breeders Association BVD Eradication Scheme. In total 162 farmers participated in the research (109 in-scheme and 53 out of scheme. The findings revealed that group helping and information sharing among scheme members was low with a positive BVD status subject to social censure. Peer monitoring in the form of gossip with regard to the animal health status of other farms was high. Interestingly, farmers across both schemes supported greater regulation with regard to animal health, largely due to the mistrust of fellow farmers following voluntary disease control measures. While group cohesiveness varied across the two schemes, without continued financial inducements, longer-term sustainability is questionable.

  20. Farmer Attitudes and Livestock Disease: Exploring Citizenship Behaviour and Peer Monitoring across Two BVD Control Schemes in the UK.

    Science.gov (United States)

    Heffernan, Claire; Azbel-Jackson, Lena; Brownlie, Joe; Gunn, George

    2016-01-01

    The eradication of BVD in the UK is technically possible but appears to be socially untenable. The following study explored farmer attitudes to BVD control schemes in relation to advice networks and information sharing, shared aims and goals, motivation and benefits of membership, notions of BVD as a priority disease and attitudes toward regulation. Two concepts from the organisational management literature framed the study: citizenship behaviour where actions of individuals support the collective good (but are not explicitly recognised as such) and peer to peer monitoring (where individuals evaluate other's behaviour). Farmers from two BVD control schemes in the UK participated in the study: Orkney Livestock Association BVD Eradication Scheme and Norfolk and Suffolk Cattle Breeders Association BVD Eradication Scheme. In total 162 farmers participated in the research (109 in-scheme and 53 out of scheme). The findings revealed that group helping and information sharing among scheme members was low with a positive BVD status subject to social censure. Peer monitoring in the form of gossip with regard to the animal health status of other farms was high. Interestingly, farmers across both schemes supported greater regulation with regard to animal health, largely due to the mistrust of fellow farmers following voluntary disease control measures. While group cohesiveness varied across the two schemes, without continued financial inducements, longer-term sustainability is questionable.

  1. A query result merging scheme for providing energy efficiency in underwater sensor networks.

    Science.gov (United States)

    Kim, Yunsung; Park, Soo-Hyun

    2011-01-01

    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range.

  2. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.

    Science.gov (United States)

    Wang, Chunzhi; Zhang, Yanmei

    2015-11-01

    Due to the development of information technologies and network technologies, healthcare systems have been employed in many countries. As an important part of healthcare systems, the wireless body area network (WBAN) could bring convenience to both patients and physicians because it could help physicians to monitor patients' physiological values remotely. It is essential to ensure secure communication in WBANs because patients' physiological values are very sensitive. Recently, Liu et al. proposed an efficient authentication scheme for WBANs. Unfortunately, Zhao pointed out that their scheme suffered from the stolen verifier-table attack. To improve security and efficiency, Zhao proposed an anonymous authentication scheme for WBANs. However, Zhao's scheme cannot provide real anonymity because the users' pseudo identities are constant value and the attack could tract the users. In this paper, we propose a new anonymous authentication scheme for WBANs. Security analysis shows that the proposed scheme could overcome weaknesses in previous scheme. We also use the BAN logic to demonstrate the security of the proposed scheme.

  3. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  4. RBF Neural Network of Sliding Mode Control for Time-Varying 2-DOF Parallel Manipulator System

    Directory of Open Access Journals (Sweden)

    Haizhong Chen

    2013-01-01

    Full Text Available This paper presents a radial basis function (RBF neural network control scheme for manipulators with actuator nonlinearities. The control scheme consists of a time-varying sliding mode control (TVSMC and an RBF neural network compensator. Since the actuator nonlinearities are usually included in the manipulator driving motor, a compensator using RBF network is proposed to estimate the actuator nonlinearities and their upper boundaries. Subsequently, an RBF neural network controller that requires neither the evaluation of off-line dynamical model nor the time-consuming training process is given. In addition, Barbalat Lemma is introduced to help prove the stability of the closed control system. Considering the SMC controller and the RBF network compensator as the whole control scheme, the closed-loop system is proved to be uniformly ultimately bounded. The whole scheme provides a general procedure to control the manipulators with actuator nonlinearities. Simulation results verify the effectiveness of the designed scheme and the theoretical discussion.

  5. A study of the spreading scheme for viral marketing based on a complex network model

    Science.gov (United States)

    Yang, Jianmei; Yao, Canzhong; Ma, Weicheng; Chen, Guanrong

    2010-02-01

    Buzzword-based viral marketing, known also as digital word-of-mouth marketing, is a marketing mode attached to some carriers on the Internet, which can rapidly copy marketing information at a low cost. Viral marketing actually uses a pre-existing social network where, however, the scale of the pre-existing network is believed to be so large and so random, so that its theoretical analysis is intractable and unmanageable. There are very few reports in the literature on how to design a spreading scheme for viral marketing on real social networks according to the traditional marketing theory or the relatively new network marketing theory. Complex network theory provides a new model for the study of large-scale complex systems, using the latest developments of graph theory and computing techniques. From this perspective, the present paper extends the complex network theory and modeling into the research of general viral marketing and develops a specific spreading scheme for viral marking and an approach to design the scheme based on a real complex network on the QQ instant messaging system. This approach is shown to be rather universal and can be further extended to the design of various spreading schemes for viral marketing based on different instant messaging systems.

  6. Turbulent boundary layer under the control of different schemes

    Science.gov (United States)

    Qiao, Z. X.; Zhou, Y.; Wu, Z.

    2017-06-01

    This work explores experimentally the control of a turbulent boundary layer over a flat plate based on wall perturbation generated by piezo-ceramic actuators. Different schemes are investigated, including the feed-forward, the feedback, and the combined feed-forward and feedback strategies, with a view to suppressing the near-wall high-speed events and hence reducing skin friction drag. While the strategies may achieve a local maximum drag reduction slightly less than their counterpart of the open-loop control, the corresponding duty cycles are substantially reduced when compared with that of the open-loop control. The results suggest a good potential to cut down the input energy under these control strategies. The fluctuating velocity, spectra, Taylor microscale and mean energy dissipation are measured across the boundary layer with and without control and, based on the measurements, the flow mechanism behind the control is proposed.

  7. Turbulent boundary layer under the control of different schemes.

    Science.gov (United States)

    Qiao, Z X; Zhou, Y; Wu, Z

    2017-06-01

    This work explores experimentally the control of a turbulent boundary layer over a flat plate based on wall perturbation generated by piezo-ceramic actuators. Different schemes are investigated, including the feed-forward, the feedback, and the combined feed-forward and feedback strategies, with a view to suppressing the near-wall high-speed events and hence reducing skin friction drag. While the strategies may achieve a local maximum drag reduction slightly less than their counterpart of the open-loop control, the corresponding duty cycles are substantially reduced when compared with that of the open-loop control. The results suggest a good potential to cut down the input energy under these control strategies. The fluctuating velocity, spectra, Taylor microscale and mean energy dissipation are measured across the boundary layer with and without control and, based on the measurements, the flow mechanism behind the control is proposed.

  8. An authentication scheme to healthcare security under wireless sensor networks.

    Science.gov (United States)

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  9. CAC DPLB MCN: A Distributed Load Balancing Scheme in Multimedia Mobile Cellular Networks

    Directory of Open Access Journals (Sweden)

    Sharma Abhijit

    2016-11-01

    Full Text Available The problem of non-uniform traffic demand in different cells of a cellular network may lead to a gross imbalance in the system performance. Thus, the users in hot cells may suffer from low throughput. In this paper, an effective and simple load balancing scheme CAC_DPLB_MCN is proposed that can effectively reduce the overall call blocking. This model considers dealing with multi-media traffic as well as time-varying geographical traffic distribution. The proposed scheme uses the concept of cell-tiering thereby creating fractional frequency reuse environment. A message exchange based distributed scheme instead of centralized one is used which help the proposed scheme be implemented in a multiple hot cell environment also. Furthermore, concept of dynamic pricing is used to serve the best interest of the users as well as for the service providers. The performance of the proposed scheme is compared with two other existing schemes in terms of call blocking probability and bandwidth utilization. Simulation results show that the proposed scheme can reduce the call blocking significantly in highly congested cell with highest bandwidth utilization. Use of dynamic pricing also makes the scheme useful to increase revenue of the service providers in contrast with compared schemes.

  10. Input graph: the hidden geometry in controlling complex networks

    Science.gov (United States)

    Zhang, Xizhe; Lv, Tianyang; Pu, Yuanyuan

    2016-11-01

    The ability to control a complex network towards a desired behavior relies on our understanding of the complex nature of these social and technological networks. The existence of numerous control schemes in a network promotes us to wonder: what is the underlying relationship of all possible input nodes? Here we introduce input graph, a simple geometry that reveals the complex relationship between all control schemes and input nodes. We prove that the node adjacent to an input node in the input graph will appear in another control scheme, and the connected nodes in input graph have the same type in control, which they are either all possible input nodes or not. Furthermore, we find that the giant components emerge in the input graphs of many real networks, which provides a clear topological explanation of bifurcation phenomenon emerging in dense networks and promotes us to design an efficient method to alter the node type in control. The findings provide an insight into control principles of complex networks and offer a general mechanism to design a suitable control scheme for different purposes.

  11. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  12. Broadband accelerator control network

    Energy Technology Data Exchange (ETDEWEB)

    Skelly, J.; Clifford, T.; Frankel, R.

    1983-01-01

    A broadband data communications network has been implemented at BNL for control of the Alternating Gradient Synchrotron (AG) proton accelerator, using commercial CATV hardware, dual coaxial cables as the communications medium, and spanning 2.0 km. A 4 MHz bandwidth Digital Control channel using CSMA-CA protocol is provided for digital data transmission, with 8 access nodes available over the length of the RELWAY. Each node consists of an rf modem and a microprocessor-based store-and-forward message handler which interfaces the RELWAY to a branch line implemented in GPIB. A gateway to the RELWAY control channel for the (preexisting) AGS Computerized Accelerator Operating system has been constructed using an LSI-11/23 microprocessor as a device in a GPIB branch line. A multilayer communications protocol has been defined for the Digital Control Channel, based on the ISO Open Systems Interconnect layered model, and a RELWAY Device Language defined as the required universal language for device control on this channel.

  13. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    OpenAIRE

    Yanrong Lu; Lixiang Li; Haipeng Peng; Yixian Yang

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas?s currently scheme and demonstrate the major securit...

  14. EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Bouk, Safdar Hussain; Ahmed, Syed Hassan; Park, Kyung-Joon; Eun, Yongsoon

    2017-09-26

    Underwater Acoustic Sensor Network (UASN) comes with intrinsic constraints because it is deployed in the aquatic environment and uses the acoustic signals to communicate. The examples of those constraints are long propagation delay, very limited bandwidth, high energy cost for transmission, very high signal attenuation, costly deployment and battery replacement, and so forth. Therefore, the routing schemes for UASN must take into account those characteristics to achieve energy fairness, avoid energy holes, and improve the network lifetime. The depth based forwarding schemes in literature use node's depth information to forward data towards the sink. They minimize the data packet duplication by employing the holding time strategy. However, to avoid void holes in the network, they use two hop node proximity information. In this paper, we propose the Energy and Depth variance-based Opportunistic Void avoidance (EDOVE) scheme to gain energy balancing and void avoidance in the network. EDOVE considers not only the depth parameter, but also the normalized residual energy of the one-hop nodes and the normalized depth variance of the second hop neighbors. Hence, it avoids the void regions as well as balances the network energy and increases the network lifetime. The simulation results show that the EDOVE gains more than 15 % packet delivery ratio, propagates 50 % less copies of data packet, consumes less energy, and has more lifetime than the state of the art forwarding schemes.

  15. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  16. An Enhanced Multihoming Support Scheme with Proxy Mobile IPv6 for Convergent Networks

    Science.gov (United States)

    Li, Yang; Kum, Dong-Won; Kang, Ju-Eun; Cho, You-Ze

    This paper analyzes the limitations of the multihoming support in the Proxy Mobile IPv6 protocol, then proposes an enhanced multihoming support scheme based on a per-interface address configuration method. The proposed scheme can provide a more flexible multihoming support and also maintain application session continuity during a handoff between two interfaces by using IPv6 extension headers. Plus, flow distribution with filters is also used to realize the advantages of multihoming. Simulation results with the OPNET validate the proposed multihoming support scheme for convergent networks.

  17. Neural Networks for Optimal Control

    DEFF Research Database (Denmark)

    Sørensen, O.

    1995-01-01

    Two neural networks are trained to act as an observer and a controller, respectively, to control a non-linear, multi-variable process.......Two neural networks are trained to act as an observer and a controller, respectively, to control a non-linear, multi-variable process....

  18. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-12-01

    Full Text Available As an essential part of Internet of Things (IoT, wireless sensor networks (WSNs have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  19. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  20. Hybrid Scheme for Modeling Local Field Potentials from Point-Neuron Networks.

    Science.gov (United States)

    Hagen, Espen; Dahmen, David; Stavrinou, Maria L; Lindén, Henrik; Tetzlaff, Tom; van Albada, Sacha J; Grün, Sonja; Diesmann, Markus; Einevoll, Gaute T

    2016-12-01

    With rapidly advancing multi-electrode recording technology, the local field potential (LFP) has again become a popular measure of neuronal activity in both research and clinical applications. Proper understanding of the LFP requires detailed mathematical modeling incorporating the anatomical and electrophysiological features of neurons near the recording electrode, as well as synaptic inputs from the entire network. Here we propose a hybrid modeling scheme combining efficient point-neuron network models with biophysical principles underlying LFP generation by real neurons. The LFP predictions rely on populations of network-equivalent multicompartment neuron models with layer-specific synaptic connectivity, can be used with an arbitrary number of point-neuron network populations, and allows for a full separation of simulated network dynamics and LFPs. We apply the scheme to a full-scale cortical network model for a ∼1 mm(2) patch of primary visual cortex, predict laminar LFPs for different network states, assess the relative LFP contribution from different laminar populations, and investigate effects of input correlations and neuron density on the LFP. The generic nature of the hybrid scheme and its public implementation in hybridLFPy form the basis for LFP predictions from other and larger point-neuron network models, as well as extensions of the current application with additional biological detail. © The Author 2016. Published by Oxford University Press.

  1. A data protection scheme for medical research networks. Review after five years of operation.

    Science.gov (United States)

    Helbing, K; Demiroglu, S Y; Rakebrandt, F; Pommerening, K; Rienhoff, O; Sax, U

    2010-01-01

    The data protection requirements matured in parallel to new clinical tests generating more personal data since the 1960s. About ten years ago it was recognized that a generic data protection scheme for medical research networks is required, which reinforces patient rights but also allows economically feasible medical research compared to "hand-carved" individual solutions. To give recommendations for more efficient IT infrastructures for medical research networks in compliance with data protection requirements. The IT infrastructures of three medical research networks were reviewed with respect to the relevant data management modules. Recommendations are derived to increase cost efficiency in research networks assessing the consequences of a service provider approach without lowering the data protection level. The existing data protection schemes are very complex. Smaller research networks cannot afford the implementation of such schemes. Larger networks struggle to keep them sustainable. Due to a modular redesign in the medical research network community, a new approach offers opportunities for an efficient sustainable IT infrastructure involving a service provider concept. For standard components 70-80% of the costs could be cut down, for open source components about 37% over a three-year period. Future research networks should switch to a service-oriented approach to achieve a sustainable, cost-efficient IT infrastructure.

  2. A Novel Learning Scheme for Chebyshev Functional Link Neural Networks

    Directory of Open Access Journals (Sweden)

    Satchidananda Dehuri

    2011-01-01

    dimensional-space where linear separability is possible. Moreover, the proposed HCFLNN combines the best attribute of particle swarm optimization (PSO, back propagation learning (BP learning, and functional link neural networks (FLNNs. The proposed method eliminates the need of hidden layer by expanding the input patterns using Chebyshev orthogonal polynomials. We have shown its effectiveness of classifying the unknown pattern using the publicly available datasets obtained from UCI repository. The computational results are then compared with functional link neural network (FLNN with a generic basis functions, PSO-based FLNN, and EFLN. From the comparative study, we observed that the performance of the HCFLNN outperforms FLNN, PSO-based FLNN, and EFLN in terms of classification accuracy.

  3. An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Chunyan Peng

    2016-01-01

    Full Text Available We tackle a fundamental security problem in underwater acoustic networks (UANs. The S-box in the existing block encryption algorithm is more energy consuming and unsuitable for resources-constrained UANs. In this paper, instead of S-box, we present a lightweight, 8-round iteration block cipher algorithm for UANs communication based on chaotic theory and increase the key space by changing the number of iteration round. We further propose secure network architecture of UANs. By analysis, our algorithm can resist brute-force searches and adversarial attacks. Simulation results show that, compared with traditional AES-128 and PRESENT algorithms, our cryptographic algorithm can make a good trade-off between security and overhead, has better energy efficiency, and applies to UANs.

  4. Planning Framework for Mesolevel Optimization of Urban Runoff Control Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Qianqian; Blohm, Andrew; Liu, Bo

    2017-04-01

    A planning framework is developed to optimize runoff control schemes at scales relevant for regional planning at an early stage. The framework employs less sophisticated modeling approaches to allow a practical application in developing regions with limited data sources and computing capability. The methodology contains three interrelated modules: (1)the geographic information system (GIS)-based hydrological module, which aims at assessing local hydrological constraints and potential for runoff control according to regional land-use descriptions; (2)the grading module, which is built upon the method of fuzzy comprehensive evaluation. It is used to establish a priority ranking system to assist the allocation of runoff control targets at the subdivision level; and (3)the genetic algorithm-based optimization module, which is included to derive Pareto-based optimal solutions for mesolevel allocation with multiple competing objectives. The optimization approach describes the trade-off between different allocation plans and simultaneously ensures that all allocation schemes satisfy the minimum requirement on runoff control. Our results highlight the importance of considering the mesolevel allocation strategy in addition to measures at macrolevels and microlevels in urban runoff management. (C) 2016 American Society of Civil Engineers.

  5. Study on noise prediction model and control schemes for substation.

    Science.gov (United States)

    Chen, Chuanmin; Gao, Yang; Liu, Songtao

    2014-01-01

    With the government's emphasis on environmental issues of power transmission and transformation project, noise pollution has become a prominent problem now. The noise from the working transformer, reactor, and other electrical equipment in the substation will bring negative effect to the ambient environment. This paper focuses on using acoustic software for the simulation and calculation method to control substation noise. According to the characteristics of the substation noise and the techniques of noise reduction, a substation's acoustic field model was established with the SoundPLAN software to predict the scope of substation noise. On this basis, 4 reasonable noise control schemes were advanced to provide some helpful references for noise control during the new substation's design and construction process. And the feasibility and application effect of these control schemes can be verified by using the method of simulation modeling. The simulation results show that the substation always has the problem of excessive noise at boundary under the conventional measures. The excess noise can be efficiently reduced by taking the corresponding noise reduction methods.

  6. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  7. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-11-12

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  8. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shalli Rani

    2015-11-01

    Full Text Available One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1 a hierarchical network design; (2 a model for the energy efficient IoT; (3 a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  9. In-Band α-Duplex Scheme for Cellular Networks: A Stochastic Geometry Approach

    KAUST Repository

    Alammouri, Ahmad

    2016-07-13

    In-band full-duplex (FD) communications have been optimistically promoted to improve the spectrum utilization and efficiency. However, the penetration of FD communications to the cellular networks domain is challenging due to the imposed uplink/downlink interference. This paper presents a tractable framework, based on stochastic geometry, to study FD communications in cellular networks. Particularly, we assess the FD communications effect on the network performance and quantify the associated gains. The study proves the vulnerability of the uplink to the downlink interference and shows that FD rate gains harvested in the downlink (up to 97%) come at the expense of a significant degradation in the uplink rate (up to 94%). Therefore, we propose a novel fine-grained duplexing scheme, denoted as -duplex scheme, which allows a partial overlap between the uplink and the downlink frequency bands. We derive the required conditions to harvest rate gains from the -duplex scheme and show its superiority to both the FD and half-duplex (HD) schemes. In particular, we show that the -duplex scheme provides a simultaneous improvement of 28% for the downlink rate and 56% for the uplink rate. Finally, we show that the amount of the overlap can be optimized based on the network design objective.

  10. An Overview of Demand Side Management Control Schemes for Buildings in Smart Grids

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Costanzo, Giuseppe Tommaso; Bindner, Henrik W.

    2013-01-01

    demand is needed. The research area of demand side management is still very much in flux and several options are being presented which can all be used to manage loads in order to achieve a flexible and more responsive demand. These different control schemes are developed with different organization...... of the power sector in mind and thus can differ significantly in their architecture, their integration into the various markets, their integration into distribution network operation and several other aspects. This paper proposes a classification of load control policies for demand side management in smart...

  11. Coded-subcarrier-aided chromatic dispersion monitoring scheme for flexible optical OFDM networks.

    Science.gov (United States)

    Tse, Kam-Hon; Chan, Chun-Kit

    2014-08-11

    A simple coded-subcarrier aided scheme is proposed to perform chromatic dispersion monitoring in flexible optical OFDM networks. A pair of coded label subcarriers is added to both edges of the optical OFDM signal spectrum at the edge transmitter node. Upon reception at any intermediate or the receiver node, chromatic dispersion estimation is performed, via simple direct detection, followed by electronic correlation procedures with the designated code sequences. The feasibility and the performance of the proposed scheme have been experimentally characterized. It provides a cost-effective monitoring solution for the optical OFDM signals across intermediate nodes in flexible OFDM networks.

  12. A topology reorganization scheme for reliable communication in underwater wireless sensor networks affected by shadow zones.

    Science.gov (United States)

    Domingo, Mari Carmen

    2009-01-01

    Effective solutions should be devised to handle the effects of shadow zones in Underwater Wireless Sensor Networks (UWSNs). An adaptive topology reorganization scheme that maintains connectivity in multi-hop UWSNs affected by shadow zones has been developed in the context of two Spanish-funded research projects. A mathematical model has been proposed to find the optimal location for sensors with two objectives: the minimization of the transmission loss and the maintenance of network connectivity. The theoretical analysis and the numerical evaluations reveal that our scheme reduces the transmission loss under all propagation phenomena scenarios for all water depths in UWSNs and improves the signal-to-noise ratio.

  13. A Topology Reorganization Scheme for Reliable Communication in Underwater Wireless Sensor Networks Affected by Shadow Zones

    Directory of Open Access Journals (Sweden)

    Mari Carmen Domingo

    2009-10-01

    Full Text Available Effective solutions should be devised to handle the effects of shadow zones in Underwater Wireless Sensor Networks (UWSNs. An adaptive topology reorganization scheme that maintains connectivity in multi-hop UWSNs affected by shadow zones has been developed in the context of two Spanish-funded research projects. A mathematical model has been proposed to find the optimal location for sensors with two objectives: the minimization of the transmission loss and the maintenance of network connectivity. The theoretical analysis and the numerical evaluations reveal that our scheme reduces the transmission loss under all propagation phenomena scenarios for all water depths in UWSNs and improves the signal-to-noise ratio.

  14. Dual adaptive dynamic control of mobile robots using neural networks.

    Science.gov (United States)

    Bugeja, Marvin K; Fabri, Simon G; Camilleri, Liberato

    2009-02-01

    This paper proposes two novel dual adaptive neural control schemes for the dynamic control of nonholonomic mobile robots. The two schemes are developed in discrete time, and the robot's nonlinear dynamic functions are assumed to be unknown. Gaussian radial basis function and sigmoidal multilayer perceptron neural networks are used for function approximation. In each scheme, the unknown network parameters are estimated stochastically in real time, and no preliminary offline neural network training is used. In contrast to other adaptive techniques hitherto proposed in the literature on mobile robots, the dual control laws presented in this paper do not rely on the heuristic certainty equivalence property but account for the uncertainty in the estimates. This results in a major improvement in tracking performance, despite the plant uncertainty and unmodeled dynamics. Monte Carlo simulation and statistical hypothesis testing are used to illustrate the effectiveness of the two proposed stochastic controllers as applied to the trajectory-tracking problem of a differentially driven wheeled mobile robot.

  15. Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks

    Science.gov (United States)

    Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori

    Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.

  16. Survivability-enhancing routing scheme for multi-domain networks

    DEFF Research Database (Denmark)

    Li, Xiaohua; Ruepp, Sarah Renée; Manolova, Anna Vasileva

    2008-01-01

    We present a routing solution which eliminates the inherent path exploration problem of BGP and thereby enhances survivability in multi-domain networks. The path exploration problem is caused by the dependency among paths learned from neighboring domains. We propose to solve this issue by using two...... the size of routing table is 2*(n-1). To implement our solution, domain level source routing is used and a SDRP header is added to the delivered packet. This avoids re-calculation and path exploration when repairing inter-domain link failures. Inter-domain link failures must be repaired at domain level...

  17. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed

    2017-08-17

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink or destination than the transmitting communication device relays the packet in a first hop. In a subsequent hop, a receiving communication device evaluates position information conveyed by the transmitting communication device of the first hop to determine whether to forward the packet. Accordingly, a receiving communication device receiver that offers progress towards the sink can elect to forward the packet.

  18. A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs.

    Science.gov (United States)

    Liu, Xiang; Huang, Jie; Gao, Xiang

    2017-05-16

    In wireless sensor networks, nodes are mostly deployed in unsupervised areas and are vulnerable to a variety of attacks. Therefore, data security is a vital aspect to be considered. However, due to the limited computation capability and memory of sensor nodes, it is difficult to perform the complex encryption algorithm, as well as the key distribution and management algorithm. Toward this end, a low-complexity algorithm for security in wireless sensor networks is of significant importance. In this article, a weakly secure network coding based multipath routing scheme is proposed, which can guarantee the data confidentiality in transmission probabilistically, and can improve the energy efficiency in the meantime. Then the simulations of the probability of transmission being secure are performed. The results show that with the increase of the number of hops k, the probability of transmission being secure suffers from a rapid decrease. On the contrary, with the increase of multicast capacity h it undergoes a slight growth. Therefore, the weak security can be achieved with probability approaching 1 by limiting the number of hops and increasing the multicast capacity. Meanwhile, the simulations of energy consumption are performed and the comparison between the energy consumption of the scheme in this article and the multipath routing scheme without network coding is conducted. The results show that by employing network coding, the scheme in this article can improve the energy efficiency, and the more packets transmitted, the more energy consumption can be reduced.

  19. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  20. An Efficient Scheme for Aggregation and Presentation of Network Performance in Distributed Brokering Systems

    Directory of Open Access Journals (Sweden)

    Gurhan Gunduz

    2003-12-01

    Full Text Available The Internet is presently being used to support increasingly complex interaction models as a result of more and more applications, services and frameworks becoming network centric. Efficient utilization of network and networkedresources is of paramount importance. Network performance gathering is a precursor to any scheme that seeks to provide adaptive routing capabilities for interactions. In this paper we present a network performance aggregation framework that is extensible and appropriate for distributed messaging systems that span multiple realms, disparate communication protocols and support different applications.

  1. Predictive Closed-Loop Power Control for CDMA Cellular Networks

    Science.gov (United States)

    Choe, Sangho; Uysal, Murat

    In this paper, we present and analyze a predictive closedloop power control (CLPC) scheme which employs a comb-type sample arrangement to effectively compensate multiple power control group (PCG) delays over mobile fading channels. We consider both least squares and recursive least squares filters in our CLPC scheme. The effects of channel estimation error, prediction filter error, and power control bit transmission error on the performance of the proposed CLPC method along with competing non-predictive and predictive CLPC schemes are thoroughly investigated. Our results clearly indicate the superiority of the proposed scheme with its improved robustness under non-ideal conditions. Furthermore, we carry out a Monte-Carlo simulation study of a 5×5 square grid cellular network and evaluate the user capacity. Capacity improvements up to 90% are observed for a typical cellular network scenario.

  2. A Scheme to Update OSPF Network Metrics without Loops while Minimizing Routing Instability Duration

    Science.gov (United States)

    Arai, Yutaka; Oki, Eiji

    This letter proposes a scheme to update metrics without loops while minimizing routing instability time in an Open Shortest Path First (OSPF) network. The original OSPF network enters the transient state when metrics are being updated to improve the routing performance, and in this state packets may fall into loops. This may cause packet loss and inefficient network resource utilization. To avoid transient loops, a conventional scheme gives each router a priority that reflects the optimum time for metric update. However, when the updated metrics include both larger and smaller values than the preceding ones, two sequential updating processes, one for larger values and one for smaller values, are required. It takes time to converge on the final metric values in the conventional scheme, given that the interval time between the two processes is not insignificant. The second process starts only when the first process is confirmed to be completed. The interval time including the confirmation time and the time needed to reconfigure the metrics in all routers, lengthens the transient state duration; from several seconds to several tens of seconds. This causes routing instability. The proposed scheme transforms the set of updated metrics into an equivalent set of metrics that are either all larger or all smaller (if changed at all) than the ones before the update. The set of equivalent metrics yield exactly the same results in terms of routing as the conventional scheme, i.e. the result desired by the network operator. The non-mixture update requires only one updating process and so eliminates the interval time. Numerical results indicate that the probability that the proposed scheme can achieve non-mixture update is more than 67% in the networks examined.

  3. Cybersecurity of Critical Control Networks

    Science.gov (United States)

    2015-07-14

    AFRL-OSR-VA-TR-2015-0173 CONGRESSIONAL) CYBERSECURITY OF CRITICAL CONTROL NETWORKS William Mahoney UNIVERSITY OF NEBRASKA Final Report 07/14/2015...Congressional) Cybersecurity of Critical Control Networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-10-1-0341 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...FA9550-10-1-0341 Cybersecurity of Critical Control Networks Report Type Final Report Primary Contact E-mail wmahoney@unomaha.edu Primary

  4. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  5. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  6. A Novel Dedicated Route Protection Scheme for Survivability of Link Failure in Elastic Optical Networks

    Directory of Open Access Journals (Sweden)

    Sridhar Iyer

    2017-11-01

    Full Text Available The spectrally efficient transportation of the high bit rate(s data is achievable by the Elastic optical networks (EONs. However, in the EONs, owing to the failure occurrence even in an individual simple element, different service(s maybe interrupted. Hence, it is imperative that the schemes for survivability be developed so that the issues due to the possible failure(s can be overcome. In the current work, in view of survivability of the link failure(s in the EONs, we propose the Spectrum Continuity and Contiguity Established DRP (SCC-E-DRP algorithm which is a novel dedicated route protection (DRP scheme that attempts to avoid the problem of trap topology during its exploration for a pair of link disjoint path. Further, to evaluate the link disjoint paths, we resort to the use of the SCC Established Shortest Route (SCC-E-SR algorithm which is a modified Dijkstra’s algorithm based scheme that selects the path(s pair(s based on the end-toend SCC. We conduct extensive simulations considering realistic network topologies, and compare the performance of the SCCE-DRP scheme with the existing techniques. The obtained results show that, compared to the existing schemes, the SCC-E-DRP scheme achieves better results in terms of blocking probability.

  7. Fast and Efficient Data Forwarding Scheme for Tracking Mobile Targets in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mi Zhou

    2017-11-01

    Full Text Available Transferring emergent target tracking data to sinks is a major challenge in the Industrial Internet of Things (IIoT, because inefficient data transmission can cause significant personnel and property loss. For tracking a constantly moving mobile target, sensing data should be delivered to sinks continuously and quickly. Although there is some related research, the end to end tracking delay is still unsatisfying. In this paper, we propose a Fast and Efficient Data Forwarding (FEDF scheme for tracking mobile targets in sensor networks to reduce tracking delay and maintain a long lifetime. Innovations of the FEDF scheme that differ from traditional scheme are as follows: firstly, we propose a scheme to transmit sensing data through a Quickly Reacted Routing (QRR path which can reduce delay efficiently. Duty cycles of most nodes on a QRR path are set to 1, so that sleep delay of most nodes turn 0. In this way, end to end delay can be reduced significantly. Secondly, we propose a perfect method to build QRR path and optimize it, which can make QRR path work more efficiently. Target sensing data routing scheme in this paper belongs to a kind of trail-based routing scheme, so as the target moves, the routing path becomes increasingly long, reducing the working efficiency. We propose a QRR path optimization algorithm, in which the ratio of the routing path length to the optimal path is maintained at a smaller constant in the worst case. Thirdly, it has a long lifetime. In FEDF scheme duty cycles of nodes near sink in a QRR path are the same as that in traditional scheme, but duty cycles of nodes in an energy-rich area are 1. Therefore, not only is the rest energy of network fully made use of, but also the network lifetime stays relatively long. Finally, comprehensive performance analysis shows that the FEDF scheme can realize an optimal end to end delay and energy utilization at the same time, reduce end to end delay by 87.4%, improve network energy

  8. Performance of Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Yingwei Zhang

    2013-01-01

    Full Text Available Data packet dropout is a special kind of time delay problem. In this paper, predictive controllers for networked control systems (NCSs with dual-network are designed by model predictive control method. The contributions are as follows. (1 The predictive control problem of the dual-network is considered. (2 The predictive performance of the dual-network is evaluated. (3 Compared to the popular networked control systems, the optimal controller of the new NCSs with data packets dropout is designed, which can minimize infinite performance index at each sampling time and guarantee the closed-loop system stability. Finally, the simulation results show the feasibility and effectiveness of the controllers designed.

  9. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  10. A Continuous Object Boundary Detection and Tracking Scheme for Failure-Prone Sensor Networks.

    Science.gov (United States)

    Imran, Sajida; Ko, Young-Bae

    2017-02-13

    In wireless sensor networks, detection and tracking of continuous natured objects is more challenging owing to their unique characteristics such as uneven expansion and contraction. A continuous object is usually spread over a large area, and, therefore, a substantial number of sensor nodes are needed to detect the object. Nodes communicate with each other as well as with the sink to exchange control messages and report their detection status. The sink performs computations on the received data to estimate the object boundary. For accurate boundary estimation, nodes at the phenomenon boundary need to be carefully selected. Failure of one or multiple boundary nodes (BNs) can significantly affect the object detection and boundary estimation accuracy at the sink. We develop an efficient failure-prone object detection approach that not only detects and recovers from BN failures but also reduces the number and size of transmissions without compromising the boundary estimation accuracy. The proposed approach utilizes the spatial and temporal features of sensor nodes to detect object BNs. A Voronoi diagram-based network clustering, and failure detection and recovery scheme is used to increase boundary estimation accuracy. Simulation results show the significance of our approach in terms of energy efficiency, communication overhead, and boundary accuracy.

  11. Bearingless Flywheel Systems, Winding and Control Schemes, and Sensorless Control

    Science.gov (United States)

    Jansen, Ralph H (Inventor); Trase, Larry M (Inventor); Dever, Timothy P (Inventor); Kascak, Peter E (Inventor); Kraft, Thomas G (Inventor)

    2016-01-01

    Flywheel systems are disclosed that provide increased energy density and operational effectiveness. A first bearingless motor and a second bearingless motor may be configured to simultaneously suspend the central rotor in a radial direction and to rotate the central rotor. However, certain implementations may have one motor or more than two motors, depending on the design. A plurality of the flywheel systems may be collectively controlled to perform community energy storage with higher storage capacities than individual flywheel systems.

  12. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    Science.gov (United States)

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  13. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  14. Estimation of System Operating Margin for Different Modulation Schemes in Vehicular Ad-Hoc Networks

    OpenAIRE

    TilotmaYadav; Partha Pratim Bhattacharya

    2013-01-01

    In this paper, system operating margin (SOM) is estimated for vehicular ad-hoc networks in absence and presence of Rayleigh fading. The Ad-hoc IEEE 802.11 model is considered for estimating the signal strength and system operating margin. Rayleigh fading was then simulated and system operating margin are estimated in Rayleigh fading environment for different standard modulation schemes.

  15. Neural network topology design for nonlinear control

    Science.gov (United States)

    Haecker, Jens; Rudolph, Stephan

    2001-03-01

    Neural networks, especially in nonlinear system identification and control applications, are typically considered to be black-boxes which are difficult to analyze and understand mathematically. Due to this reason, an in- depth mathematical analysis offering insight into the different neural network transformation layers based on a theoretical transformation scheme is desired, but up to now neither available nor known. In previous works it has been shown how proven engineering methods such as dimensional analysis and the Laplace transform may be used to construct a neural controller topology for time-invariant systems. Using the knowledge of neural correspondences of these two classical methods, the internal nodes of the network could also be successfully interpreted after training. As further extension to these works, the paper describes the latest of a theoretical interpretation framework describing the neural network transformation sequences in nonlinear system identification and control. This can be achieved By incorporation of the method of exact input-output linearization in the above mentioned two transform sequences of dimensional analysis and the Laplace transformation. Based on these three theoretical considerations neural network topologies may be designed in special situations by pure translation in the sense of a structural compilation of the known classical solutions into their correspondent neural topology. Based on known exemplary results, the paper synthesizes the proposed approach into the visionary goals of a structural compiler for neural networks. This structural compiler for neural networks is intended to automatically convert classical control formulations into their equivalent neural network structure based on the principles of equivalence between formula and operator, and operator and structure which are discussed in detail in this work.

  16. Neural Networks in Control Applications

    DEFF Research Database (Denmark)

    Sørensen, O.

    The intention of this report is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...... examined, and it appears that considering 'normal' neural network models with, say, 500 samples, the problem of over-fitting is neglible, and therefore it is not taken into consideration afterwards. Numerous model types, often met in control applications, are implemented as neural network models...... Kalmann filter) representing state space description. The potentials of neural networks for control of non-linear processes are also examined, focusing on three different groups of control concepts, all considered as generalizations of known linear control concepts to handle also non-linear processes...

  17. Efficient rate control scheme using modified inter-layer dependency ...

    Indian Academy of Sciences (India)

    In this paper, a spatial-resolutionratio-based MB mode decision scheme is proposed for spatially enhanced layers. The scheme uses the motion estimated at the base layer, to encode the respective MBs in the enhancement layers. The spatial–temporalsearch schemes at the enhancement layers are used to derive motion ...

  18. On Goodput and Energy Measurements of Network Coding Schemes in the Raspberry Pi

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Sørensen, Chres Wiant; Cabrera, Juan

    2016-01-01

    Given that next generation networks are expected to be populated by a large number of devices, there is a need for quick deployment and evaluation of alternative mechanisms to cope with the possible generated traffic in large-scale distributed data networks. In this sense, the Raspberry Pi has been...... a popular network node choice due to its reduced size, processing capabilities, low cost and its support by widely-used operating systems. For information transport, network coding is a new paradigm for fast and reliable data processing in networking and storage systems which overcomes various limitations...... of state-of-the-art routing techniques. Therefore, in this work we provide an in-depth performance evaluation of Random Linear Network Coding (RLNC) based schemes for the Raspberry Pi models 1 and 2, by showing the processing speed of the encoding and decoding operations and the corresponding energy...

  19. Positive train control shared network.

    Science.gov (United States)

    2015-05-01

    The Interoperable Train Control (ITC) Positive : Train Control (PTC) Shared Network (IPSN) : project investigated anticipated industry benefits : and the level of support for the development of : a hosted technological platform for PTC : messaging ac...

  20. Wide-Area H∞ Control for Damping Interarea Oscillations with Event-Triggered Scheme

    Directory of Open Access Journals (Sweden)

    Yunning Zhang

    2013-01-01

    Full Text Available An event-triggered scheme is adopted and applied to the design of a centralized wide-area H∞ damping controller (WAHDC of interconnected power systems with external disturbance. Firstly, based on the linearized multimachine system model, the centralized WAHDC with event-triggered scheme design problem is described as time-delay feedback control problem. Then by using Lyapunov functional method and Jensen inequality technique, criteria for stability with an H∞ norm bound and for design of the feedback controller are derived. The linear matrix inequality (LMI is employed to solve the feedback gain. Finally, case studies are carried out based on two-area four-machine power system. Simulations indicate that the proposed WAHDC with event-triggered scheme can damp the interarea oscillation effectively when the external disturbance is bounded and significantly reduce the number of measured states released to WAHDC. Relationships between event trigger parameter σ and dynamic performance, σ and network utilization, σ and time delay, and σ and disturbance rejection level are investigated and results obtained can be used to choose an appropriate event trigger parameter.

  1. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis

    Directory of Open Access Journals (Sweden)

    Joshi Deepti

    2005-01-01

    Full Text Available Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing "fully distributed certificate authority" scheme for ad hoc networks. In the proposed modification, redundancy is introduced by allocating more than one share to each node in order to increase the probability of creating the certificate for a node in a highly mobile network. A probabilistic analysis is carried out to analyze the trade-offs between the ease of certificate creation and the security provided by the proposed scheme. The analysis carried out from the intruder's perspective suggests that in the worst-case scenario, the intruder is just "one node" away from a legitimate node in compromising the certificate. The analysis also outlines the parameter selection criteria for a legitimate node to maintain a margin of advantage over an intruder in creating the certificate.

  2. LPTA: Location Predictive and Time Adaptive Data Gathering Scheme with Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chuan Zhu

    2014-01-01

    Full Text Available This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  3. Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking

    Directory of Open Access Journals (Sweden)

    Woosik Lee

    2017-06-01

    Full Text Available In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets. However, the existing hardware-based single security architecture cannot efficiently handle a complex system structure. To solve this problem, we propose a software-defined networking (SDN policy-based scheme for an efficient security architecture. The proposed scheme considers four policy functions: separating, chaining, merging, and reordering. If SDN network functions virtualization (NFV system managers use these policy functions to deploy a security architecture, they only submit some of the requirement documents to the SDN policy-based architecture. After that, the entire security network can be easily built. This paper presents information about the design of a new policy functions model, and it discusses the performance of this model using theoretical analysis.

  4. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  5. A Novel Deployment Scheme Based on Three-Dimensional Coverage Model for Wireless Sensor Networks

    Science.gov (United States)

    Xiao, Fu; Yang, Yang; Wang, Ruchuan; Sun, Lijuan

    2014-01-01

    Coverage pattern and deployment strategy are directly related to the optimum allocation of limited resources for wireless sensor networks, such as energy of nodes, communication bandwidth, and computing power, and quality improvement is largely determined by these for wireless sensor networks. A three-dimensional coverage pattern and deployment scheme are proposed in this paper. Firstly, by analyzing the regular polyhedron models in three-dimensional scene, a coverage pattern based on cuboids is proposed, and then relationship between coverage and sensor nodes' radius is deduced; also the minimum number of sensor nodes to maintain network area's full coverage is calculated. At last, sensor nodes are deployed according to the coverage pattern after the monitor area is subdivided into finite 3D grid. Experimental results show that, compared with traditional random method, sensor nodes number is reduced effectively while coverage rate of monitor area is ensured using our coverage pattern and deterministic deployment scheme. PMID:25045747

  6. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  7. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    Science.gov (United States)

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  8. Neural Networks in Control Applications

    DEFF Research Database (Denmark)

    Sørensen, O.

    simulated process and compared. The closing chapter describes some practical experiments, where the different control concepts and training methods are tested on the same practical process operating in very noisy environments. All tests confirm that neural networks also have the potential to be trained......The intention of this report is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...... study of the networks themselves. With this end in view the following restrictions have been made: - Amongst numerous neural network structures, only the Multi Layer Perceptron (a feed-forward network) is applied. - Amongst numerous training algorithms, only four algorithms are examined, all...

  9. Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks.

    Science.gov (United States)

    Qin, Junping; Sun, Shiwen; Deng, Qingxu; Liu, Limin; Tian, Yonghong

    2017-06-02

    Object tracking and detection is one of the most significant research areas for wireless sensor networks. Existing indoor trajectory tracking schemes in wireless sensor networks are based on continuous localization and moving object data mining. Indoor trajectory tracking based on the received signal strength indicator (RSSI) has received increased attention because it has low cost and requires no special infrastructure. However, RSSI tracking introduces uncertainty because of the inaccuracies of measurement instruments and the irregularities (unstable, multipath, diffraction) of wireless signal transmissions in indoor environments. Heuristic information includes some key factors for trajectory tracking procedures. This paper proposes a novel trajectory tracking scheme based on Delaunay triangulation and heuristic information (TTDH). In this scheme, the entire field is divided into a series of triangular regions. The common side of adjacent triangular regions is regarded as a regional boundary. Our scheme detects heuristic information related to a moving object's trajectory, including boundaries and triangular regions. Then, the trajectory is formed by means of a dynamic time-warping position-fingerprint-matching algorithm with heuristic information constraints. Field experiments show that the average error distance of our scheme is less than 1.5 m, and that error does not accumulate among the regions.

  10. Coordinated Voltage Control of Active Distribution Network

    Directory of Open Access Journals (Sweden)

    Xie Jiang

    2016-01-01

    Full Text Available This paper presents a centralized coordinated voltage control method for active distribution network to solve off-limit problem of voltage after incorporation of distributed generation (DG. The proposed method consists of two parts, it coordinated primal-dual interior point method-based voltage regulation schemes of DG reactive powers and capacitors with centralized on-load tap changer (OLTC controlling method which utilizes system’s maximum and minimum voltages, to improve the qualified rate of voltage and reduce the operation numbers of OLTC. The proposed coordination has considered the cost of capacitors. The method is tested using a radial edited IEEE-33 nodes distribution network which is modelled using MATLAB.

  11. HSUPA Transport Network Congestion Control

    Directory of Open Access Journals (Sweden)

    Nádas Szilveszter

    2009-01-01

    Full Text Available The introduction of High Speed Uplink Packet Access (HSUPA greatly improves achievable uplink bitrate but it presents new challenges to be solved in the WCDMA radio access network. In the transport network, bandwidth reservation for HSUPA is not efficient and TCP cannot efficiently resolve congestion because of lower layer retransmissions. This paper proposes an HSUPA transport network flow control algorithm that handles congestion situations efficiently and supports Quality of Service differentiation. In the Radio Network Controller (RNC, transport network congestion is detected. Relying on the standardized control frame, the RNC notifies the Node B about transport network congestion. In case of transport network congestion, the Node B part of the HSUPA flow control instructs the air interface scheduler to reduce the bitrate of the flow to eliminate congestion. The performance analysis concentrates on transport network limited scenarios. It is shown that TCP cannot provide efficient congestion control. The proposed algorithm can achieve high end-user perceived throughput, while maintaining low delay, loss, and good fairness in the transport network.

  12. Research on cooperative vehicle intersection control scheme without using traffic lights under the connected vehicles environment

    National Research Council Canada - National Science Library

    Zheng, Yi; Jin, Lisheng; Jiang, Yuying; Wang, Fangrong; Guan, Xin; Ji, Shengyuan; Xu, Jun

    2017-01-01

    To improve traffic congestion of urban intersections, this article presents a cooperative vehicle intersection control scheme without using any traffic lights, based on model predictive control theory...

  13. Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhuangbin Chen

    2017-01-01

    Full Text Available In smart Industrial Wireless Sensor Networks (IWSNs, sensor nodes usually adopt a programmable technology. These smart devices can obtain new or special functions by reprogramming: they upgrade their soft systems through receiving new version of program codes. If sensor nodes need to be upgraded, the sink node will propagate program code packets to them through “one-to-many” broadcasting, and therefore new capabilities can be obtained, forming the so-called Software Defined Network (SDN. However, due to the high volume of code packet, the constraint energy of sensor node, and the unreliable link quality of wireless network, rapidly broadcasting the code packets to all nodes in network can be a challenge issue. In this paper, a novel Energy-efficient Broadcast scheme with adjustable broadcasting radius is proposed aiming to improve the performance of network upgrade. In our scheme, the nonhotspots sensor nodes take full advantage of their residual energy caused in data collection period to improve the packet reception probability and reduce the broadcasting delay of code packet transmission by enlarging the broadcasting radius, that is, the transmitting power. The theoretical analyses and experimental results show that, compared with previous work, our approach can averagely reduce the Network Upgrade Delay (NUD by 14.8%–45.2% and simultaneously increase the reliability without harming the lifetime of network.

  14. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    KAUST Repository

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  15. Threshold behaviors of social dynamics and financial outcomes of Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Fu, Peihua; Zhu, Anding; Ni, He; Zhao, Xin; Li, Xiulin

    2018-01-01

    Ponzi schemes always lead to mass disasters after collapse. It is important to study the critical behaviors of both social dynamics and financial outcomes for Ponzi scheme diffusion in complex networks. We develop the potential-investor-divestor-investor (PIDI) model by considering the individual behavior of direct reinvestment. We find that only the spreading rate relates to the epidemic outbreak while the reinvestment rate relates to the zero and non-zero final states for social dynamics of both homo- and inhomogeneous networks. Financially, we find that there is a critical spreading threshold, above which the scheme needs not to use its own initial capital for taking off, i.e. the starting cost is covered by the rapidly inflowing funds. However, the higher the cost per recruit, the larger the critical spreading threshold and the worse the financial outcomes. Theoretical and simulation results also reveal that schemes are easier to take off in inhomogeneous networks. The reinvestment rate does not affect the starting. However, it improves the financial outcome in the early stages and postpones the outbreak of financial collapse. Some policy suggestions for the regulator from the perspective of social physics are proposed in the end of the paper.

  16. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  17. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun

    2016-04-28

    In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme.

  18. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  19. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  20. Harvested Energy Prediction Schemes for Wireless Sensor Networks: Performance Evaluation and Enhancements

    Directory of Open Access Journals (Sweden)

    Muhammad

    2017-01-01

    Full Text Available We review harvested energy prediction schemes to be used in wireless sensor networks and explore the relative merits of landmark solutions. We propose enhancements to the well-known Profile-Energy (Pro-Energy model, the so-called Improved Profile-Energy (IPro-Energy, and compare its performance with Accurate Solar Irradiance Prediction Model (ASIM, Pro-Energy, and Weather Conditioned Moving Average (WCMA. The performance metrics considered are the prediction accuracy and the execution time which measure the implementation complexity. In addition, the effectiveness of the considered models, when integrated in an energy management scheme, is also investigated in terms of the achieved throughput and the energy consumption. Both solar irradiance and wind power datasets are used for the evaluation study. Our results indicate that the proposed IPro-Energy scheme outperforms the other candidate models in terms of the prediction accuracy achieved by up to 78% for short term predictions and 50% for medium term prediction horizons. For long term predictions, its prediction accuracy is comparable to the Pro-Energy model but outperforms the other models by up to 64%. In addition, the IPro scheme is able to achieve the highest throughput when integrated in the developed energy management scheme. Finally, the ASIM scheme reports the smallest implementation complexity.

  1. Energy Level Performance of Packet Delivery Schemes in Wireless Sensor Networks in Shadowed Channel

    Directory of Open Access Journals (Sweden)

    Arnab NANDI

    2010-07-01

    Full Text Available This paper evaluates energy level performance of three packet delivery schemes in a Wireless Sensor Networks (WSN in shadowed channel. Three different information delivery mechanisms are investigated using regenerative relays with or without error correction capability. Energy consumption for successful delivery of a data packet for each mechanism is evaluated and compared under several conditions of node density, bit rate, transmit power etc. Energy efficiency of different retransmission schemes is evaluated. Further an optimal packet length based on energy efficiency is derived. Impact of different level of severity of shadowing on energy consumption is also investigated. Further impact of fixed and optimal packet size on energy consumption is analyzed.

  2. Energy Aware Routing Schemes in Solar PoweredWireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.

    2016-10-01

    Wireless sensor networks enable inexpensive distributed monitoring systems that are the backbone of smart cities. In this dissertation, we are interested in wireless sensor networks for traffic monitoring and an emergency flood detection to improve the safety of future cities. To achieve real-time traffic monitoring and emergency flood detection, the system has to be continually operational. Accordingly, an energy source is needed to ensure energy availability at all times. The sun provides for the most inexpensive source of energy, and therefore the energy is provided here by a solar panel working in conjunction with a rechargeable battery. Unlike batteries, solar energy fluctuates spatially and temporally due to the panel orientation, seasonal variation and node location, particularly in cities where buildings cast shadows. Especially, it becomes scarce whenever floods are likely to occur, as the weather tends to be cloudy at such times when the emergency detection system is most needed. These considerations lead to the need for the optimization of the energy of the sensor network, to maximize its sensing performance. In this dissertation, we address the challenges associated with long term outdoor deployments along with providing some solutions to overcome part of these challenges. We then introduce the energy optimization problem, as a distributed greedy approach. Motivated by the flood sensing application, our objective is to maximize the energy margin in the solar powered network at the onset of the high rain event, to maximize the network lifetime. The decentralized scheme will achieve this by optimizing the energy over a time horizon T, taking into account the available and predicted energy over the entire routing path. Having a good energy forecasting scheme can significantly enhance the energy optimization in WSN. Thus, this dissertation proposes a new energy forecasting scheme that is compatible with the platform’s capabilities. This proposed

  3. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  4. NEURAL CASCADED WITH FUZZY SCHEME FOR CONTROL OF A HYDROELECTRIC POWER PLANT

    OpenAIRE

    A. Selwin Mich Priyadharson; T. Ramesh Kumar; M. S. Saravanan; C. ThilipKumar; D. Dileepan

    2014-01-01

    A novel design for flow and level control in a hydroelectric power plant using Programmable Logic Controller (PLC)-Human Machine Interface (HMI) and neural cascaded with fuzzy scheme is proposed. This project will focus on design and development of flow and level controller for small scale hydro generating units by implementing gate control based on PLC-HMI with the proposed scheme. The existing control schemes have so many difficulties to manage intrinsic time delay, nonlinearity due to unce...

  5. On a switching control scheme for nonlinear systems with ill-defined relative degree

    OpenAIRE

    Chen, W-H; Ballance, D.J.

    2002-01-01

    This paper discusses the applicability of a switching control scheme for a nonlinear system with ill-defined relative degree. The control scheme switches between exact and approximate input-output linearisation control laws. Unlike a linear system under a switching control scheme, the equilibria of a nonlinear system may change with the switching. It is pointed out that this is not sufficient to cause instability. When the region of the approximate linearisation control law is attractive to t...

  6. A multi-attribute vertical handoff scheme for heterogeneous wireless networks

    Directory of Open Access Journals (Sweden)

    JI Xiaolong

    2014-04-01

    Full Text Available In order to meet the user demand for different services as well as to mitigate the Ping-pong effect caused by vertical handoff for wireless network,a multi-attribute vertical handoff scheme for heterogeneous wireless network is proposed.In the algorithm,a fuzzy logic method is used to make pre-decision.The optimal handoff target network is selected by a cost function of network which uses an Analytic Hierarchy Process to calculate the weights of SNR,delay,cost and user preference in different business scenarios.Simulation is performed in the environment which is overlapped by WiMAX and UMTS networks.Results show that the proposed approach can effectively reduce the number of handoff and power consumption in a condition to satisfy the user needs.

  7. Understanding control of network spreading from network controllability

    Science.gov (United States)

    Sun, Peng Gang; Ma, Xiaoke

    2017-09-01

    How to control the spread of an epidemic or information is a great challenge for us. A dynamic network-based system’s structural controllability provides a new way to control spreading with the minimum input of external signals, and the dynamic system is controllable if the signals can drive it from any initial state to any desired final state in finite time. Therefore, we are motivated to develop a new framework by introducing spreading networks (SNs) to describe the spreading pathways from a global view, and we try to understand the control of the spreading by the structural controllability of the SNs. The SNs are transformed from original networks, in which each node is considered as a single spreading origin. The weights of directed links pointing at its direct contacts in the SNs denote the spreading abilities, which can be determined by a new probability function. Furthermore, we also investigate the impact of the dynamics of network structures on the framework. The results show that sparse homogeneous networks with a higher transmission probability tend to trigger a larger scale of diffusion, which is easier to control. We can also see that an epidemic or information is inclined to diffuse easily on the networks with strong community strengths and heterogeneous community sizes. From the structural controllability of the SNs, we observe that driver nodes for the control of the spread tend not to be the nodes located within the core of original networks or those with high-degree. In addition, the scale of diffusion, the number of driver nodes and positions of nodes are highly associated with the degree distribution of the original networks.

  8. Neural Networks in Control Applications

    DEFF Research Database (Denmark)

    Sørensen, O.

    The intention of this report is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...... study of the networks themselves. With this end in view the following restrictions have been made: - Amongst numerous neural network structures, only the Multi Layer Perceptron (a feed-forward network) is applied. - Amongst numerous training algorithms, only four algorithms are examined, all...... in a recursive form (sample updating). The simplest is the Back Probagation Error Algorithm, and the most complex is the recursive Prediction Error Method using a Gauss-Newton search direction. - Over-fitting is often considered to be a serious problem when training neural networks. This problem is specifically...

  9. Reliability Indicators of Urban Electric Network Schemes for Supply of Second and Third Category Consumers

    Directory of Open Access Journals (Sweden)

    M. A. Korotkevich

    2012-01-01

    Full Text Available The paper considers two schemes of the urban distributive electric network for supply of the second and third category consumers for whom indicators of reliability have been determined.As for a network scheme of the 2nd category it has been determined that while installing low-oil and vacuum switches at a distributive point the most remote transformer substation has the highest non-availability  factor which is higher of the corresponding non-availability  factor of the nearest transformer substation by 1,21–1,23 fold  accordingly.As for a network scheme of the 3rd category consumers it has been obtained the data that reliability of consumers receiving supply from bus-bars of transformer substations with 0,38 kW voltage changes  significantly (by 1,2–1,9-fold while changing a breakpoint of the network with 10 kW voltage.

  10. A Novel Cooperation-Based Network Coding Scheme for Walking Scenarios in WBANs

    Directory of Open Access Journals (Sweden)

    Hongyun Zhang

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, the tradeoff between network throughput and energy efficiency remains a key challenge. Most current transmission schemes try to cope with the challenge from the perspective of general Wireless Sensor Networks (WSNs, which may not take the peculiarities of WBAN channels into account. In this paper, we take advantage of the correlation of on-body channels in walking scenarios to achieve a better tradeoff between throughput and energy consumption. We first analyze the characteristics of on-body channels based on realistic channel gain datasets, which are collected by our customized wireless transceivers in walking scenarios. The analytical results confirm the rationale of our newly proposed transmission scheme A3NC, which explores the combination of the aggregative allocation (AA mechanism in MAC layer and the Analog Network Coding (ANC technique in PHY layer. Both theoretical analyses and simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency, compared to the conventional approaches.

  11. Experimental Study on Intelligent Control Scheme for Fan Coil Air-Conditioning System

    Directory of Open Access Journals (Sweden)

    Yanfeng Li

    2013-01-01

    Full Text Available An intelligent control scheme for fan coil air-conditioning systems has been put forward in order to overcome the shortcomings of the traditional proportion-integral-derivative (PID control scheme. These shortcomings include the inability of anti-interference and large inertia. An intelligent control test rig of fan coil air-conditioning system has been built, and MATLAB/Simulink dynamics simulation software has been adopted to implement the intelligent control scheme. A software for data exchange has been developed to combine the intelligence control system and the building automation (BA system. Experimental tests have been conducted to investigate the effectiveness of different control schemes including the traditional PID control, fuzzy control, and fuzzy-PID control for fan coil air-conditioning system. The effects of control schemes have been compared and analyzed in robustness, static and dynamic character, and economy. The results have shown that the developed data exchange interface software can induce the intelligent control scheme of the BA system more effectively. Among the proposed control strategies, fuzzy-PID control scheme which has the advantages of both traditional PID and fuzzy schemes is the optimal control scheme for the fan coil air-conditioning system.

  12. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El

    2017-06-12

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  13. Control and Optimization of Network in Networked Control System

    Directory of Open Access Journals (Sweden)

    Wang Zhiwen

    2014-01-01

    Full Text Available In order to avoid quality of performance (QoP degradation resulting from quality of service (QoS, the solution to network congestion from the point of control theory, which marks departure of our results from the existing methods, is proposed in this paper. The congestion and bandwidth are regarded as state and control variables, respectively; then, the linear time-invariant (LTI model between congestion state and bandwidth of network is established. Consequently, linear quadratic method is used to eliminate the network congestion by allocating bandwidth dynamically. At last, numerical simulation results are given to illustrate the effectiveness of this modeling approach.

  14. Delay compensation using Smith predictor for wireless network control system

    Directory of Open Access Journals (Sweden)

    Mahmoud Gamal

    2016-06-01

    In this paper, a delay compensation scheme using classical and adaptive Smith predictor is applied to wireless NCS. The Markov model is proposed to compute the estimated network delay used in the classical predictor. In the adaptive predictor, the channel delay statistics using shift register is proposed to update the estimated delay. To evaluate the proposed schemes, a DC-motor controller system based on IEEE 802.15.4 is built using True Time Matlab software. The system performance with and without the proposed delay compensation scheme is studied. It is also compared to other delay compensation schemes. The results show that the proposed scheme improves the NCS performance significantly and reduces the effect of the delay on the system.

  15. Sensor scheme design for active structural acoustic control

    NARCIS (Netherlands)

    Berkhoff, Arthur P.

    Efficient sensing schemes for the active reduction of sound radiation from plates are presented based on error signals derived from spatially weighted plate velocity or near-field pressure. The schemes result in near-optimal reductions as compared to weighting procedures derived from eigenvector or

  16. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  17. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  18. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  19. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  20. A Modified Control Scheme of Droop-Based Converters for Power Stability Analysis in Microgrids

    Directory of Open Access Journals (Sweden)

    Igor Usunariz

    2015-01-01

    Full Text Available Microgrid is principally an active distribution network since it aggregates numerous DG systems through their interface converters and different loads at distribution level. This paper discusses the power sharing in autonomous AC-microgrid infrastructure by common P-f and Q-V˙ droop control schemes on parallel-connected converters. Moreover, this research work proposes a frequency and voltage restoration mechanism through the utilization of secondary control. Experimental results are presented for a two-50 kVA parallel-connected converter-based system, demonstrating the necessity for the proper operation of the secondary control in order to monitor the system’s capability to withstand any perturbations that may occur and to ensure the system’s security.

  1. 31 CFR 592.301 - Controlled through the Kimberley Process Certification Scheme.

    Science.gov (United States)

    2010-07-01

    ... Process Certification Scheme. 592.301 Section 592.301 Money and Finance: Treasury Regulations Relating to... Certification Scheme. (a) Except as otherwise provided in paragraph (b) of this section, the term controlled through the Kimberley Process Certification Scheme refers to the following requirements that apply, as...

  2. Determination of Optimal Opening Scheme for Electromagnetic Loop Networks Based on Fuzzy Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Yang Li

    2016-01-01

    Full Text Available Studying optimization and decision for opening electromagnetic loop networks plays an important role in planning and operation of power grids. First, the basic principle of fuzzy analytic hierarchy process (FAHP is introduced, and then an improved FAHP-based scheme evaluation method is proposed for decoupling electromagnetic loop networks based on a set of indicators reflecting the performance of the candidate schemes. The proposed method combines the advantages of analytic hierarchy process (AHP and fuzzy comprehensive evaluation. On the one hand, AHP effectively combines qualitative and quantitative analysis to ensure the rationality of the evaluation model; on the other hand, the judgment matrix and qualitative indicators are expressed with trapezoidal fuzzy numbers to make decision-making more realistic. The effectiveness of the proposed method is validated by the application results on the real power system of Liaoning province of China.

  3. A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks.

    Science.gov (United States)

    Mi, Shichao; Han, Hui; Chen, Cailian; Yan, Jian; Guan, Xinping

    2016-02-19

    Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious nodes. This paper is concerned with the issues of a consensus secure scheme in HWSNs consisting of two types of sensor nodes. Sensor nodes (SNs) have more computation power, while relay nodes (RNs) with low power can only transmit information for sensor nodes. To address the security issues of distributed estimation in HWSNs, we apply the heterogeneity of responsibilities between the two types of sensors and then propose a parameter adjusted-based consensus scheme (PACS) to mitigate the effect of the malicious node. Finally, the convergence property is proven to be guaranteed, and the simulation results validate the effectiveness and efficiency of PACS.

  4. Heuristic Scheme for Home Circuit Grouping andWavelength Assignment in LOBS-HC Networks

    Science.gov (United States)

    Yang, Ximin; Yi, Bo; Tang, Wan; Li, Jingcong

    2014-09-01

    Grouping the Home Circuits (HCs) with the same source is a critical issue of Labeled Optical Burst Switching with Home Circuit (LOBS-HC). To maximize the wavelength utilization in LOBS-HC ring networks, an HC grouping and wavelength assignment scheme, called Longest Path Matching and Graph Coloring (LPMGC), is proposed. LPMGC consists of two phases: grouping and wavelength assignment. First, a heuristic algorithm, named Longest Path Matching (LPM), is proposed to group the HCs according to the longest common path matching between HCs and to make each group as large as possible. And then, Graph Coloring (GC) is introduced to assign wavelengths for HC groups. The numerical results show that the proposed scheme performances better than Complementary HC Assignment (CHA) and some other heuristics in both unidirectional and bidirectional LOBS-HC ring networks in terms of wavelength utilization.

  5. A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shichao Mi

    2016-02-01

    Full Text Available Heterogeneous wireless sensor networks (HWSNs can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious nodes. This paper is concerned with the issues of a consensus secure scheme in HWSNs consisting of two types of sensor nodes. Sensor nodes (SNs have more computation power, while relay nodes (RNs with low power can only transmit information for sensor nodes. To address the security issues of distributed estimation in HWSNs, we apply the heterogeneity of responsibilities between the two types of sensors and then propose a parameter adjusted-based consensus scheme (PACS to mitigate the effect of the malicious node. Finally, the convergence property is proven to be guaranteed, and the simulation results validate the effectiveness and efficiency of PACS.

  6. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks

    OpenAIRE

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-01-01

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel s...

  7. An Optimal Spectrum Handoff Scheme for Cognitive Radio Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    DUAN, J.

    2011-08-01

    Full Text Available Spectrum handoff procedures occur when the primary users appear in the licensed band temporary occupied by the cognitive radio (CR users and aim to help the CR users to vacate the spectrum rapidly and find available channel to resume the transmission. However, a spectrum handoff scheme that comprehensively considers channel selection, handoff decision as well as space domain handoff is yet undeveloped. In this paper we present a complete optimal spectrum handoff scheme for cognitive radio mobile ad hoc networks. First, we design a spectrum selection mechanism to allow CR users optimally choose the appropriate channel. The spectrum idleness prediction algorithm is utilized based on developing a cooperative spectrum searching approach. Through combining the estimated transmission time, the PU appearance probability and the mean spectrum availability time are integrated to develop the optimal spectrum handoff scheme. Moreover, as one part of the proposed scheme, a geo-location approach is utilized to deal with the space domain handoff. The complete scheme is evaluated through a comprehensive simulation study, and results reveal significant improvements in handoff times and transmission efficiency over conventional approaches.

  8. Energy-Efficient Data Gathering Scheme Based on Broadcast Transmissions in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Soobin Lee

    2013-01-01

    previous works have proposed ideas that reduce the energy consumption of the network by exploiting the spatial correlation between sensed information. In this paper, we propose a distributed data compression framework that exploits the broadcasting characteristic of the wireless medium to improve energy efficiency. We analyze the performance of the proposed framework numerically and compare it with the performance of previous works using simulation. The proposed scheme performs better when the sensing information is correlated.

  9. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  10. A Novel Shared Protection Scheme Based on Aggregate Wavelength in High Speed Networks

    Directory of Open Access Journals (Sweden)

    Anshu Oberoi

    2014-01-01

    Full Text Available We propose novel analytical model of dynamic link cost evaluation in IP over WDM networks. We suggest disjoint path algorithm for the primary and backup path based on wavelength aggregate information, to provide shared backup. We show the optimality of pair selected because of joint optimization of the pair paths. The shareable capacity factor is introduced to establish the effect of load balancing on resources. We compared our simulation results with that of separate protection at connection and showed improvement on resource utilization performance of the network. We also study the blocking probability of proposed scheme.

  11. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  12. Industrial wastewater treatment network based on recycling and rerouting strategies for retrofit design schemes

    DEFF Research Database (Denmark)

    Sueviriyapan, Natthapong; Suriyapraphadilok, Uthaiporn; Siemanond, Kitipat

    2015-01-01

    is employed to solve a network superstructure-based optimization problem formulated as Mixed Integer Linear and/or Non-Linear Programming (MILP/MINLP). Data from a petroleum refinery effluent treatment plant together with special design constraints are employed to formulate different design schemes based...... a generic model-based synthesis and design framework for retrofit wastewater treatment networks (WWTN) of an existing industrial process. The developed approach is suitable for grassroots and retrofit systems and adaptable to a wide range of wastewater treatment problems. A sequential solution procedure...... for the future development of the existing wastewater treatment process....

  13. Advanced Energy Harvesting Control Schemes for Marine Renewable Energy Devices

    Energy Technology Data Exchange (ETDEWEB)

    McEntee, Jarlath [Ocean Renewable Power Company, Portland, ME (United States); Polagye, Brian [Ocean Renewable Power Company, Portland, ME (United States); Fabien, Brian [Ocean Renewable Power Company, Portland, ME (United States); Thomson, Jim [Ocean Renewable Power Company, Portland, ME (United States); Kilcher, Levi [Ocean Renewable Power Company, Portland, ME (United States); Marnagh, Cian [Ocean Renewable Power Company, Portland, ME (United States); Donegan, James [Ocean Renewable Power Company, Portland, ME (United States)

    2016-03-31

    The Advanced Energy Harvesting Control Schemes for Marine Renewable Energy Devices (Project) investigated, analyzed and modeled advanced turbine control schemes with the objective of increasing the energy harvested by hydrokinetic turbines in turbulent flow. Ocean Renewable Power Company (ORPC) implemented and validated a feedforward controller to increase power capture; and applied and tested the controls on ORPC’s RivGen® Power Systems in Igiugig, Alaska. Assessments of performance improvements were made for the RivGen® in the Igiugig environment and for ORPC’s TidGen® Power System in a reference tidal environment. Annualized Energy Production (AEP) and Levelized Cost of Energy (LCOE) improvements associated with implementation of the recommended control methodology were made for the TidGen® Power System in the DOE reference tidal environment. System Performance Advancement (SPA) goals were selected for the project. SPA targets were to improve Power to Weight Ratio (PWR) and system Availability, with the intention of reducing Levelized Cost of Electricity (LCOE). This project focused primarily reducing in PWR. Reductions in PWR of 25.5% were achieved. Reductions of 20.3% in LCOE were achieved. This project evaluated four types of controllers which were tested in simulation, emulation, a laboratory flume, and the field. The adaptive Kω2 controller performs similarly to the non-adaptive version of the same controller and may be useful in tidal channels where the mean velocity is continually evolving. Trends in simulation were largely verified through experiments, which also provided the opportunity to test assumptions about turbine responsiveness and control resilience to varying scales of turbulence. Laboratory experiments provided an essential stepping stone between simulation and implementation on a field-scale turbine. Experiments also demonstrated that using “energy loss” as a metric to differentiate between well-designed controllers operating at

  14. On Goodput and Energy Measurements of Network Coding Schemes in the Raspberry Pi

    DEFF Research Database (Denmark)

    Hernandez Marcano, Nestor Javier; W. Sørensen, Chres; Cabrera, Juan A.

    2016-01-01

    Given that next generation networks are expected to be populated by a large number of devices, there is a need for quick deployment and evaluation of alternative mechanisms to cope with the possible generated traffic in large-scale distributed data networks. In this sense, the Raspberry Pi has been...... of state-of-the-art routing techniques. Therefore, in this work we provide an in-depth performance evaluation of Random Linear Network Coding (RLNC) based schemes for the Raspberry Pi models 1 and 2, by showing the processing speed of the encoding and decoding operations and the corresponding energy...... consumption. Our results show that, in several scenarios, processing speeds of more than 80 Mbps in the Raspberry Pi model 1 and 800 Mbps in the Raspberry Pi model 2 are attainable. Moreover, we show that the processing energy per bit for network coding is below 1 nJ or even an order of magnitude less...

  15. WQM: An Aggregation-aware Queue Management Scheme for IEEE 802.11n based Networks

    KAUST Repository

    Showail, Ahmad

    2014-08-17

    Choosing the right buffer size in Wi-Fi networks is challenging due to the dynamic nature of the wireless environment. Over buffering or \\'bufferbloat\\' may produce unacceptable end-to-end delays, while static small buffers may limit the performance gains that can be achieved with various 802.11n enhancements, such as frame aggregation. We propose WQM, a queue management scheme customized for wireless networks. WQM adapts the buffer size based on measured link characteristics and network load. Furthermore, it accounts for aggregate length when deciding about the optimal buffer size. We implement WQM on Linux and evaluate it on a wireless testbed. WQM reduces the end-to-end delay by up to 8x compared to Linux default buffer size, and 2x compared to CoDel, the state-of-the-art bufferbloat solution, while achieving comparable network goodput. Further, WQM improves fairness as it limits the ability of a single flow to saturate the buffer.

  16. Cooperative HARQ Assisted NOMA Scheme in Large-scale D2D Networks

    KAUST Repository

    Shi, Zheng

    2017-07-13

    This paper develops an interference aware design for cooperative hybrid automatic repeat request (HARQ) assisted non-orthogonal multiple access (NOMA) scheme for large-scale device-to-device (D2D) networks. Specifically, interference aware rate selection and power allocation are considered to maximize long term average throughput (LTAT) and area spectral efficiency (ASE). The design framework is based on stochastic geometry that jointly accounts for the spatial interference correlation at the NOMA receivers as well as the temporal interference correlation across HARQ transmissions. It is found that ignoring the effect of the aggregate interference, or overlooking the spatial and temporal correlation in interference, highly overestimates the NOMA performance and produces misleading design insights. An interference oblivious selection for the power and/or transmission rates leads to violating the network outage constraints. To this end, the results demonstrate the effectiveness of NOMA transmission and manifest the importance of the cooperative HARQ to combat the negative effect of the network aggregate interference. For instance, comparing to the non-cooperative HARQ assisted NOMA, the proposed scheme can yield an outage probability reduction by $32$%. Furthermore, an interference aware optimal design that maximizes the LTAT given outage constraints leads to $47$% throughput improvement over HARQ-assisted orthogonal multiple access (OMA) scheme.

  17. Data Transmission Scheme Using Mobile Sink in Static Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2015-01-01

    Full Text Available Multihop communication in wireless sensor network (WSN brings new challenges in reliable data transmission. Recent work shows that data collection from sensor nodes using mobile sink minimizes multihop data transmission and improves energy efficiency. However, due to continuous movements, mobile sink has limited communication time to collect data from sensor nodes, which results in rapid depletion of node’s energy. Therefore, we propose a data transmission scheme that addresses the aforementioned constraints. The proposed scheme first finds out the group based region on the basis of localization information of the sensor nodes and predefined trajectory information of a mobile sink. After determining the group region in the network, selection of master nodes is made. The master nodes directly transmit their data to the mobile sink upon its arrival at their group region through restricted flooding scheme. In addition, the agent node concept is introduced for swapping of the role of the master nodes in each group region. The master node when consuming energy up to a certain threshold, neighboring node with second highest residual energy is selected as an agent node. The mathematical analysis shows that the selection of agent node maximizes the throughput while minimizing transmission delay in the network.

  18. UD-WCMA: An Energy Estimation and Forecast Scheme for Solar Powered Wireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.

    2017-04-11

    Energy estimation and forecast represents an important role for energy management in solar-powered wireless sensor networks (WSNs). In general, the energy in such networks is managed over a finite time horizon in the future based on input solar power forecasts to enable continuous operation of the WSNs and achieve the sensing objectives while ensuring that no node runs out of energy. In this article, we propose a dynamic version of the weather conditioned moving average technique (UD-WCMA) to estimate and predict the variations of the solar power in a wireless sensor network. The presented approach combines the information from the real-time measurement data and a set of stored profiles representing the energy patterns in the WSNs location to update the prediction model. The UD-WCMA scheme is based on adaptive weighting parameters depending on the weather changes which makes it flexible compared to the existing estimation schemes without any precalibration. A performance analysis has been performed considering real irradiance profiles to assess the UD-WCMA prediction accuracy. Comparative numerical tests to standard forecasting schemes (EWMA, WCMA, and Pro-Energy) shows the outperformance of the new algorithm. The experimental validation has proven the interesting features of the UD-WCMA in real time low power sensor nodes.

  19. Optimal traffic control in highway transportation networks using linear programming

    KAUST Repository

    Li, Yanning

    2014-06-01

    This article presents a framework for the optimal control of boundary flows on transportation networks. The state of the system is modeled by a first order scalar conservation law (Lighthill-Whitham-Richards PDE). Based on an equivalent formulation of the Hamilton-Jacobi PDE, the problem of controlling the state of the system on a network link in a finite horizon can be posed as a Linear Program. Assuming all intersections in the network are controllable, we show that the optimization approach can be extended to an arbitrary transportation network, preserving linear constraints. Unlike previously investigated transportation network control schemes, this framework leverages the intrinsic properties of the Halmilton-Jacobi equation, and does not require any discretization or boolean variables on the link. Hence this framework is very computational efficient and provides the globally optimal solution. The feasibility of this framework is illustrated by an on-ramp metering control example.

  20. Transient and permanent error control for networks-on-chip

    CERN Document Server

    Yu, Qiaoyan

    2012-01-01

    This book addresses reliability and energy efficiency of on-chip networks using a configurable error control coding (ECC) scheme for datalink-layer transient error management. The method can adjust both error detection and correction strengths at runtime by varying the number of redundant wires for parity-check bits. Methods are also presented to tackle joint transient and permanent error correction, exploiting the redundant resources already available on-chip. A parallel and flexible network simulator is also introduced, which facilitates examining the impact of various error control methods on network-on-chip performance. Includes a complete survey of error control methods for reliable networks-on-chip, evaluated for reliability, energy and performance metrics; Provides analysis of error control in various network-on-chip layers, as well as presentation of an innovative multi-layer error control coding technique; Presents state-of-the-art solutions to address simultaneously reliability, energy and performan...

  1. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  2. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    Science.gov (United States)

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  3. A control scheme for filament stretching rheometers with application to polymer melts

    DEFF Research Database (Denmark)

    Román Marín, José Manuel; Huusom, Jakob Kjøbsted; Javier Alvarez, Nicolas

    2013-01-01

    We propose a new control scheme to maintain a constant strain rate of the mid-filament diameter in a filament stretching rheometer for polymer melts. The scheme is cast as a velocity algorithm and consists of a feed-back and a feed-forward contribution. The performance of the controller is demons......We propose a new control scheme to maintain a constant strain rate of the mid-filament diameter in a filament stretching rheometer for polymer melts. The scheme is cast as a velocity algorithm and consists of a feed-back and a feed-forward contribution. The performance of the controller...

  4. Structure of a scheme of emergency control to avoid blackout due to interconnection lines loss

    Energy Technology Data Exchange (ETDEWEB)

    Luz, L.T. da; Werberich, L.C.; Herve, H.M. [Companhia Estadual de Energia Eletrica do Estado do Rio Grande do Sul (CEEE), Porto Alegre, RS (Brazil)

    1994-12-31

    This work presents the structure of Gravatai Emergency Control Scheme (ECS) with short about its development and operation. This ECS was made to avoid two kinds of problems for the systems of Companhia Estadual de Energia Eletrica (CEEE). The first one is the voltage collapse that happens after the opening of one of the 525 kv LTs of the interconnection with the Brazilian Interconnected System (BIS). The second one is the CEEE isolating after the 525 kV network loss. We show the ECS existence reason and we describe its functional structure, the substations, the circuits and the amount of load shedding involved by the system. Finally, we present the project of a control structure based on microcomputer which is being developed for this ECS. (author) 3 refs., 11 figs.

  5. A novel scheme for fast flow classification in GMPLS-based networks

    Science.gov (United States)

    Huang, Qing; Kuo, Geng-Sheng

    2005-02-01

    In GMPLS-based networks, data is forwarded in manner of label switching on Label Switching Router (LSR). Ingress LSR must classify different IP flows into a set of Forwarding Equivalence Classes (FECs), which is a typical flow classification process. Ingress LSR will be the bottleneck of GMPLS-based networks if it could not provision fast flow classification. In this paper, we propose a novel fast flow classification scheme, coined Hierarchical Dividing Tree Scheme (HDTS), to improve the switching performance of ingress LSR in GMPLS-based networks. Four important advantages can be achieved by the proposed HDTS. First, the preprocess time in HDTS is reasonable. Second, fast FEC update is supported. Third, memory cost of HDTS is very low. Most important, the key factor that affects flow classification speed is not the number of FECs, but the depth of the search trees in HDTS. Theoretical analyses and simulations are conducted to evaluate performance of the proposed HDTS. Based on the analytical and experimental results, we can conclude that our HDTS improves the switching performance of ingress LSR greatly and is very practical for GMPLS-based networks due to its low cost.

  6. Energy Efficient Data Gathering Schemes in Wireless Sensor Networks Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    Mrinal K.Naskar

    2009-01-01

    Full Text Available Wireless sensor nodes are highly energy constrainedand hence formulating energy-efficient protocols in order toenhance network lifetime and performance are of utmostimportance in wireless sensor networks. A few solutions exist tothe problem, LEACH and PEGASIS protocols being the mostelegant ones. Both schemes try to achieve a solution byminimizing the overall energy dissipation by the nodes in thenetwork. While randomizing cluster heads for achieving equalenergy dissipation has been done in the LEACH protocol, thePEGASIS protocol forms a chain of all the nodes in thenetwork, each node taking rounds in transmitting to the basestation. In this paper we propose energy efficient protocolswhich enhance the performance of LEACH, PEGASIS. Theindividual nodes being deployed randomly in the play field thebase station is located at variable distances from them. Hence itis clear that the nodes would actually dissipate a differentamount of energy during their turn of transmission to the basestation. The inter-nodal distance also being variable it too playsa role in unequal energy dissipation of the nodes. This energydifference between the various nodes keeps on increasingresulting in poorer network performance. In our schemes we tryto nullify the differences occurring due to these abovementioned causes and thus increase the network performanceby balancing the energy dissipation by the nodes. We alsoemploy the Ant Colony Optimization algorithm (ACO for chainconstruction instead of the greedy algorithm to enhance thenetwork performance. Extensive simulations have been carriedout which show significant improvement over PEGASIS whichin turn implies substantial increment over LEACH.

  7. Dynamic Retransmission Limit Scheme in MAC Layer for Routing in Multihop Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2008-05-01

    Full Text Available We consider a wireless ad hoc network with random access channel. We present a model that takes into account topology, routing, random access in MAC layer, and forwarding probability. In this paper, we focus on drawing benefit from the interaction of the MAC (governed by IEEE 802.11 or slotted Aloha and routing by defining a new cross-layer scheme for routing based on the limit number of retransmission. By adjusting dynamically and judiciously this parameter in a saturated network, we have realized that both stability of forwarding queues and average throughput are significantly improved in linear networks with symmetric traffic: a gain of 100% can be reached. While in asymmetric topology network with asymmetric traffic, we achieve a better average delay (resp., throughput for each connection without changing the average throughput (resp., delay. In addition, we show the efficiency of our new scheme in case of multimedia applications with delay constraint. A detailed performance study is presented using analytical and simulation evaluation.

  8. Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop-Controlled Microgrid

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Guerrero, Josep M.; Jalilian, Alireza

    2011-01-01

    controllers, and virtual impedance loop. A novel virtual impedance structure is proposed to achieve proper sharing of non-fundamental power among the microgrid DGs. The secondary level is designed to manage compensation of voltage harmonics at the microgrid load bus (LB) to which the sensitive loads may......In this paper, a microgrid hierarchical control scheme is proposed which includes primary and secondary control levels. The primary level comprises distributed generators (DGs) local controllers. The local controller mainly consists of active and reactive power controllers, voltage and current...

  9. An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Jinhuan; Long, Jun

    2017-06-12

    Wireless sensor networks (WSNs) are one of the important supporting technologies of edge computing. In WSNs, reliable communications are essential for most applications due to the unreliability of wireless links. In addition, network lifetime is also an important performance metric and needs to be considered in many WSN studies. In the paper, an energy-aware hybrid Automatic Repeat-reQuest protocol (ARQ) scheme is proposed to ensure energy efficiency under the guarantee of network transmission reliability. In the scheme, the source node sends data packets continuously with the correct window size and it does not need to wait for the acknowledgement (ACK) confirmation for each data packet. When the destination receives K data packets, it will return multiple copies of one ACK for confirmation to avoid ACK packet loss. The energy consumption of each node in flat circle network applying the proposed scheme is statistical analyzed and the cases under which it is more energy efficiency than the original scheme is discussed. Moreover, how to select parameters of the scheme is addressed to extend the network lifetime under the constraint of the network reliability. In addition, the energy efficiency of the proposed schemes is evaluated. Simulation results are presented to demonstrate that a node energy consumption reduction could be gained and the network lifetime is prolonged.

  10. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  11. Artificial neural network based fault identification scheme implementation for a three-phase induction motor.

    Science.gov (United States)

    Kolla, Sri R; Altman, Shawn D

    2007-04-01

    This paper presents results from the implementation and testing of a PC based monitoring and fault identification scheme for a three-phase induction motor using artificial neural networks (ANNs). To accomplish the task, a hardware system is designed and built to acquire three-phase voltages and currents from a 1/3 HP squirrel-cage, three-phase induction motor. A software program is written to read the voltages and currents, which are first used to train a feed-forward neural network structure using the JavaNNS program. The trained network is placed in a LabVIEW based program formula node that monitors the voltages and currents online and displays the fault conditions and turns the motor off. The complete system is successfully tested in real time by creating different faults on the motor.

  12. LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Song Li

    2017-01-01

    Full Text Available From smart watch to remote healthcare system, wireless body sensor networks (WBSNs play an important role in modern healthcare system. However, the weak capacity of devices has limited WBSNs development. Considering the huge processing and storage capacity of the cloud, it can be merged with WBSNs to make up for the deficiencies of weak capacity. Based on this consideration, the concept of cloud-assisted WBSNs has been proposed recently. In contrast to generic data, the data in cloud-assisted WBSNs will be used for providing medical diagnosis, so the integrity of data is very important because any modification will result in severe consequences such as misdiagnosis. The public auditing scheme could provide an efficient solution to check the data integrity remotely without downloading them. However, the traditional public auditing scheme for cloud cannot be used directly due to the high data density and weak processing capacity in WBSNs. So, in this paper, we proposed a lightweight and efficient public auditing scheme, LEPA, for cloud-assisted WBSNs. Compared with similar schemes, the WBSNs’ client only needs to do one symmetrical encryption with low computational cost in LEPA. Security proof shows that LEPA can resist two types of adversaries in random oracle model. The efficiency evaluation also shows that LEPA outperforms previous proposals.

  13. A Novel Joint Power and Feedback Bit Allocation Interference Alignment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shibao Li

    2017-03-01

    Full Text Available It is necessary to improve the energy efficiency of batteries in wireless sensor networks (WSNs. The multiple-input multiple-output (MIMO technique has become an important means to ameliorate WSNs, and interference management is the core of improving energy efficiency. A promising approach is interference alignment (IA, which effectively reduces the interference and improves the throughput of a system in the MIMO interference channels. However, the IA scheme requires perfect channel state information (CSI at all transceivers in practice, which results in considerable feedback overhead. Thus, limited IA feedback has attracted much attention. In this paper, we analyze the throughput loss of the K-user MIMO interference channels when each transmitter delivers multiple streams in one slot, and derives the upper-bound of the system interference leakage and throughput loss. Then, to reduce the interference leakage and throughput loss for the MIMO interference alignment with limited feedback, a joint power and feedback bit allocation optimization scheme is proposed. The simulation results show that, compared with the conventional schemes, the presented optimal scheme achieves less residual interference and better performance in the system throughput.

  14. A Novel Joint Power and Feedback Bit Allocation Interference Alignment Scheme for Wireless Sensor Networks.

    Science.gov (United States)

    Li, Shibao; He, Chang; Wang, Yixin; Zhang, Yang; Liu, Jianhang; Huang, Tingpei

    2017-03-10

    It is necessary to improve the energy efficiency of batteries in wireless sensor networks (WSNs). The multiple-input multiple-output (MIMO) technique has become an important means to ameliorate WSNs, and interference management is the core of improving energy efficiency. A promising approach is interference alignment (IA), which effectively reduces the interference and improves the throughput of a system in the MIMO interference channels. However, the IA scheme requires perfect channel state information (CSI) at all transceivers in practice, which results in considerable feedback overhead. Thus, limited IA feedback has attracted much attention. In this paper, we analyze the throughput loss of the K-user MIMO interference channels when each transmitter delivers multiple streams in one slot, and derives the upper-bound of the system interference leakage and throughput loss. Then, to reduce the interference leakage and throughput loss for the MIMO interference alignment with limited feedback, a joint power and feedback bit allocation optimization scheme is proposed. The simulation results show that, compared with the conventional schemes, the presented optimal scheme achieves less residual interference and better performance in the system throughput.

  15. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  16. Reverse Auction Based Green Offloading Scheme for Small Cell Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Xiaodong Xu

    2016-01-01

    Full Text Available The small cell is treated as a promising proposition to provide hot spot capacity and higher data rates. However, even with dense small cell deployment scenario, the heavy traffic load pressure and low energy efficiency in the small cell heterogeneous network (HetNet still exist. Therefore, how to make the best use of densely deployed small cells under HetNet environments becomes the focus of researches. Offloading provides a feasible solution to promote cooperation between macrocells and small cells for user traffic supporting. In this paper, we propose the reverse auction based Green Offloading (GO scheme for energy efficiency improvements. The proposed GO scheme employs the reverse auction theory to handle the offloading decision process, aiming at maximizing the system energy efficiency under the constraints of user Quality of Service (QoS requirements, bandwidth, and transmission power limitations. Moreover, the reverse auction model gives the facility of multicell coordination transmissions with multiple winners situation. The energy efficiency optimization problem with constraints is solved by Dynamic Programming method with Karush-Kuhn-Tucker (KKT conditions. The Individual Rationality and Truthfulness of the reverse auction model are also proved. By comparing the energy efficiency performances of the proposed GO scheme with current works within the Long Term Evolution-Advanced (LTE-A system downlink scenario, simulation results show the improvements of the proposed GO scheme.

  17. An Image Compression Scheme in Wireless Multimedia Sensor Networks Based on NMF

    Directory of Open Access Journals (Sweden)

    Shikang Kong

    2017-02-01

    Full Text Available With the goal of addressing the issue of image compression in wireless multimedia sensor networks with high recovered quality and low energy consumption, an image compression and transmission scheme based on non-negative matrix factorization (NMF is proposed in this paper. First, the NMF algorithm theory is studied. Then, a collaborative mechanism of image capture, block, compression and transmission is completed. Camera nodes capture images and send them to ordinary nodes which use an NMF algorithm for image compression. Compressed images are transmitted to the station by the cluster head node and received from ordinary nodes. The station takes on the image restoration. Simulation results show that, compared with the JPEG2000 and singular value decomposition (SVD compression schemes, the proposed scheme has a higher quality of recovered images and lower total node energy consumption. It is beneficial to reduce the burden of energy consumption and prolong the life of the whole network system, which has great significance for practical applications of WMSNs.

  18. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Choi Jeonghee

    2008-01-01

    Full Text Available Abstract So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  19. An adaptive handover prediction scheme for seamless mobility based wireless networks.

    Science.gov (United States)

    Sadiq, Ali Safa; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  20. An Adaptive Handover Prediction Scheme for Seamless Mobility Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ali Safa Sadiq

    2014-01-01

    Full Text Available We propose an adaptive handover prediction (AHP scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  1. Novel scheme for efficient and cost-effective forwarding of packets in optical networks without header modification

    DEFF Research Database (Denmark)

    Wessing, Henrik; Fjelde, Tina; Christiansen, Henrik Lehrmann

    2001-01-01

    We present a novel scheme for addressing the outputs in optical packet switches and demonstrate its good scalability. The scheme requires neither header modification nor distribution of routing information to the packet switches, thus reducing optical component count while simplifying network...

  2. Controlling a pH Process Using Feedback & Double Controller Scheme

    Directory of Open Access Journals (Sweden)

    S. Shobana

    2009-09-01

    Full Text Available Control of pH, particularly, in industrial application, is difficult and challenging due to its time-varying and nonlinear nature of the chemical or biological process. This non-linearity does however suggest that pH control would be a suitable application area for a model based double-control system, whose ability to handle non-linearity is well known. The mathematical model of pH for a weak acid-strong base is used to design IMC based PID double-controller scheme which provides outstanding setpoint tracking and disturbances rejection simultaneously to control pH processes.

  3. A Review on Successive Interference Cancellation Scheme Based on Optical CDMA Network

    Science.gov (United States)

    Alsowaidi, N.; Eltaif, T.; Mokhtar, M. R.

    2014-12-01

    Due to various desirable features of optical code division multiple access (OCDMA), it is believed this technique once developed and commercially available will be an integral part of optical access networks. Optical CDMA system suffers from a problem called multiple access interference (MAI) which limits the number of active users, it occurs when number of active users share the same carriers. The aim of this paper is to review successive interference cancellation (SIC) scheme based on optical CDMA system. The paper also reviews the system performance in presence of shot noise, thermal noise, and phase-induced intensity noise (PIIN). A comprehensive review on the mathematical model of SIC scheme using direct detection (DS) and spectral amplitude coding (SAC) were presented in this article.

  4. An Energy-Efficient Scheme for Multirelay Cooperative Networks with Energy Harvesting

    Directory of Open Access Journals (Sweden)

    Dingcheng Yang

    2016-01-01

    Full Text Available This study investigates an energy-efficient scheme in multirelay cooperative networks with energy harvesting where multiple sessions need to communicate with each other via the relay node. A two-step optimal method is proposed which maximizes the system energy efficiency, while taking into account the receiver circuit energy consumption. Firstly, the optimal power allocation for relay nodes is determined to maximize the system throughput; this is based on directional water-filling algorithm. Secondly, using quantum particle swarm optimization (QPSO, a joint relay node selection and session grouping optimization is proposed. With this algorithm, sessions can be classified into multiple groups that are assisted by the specific relay node with the maximum energy efficiency. This approach leads to a better global optimization in searching ability and efficiency. Simulation results show that the proposed scheme can improve the energy efficiency effectively compared with direct transmission and opportunistic relay-selected cooperative transmission.

  5. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  6. Protection switching schemes of multi-granularity p-cycles in survivable WDM networks

    Science.gov (United States)

    Zhu, Guolong; Zeng, Qingji; Ye, Tong; Yang, Junjie

    2004-09-01

    In this paper, a novel concept of multi-granularity p-cycle is proposed. In conventional p-cycle concept, all on-cycle spans have the same capacity. However, in multi-granularity p-cycle, each on-cycle span could have different capacity. Results show that multi-granularity p-cycles are much more capacity-efficient and cost-effective than conventional p-cycles. We also propose two protection switching schemes for all types of p-cycle networks. One is wrapping protection, in which only two end nodes do real-time switching when a span failure happens. The other is steering protection, in which at most four nodes do real-time switching when a span fails. In steering protection switching scheme, the restoration path for the failure traffic demand has the least hops.

  7. Enhancing deep convolutional neural network scheme for breast cancer diagnosis with unlabeled data.

    Science.gov (United States)

    Sun, Wenqing; Tseng, Tzu-Liang Bill; Zhang, Jianying; Qian, Wei

    2017-04-01

    In this study we developed a graph based semi-supervised learning (SSL) scheme using deep convolutional neural network (CNN) for breast cancer diagnosis. CNN usually needs a large amount of labeled data for training and fine tuning the parameters, and our proposed scheme only requires a small portion of labeled data in training set. Four modules were included in the diagnosis system: data weighing, feature selection, dividing co-training data labeling, and CNN. 3158 region of interests (ROIs) with each containing a mass extracted from 1874 pairs of mammogram images were used for this study. Among them 100 ROIs were treated as labeled data while the rest were treated as unlabeled. The area under the curve (AUC) observed in our study was 0.8818, and the accuracy of CNN is 0.8243 using the mixed labeled and unlabeled data. Copyright © 2016. Published by Elsevier Ltd.

  8. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  9. A Nanotechnology-Ready Computing Scheme based on a Weakly Coupled Oscillator Network

    Science.gov (United States)

    Vodenicarevic, Damir; Locatelli, Nicolas; Abreu Araujo, Flavio; Grollier, Julie; Querlioz, Damien

    2017-03-01

    With conventional transistor technologies reaching their limits, alternative computing schemes based on novel technologies are currently gaining considerable interest. Notably, promising computing approaches have proposed to leverage the complex dynamics emerging in networks of coupled oscillators based on nanotechnologies. The physical implementation of such architectures remains a true challenge, however, as most proposed ideas are not robust to nanotechnology devices’ non-idealities. In this work, we propose and investigate the implementation of an oscillator-based architecture, which can be used to carry out pattern recognition tasks, and which is tailored to the specificities of nanotechnologies. This scheme relies on a weak coupling between oscillators, and does not require a fine tuning of the coupling values. After evaluating its reliability under the severe constraints associated to nanotechnologies, we explore the scalability of such an architecture, suggesting its potential to realize pattern recognition tasks using limited resources. We show that it is robust to issues like noise, variability and oscillator non-linearity. Defining network optimization design rules, we show that nano-oscillator networks could be used for efficient cognitive processing.

  10. Performance evaluation of time-delay control schemes for uninterruptible power supplies

    DEFF Research Database (Denmark)

    Loh, P.C; Tang, Y.; Blaabjerg, Frede

    2008-01-01

    transitions. Even more favorable is that the above-described performance features are attained under all load-operating conditions and at the same level of implementation easiness as for the traditional double-loop control scheme. Lastly, for verifying the practicality of the control schemes, an experimental...

  11. Wavelength-Converter Saving Span Restoration in GMPLS Controlled WDM Optical Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Buron, Jakob Due; Andriolli, N.

    2006-01-01

    We present two label preference schemes to reduce wavelength-conversion during restoration path setup in GMPLS controlled optical networks exploiting span restoration. The amount of required wavelength-conversions can be reduced up to 34 percent....

  12. PI controller scheme for charge balance in implantable electrical ...

    Indian Academy of Sciences (India)

    Electrical stimulation has been used in a wide variety of medical implant applications. In all of these applications, due to safety concerns, maintaining charge balance becomes a critically important issue that needs to be addressed at the design stage. It is important that charge balancing schemes be robust to circuit ...

  13. A simple output voltage control scheme for single phase wavelet ...

    African Journals Online (AJOL)

    DR OKE

    Wavelet based techniques have been extensively used in various power engineering applications. Recently, wavelet has also been proposed to generate switching signal for single-phase pulse-width-modulated (PWM) dc-ac inverter. The main advantage of the wavelet modulated (WM) scheme is that a single synthesis ...

  14. On-board congestion control for satellite packet switching networks

    Science.gov (United States)

    Chu, Pong P.

    1991-01-01

    It is desirable to incorporate packet switching capability on-board for future communication satellites. Because of the statistical nature of packet communication, incoming traffic fluctuates and may cause congestion. Thus, it is necessary to incorporate a congestion control mechanism as part of the on-board processing to smooth and regulate the bursty traffic. Although there are extensive studies on congestion control for both baseband and broadband terrestrial networks, these schemes are not feasible for space based switching networks because of the unique characteristics of satellite link. Here, we propose a new congestion control method for on-board satellite packet switching. This scheme takes into consideration the long propagation delay in satellite link and takes advantage of the the satellite's broadcasting capability. It divides the control between the ground terminals and satellite, but distributes the primary responsibility to ground terminals and only requires minimal hardware resource on-board satellite.

  15. Different-Level Simultaneous Minimization Scheme for Fault Tolerance of Redundant Manipulator Aided with Discrete-Time Recurrent Neural Network

    Directory of Open Access Journals (Sweden)

    Long Jin

    2017-09-01

    Full Text Available By incorporating the physical constraints in joint space, a different-level simultaneous minimization scheme, which takes both the robot kinematics and robot dynamics into account, is presented and investigated for fault-tolerant motion planning of redundant manipulator in this paper. The scheme is reformulated as a quadratic program (QP with equality and bound constraints, which is then solved by a discrete-time recurrent neural network. Simulative verifications based on a six-link planar redundant robot manipulator substantiate the efficacy and accuracy of the presented acceleration fault-tolerant scheme, the resultant QP and the corresponding discrete-time recurrent neural network.

  16. Different-Level Simultaneous Minimization Scheme for Fault Tolerance of Redundant Manipulator Aided with Discrete-Time Recurrent Neural Network.

    Science.gov (United States)

    Jin, Long; Liao, Bolin; Liu, Mei; Xiao, Lin; Guo, Dongsheng; Yan, Xiaogang

    2017-01-01

    By incorporating the physical constraints in joint space, a different-level simultaneous minimization scheme, which takes both the robot kinematics and robot dynamics into account, is presented and investigated for fault-tolerant motion planning of redundant manipulator in this paper. The scheme is reformulated as a quadratic program (QP) with equality and bound constraints, which is then solved by a discrete-time recurrent neural network. Simulative verifications based on a six-link planar redundant robot manipulator substantiate the efficacy and accuracy of the presented acceleration fault-tolerant scheme, the resultant QP and the corresponding discrete-time recurrent neural network.

  17. Controlling a pH Process Using Feedback & Double Controller Scheme

    OpenAIRE

    S.Shobana; Srinivasan, A.; Rames C.Panda

    2009-01-01

    Control of pH, particularly, in industrial application, is difficult and challenging due to its time-varying and nonlinear nature of the chemical or biological process. This non-linearity does however suggest that pH control would be a suitable application area for a model based double-control system, whose ability to handle non-linearity is well known. The mathematical model of pH for a weak acid-strong base is used to design IMC based PID double-controller scheme which provides outstanding ...

  18. Cooperative Access Schemes for Efficient SWIPT Transmissions in Cognitive Radio Networks

    OpenAIRE

    Shafie, Ahmed El; Al-Dhahir, Naofal; Hamila, Ridha

    2016-01-01

    We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time slot to the secondary nodes to send their data and to power the energy-harvesting primary transmitt...

  19. Network Regulation and Support Schemes - How Policy Interactions Affect the Integration of Distributed Generation

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Jacobsen, Henrik; Schröder, Sascha Thorsten

    2011-01-01

    This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect distributed generation. Firstly, the incentives of distributed generators and distribution system operators are examined. Frequently there exists a trade......-off between the incentives for these two market agents to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based on five EU Member States. Aspects of operational nature and investments in grid and distributed...... generation facilities are covered. The question in which policy segment to incorporate locational signals is at the heart of the debate...

  20. Hybrid ARQ Scheme with Autonomous Retransmission for Multicasting in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Young-Ho; Choi, Jihoon

    2017-02-25

    A new hybrid automatic repeat request (HARQ) scheme for multicast service for wireless sensor networks is proposed in this study. In the proposed algorithm, the HARQ operation is combined with an autonomous retransmission method that ensure a data packet is transmitted irrespective of whether or not the packet is successfully decoded at the receivers. The optimal number of autonomous retransmissions is determined to ensure maximum spectral efficiency, and a practical method that adjusts the number of autonomous retransmissions for realistic conditions is developed. Simulation results show that the proposed method achieves higher spectral efficiency than existing HARQ techniques.

  1. Extended neural network-based scheme for real-time force tracking with magnetorheological dampers

    DEFF Research Database (Denmark)

    Weber, Felix; Bhowmik, Subrata; Høgsberg, Jan Becker

    2014-01-01

    This paper validates numerically and experimentally a new neural network-based real-time force tracking scheme for magnetorheological (MR) dampers on a five-storey shear frame with MR damper. The inverse model is trained with absolute values of measured velocity and force because the targeted...... current is a positive quantity. The validation shows accurate results except of small current spikes when the desired force is in the vicinity of the residual MR damper force. In the closed-loop, higher frequency components in the current are triggered by the transition of the actual MR damper force from...

  2. Blocking Reduction of Span Restoration Requests in GMPLS Controlled WDM Optical Networks

    DEFF Research Database (Denmark)

    Buron, Jakob Due; Ruepp, Sarah Renée; Andriolli, N.

    2006-01-01

    The proposed label preference scheme reduces blocking of span restoration requests in GMPLS optical networks with limited wavelength conversion. By minimizing resource contention and conversion usage, it increases recovery percentage and reduces control plane load.......The proposed label preference scheme reduces blocking of span restoration requests in GMPLS optical networks with limited wavelength conversion. By minimizing resource contention and conversion usage, it increases recovery percentage and reduces control plane load....

  3. Universal block diagram based modeling and simulation schemes for fractional-order control systems.

    Science.gov (United States)

    Bai, Lu; Xue, Dingyü

    2017-05-08

    Universal block diagram based schemes are proposed for modeling and simulating the fractional-order control systems in this paper. A fractional operator block in Simulink is designed to evaluate the fractional-order derivative and integral. Based on the block, the fractional-order control systems with zero initial conditions can be modeled conveniently. For modeling the system with nonzero initial conditions, the auxiliary signal is constructed in the compensation scheme. Since the compensation scheme is very complicated, therefore the integrator chain scheme is further proposed to simplify the modeling procedures. The accuracy and effectiveness of the schemes are assessed in the examples, the computation results testify the block diagram scheme is efficient for all Caputo fractional-order ordinary differential equations (FODEs) of any complexity, including the implicit Caputo FODEs. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  4. Controlling self-organized criticality in complex networks

    CERN Document Server

    Cajueiro, Daniel O

    2013-01-01

    A control scheme to reduce the size of avalanches of the Bak-Tang-Wiesenfeld model on complex networks is proposed. Three network types are considered: those proposed by Erd\\H{o}s-Renyi, Goh-Kahng-Kim, and a real network representing the main connections of the electrical power grid of the western United States. The control scheme is based on the idea of triggering avalanches in the highest degree nodes that are near to become critical. We show that this strategy works in the sense that the dissipation of mass occurs most locally avoiding larger avalanches. We also compare this strategy with a random strategy where the nodes are chosen randomly. Although the random control has some ability to reduce the probability of large avalanches, its performance is much worse than the one based on the choice of the highest degree nodes. Finally, we argue that the ability of the proposed control scheme is related to its ability to reduce the concentration of mass on the network.

  5. Neural Network Predictive Control for Vanadium Redox Flow Battery

    Directory of Open Access Journals (Sweden)

    Hai-Feng Shen

    2013-01-01

    Full Text Available The vanadium redox flow battery (VRB is a nonlinear system with unknown dynamics and disturbances. The flowrate of the electrolyte is an important control mechanism in the operation of a VRB system. Too low or too high flowrate is unfavorable for the safety and performance of VRB. This paper presents a neural network predictive control scheme to enhance the overall performance of the battery. A radial basis function (RBF network is employed to approximate the dynamics of the VRB system. The genetic algorithm (GA is used to obtain the optimum initial values of the RBF network parameters. The gradient descent algorithm is used to optimize the objective function of the predictive controller. Compared with the constant flowrate, the simulation results show that the flowrate optimized by neural network predictive controller can increase the power delivered by the battery during the discharge and decrease the power consumed during the charge.

  6. Low-complexity full-rate transmission scheme with full diversity for two-path relay networks

    KAUST Repository

    Fareed, Muhammad Mehboob

    2015-04-01

    Existing full-rate transmission schemes for two-path relay networks typically cannot achieve full diversity while demanding high decoding complexity. In this paper, we present a novel low-complexity full-rate transmission scheme for two-path relay networks to harvest maximum achievable diversity. The proposed scheme adopts block transmission with small block size of four symbols, which greatly reduces the decoding complexity at the receiver. Through the performance analysis of the resulting two-path relay network in terms of the symbol error rate (SER) and diversity order, we show the proposed scheme can achieve full diversity order of four and mimic a 2 \\\\times 2 multiple-input multiple-output system. Simulations results are provided to validate the mathematical formulation. © 1967-2012 IEEE.

  7. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  8. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    Science.gov (United States)

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  9. Dynamic Network Security Control Using Software Defined Networking

    Science.gov (United States)

    2016-03-24

    not subject to copyright protection in the United States. AFIT-ENG-MS-16-M-049 DYNAMIC NETWORK SECURITY CONTROL USING SOFTWARE DEFINED NETWORKING... software and tools vetted by industry leaders in networking and security. After considering the technologies previously discussed, the four components...DYNAMIC NETWORK SECURITY CONTROL USING SOFTWARE DEFINED NETWORKING THESIS Michael C. Todd, Captain, USAF AFIT-ENG-MS-16-M-049 DEPARTMENT OF THE AIR

  10. An Effective and Robust Decentralized Target Tracking Scheme in Wireless Camera Sensor Networks.

    Science.gov (United States)

    Fu, Pengcheng; Cheng, Yongbo; Tang, Hongying; Li, Baoqing; Pei, Jun; Yuan, Xiaobing

    2017-03-20

    In this paper, we propose an effective and robust decentralized tracking scheme based on the square root cubature information filter (SRCIF) to balance the energy consumption and tracking accuracy in wireless camera sensor networks (WCNs). More specifically, regarding the characteristics and constraints of camera nodes in WCNs, some special mechanisms are put forward and integrated in this tracking scheme. First, a decentralized tracking approach is adopted so that the tracking can be implemented energy-efficiently and steadily. Subsequently, task cluster nodes are dynamically selected by adopting a greedy on-line decision approach based on the defined contribution decision (CD) considering the limited energy of camera nodes. Additionally, we design an efficient cluster head (CH) selection mechanism that casts such selection problem as an optimization problem based on the remaining energy and distance-to-target. Finally, we also perform analysis on the target detection probability when selecting the task cluster nodes and their CH, owing to the directional sensing and observation limitations in field of view (FOV) of camera nodes in WCNs. From simulation results, the proposed tracking scheme shows an obvious improvement in balancing the energy consumption and tracking accuracy over the existing methods.

  11. An Effective and Robust Decentralized Target Tracking Scheme in Wireless Camera Sensor Networks

    Science.gov (United States)

    Fu, Pengcheng; Cheng, Yongbo; Tang, Hongying; Li, Baoqing; Pei, Jun; Yuan, Xiaobing

    2017-01-01

    In this paper, we propose an effective and robust decentralized tracking scheme based on the square root cubature information filter (SRCIF) to balance the energy consumption and tracking accuracy in wireless camera sensor networks (WCNs). More specifically, regarding the characteristics and constraints of camera nodes in WCNs, some special mechanisms are put forward and integrated in this tracking scheme. First, a decentralized tracking approach is adopted so that the tracking can be implemented energy-efficiently and steadily. Subsequently, task cluster nodes are dynamically selected by adopting a greedy on-line decision approach based on the defined contribution decision (CD) considering the limited energy of camera nodes. Additionally, we design an efficient cluster head (CH) selection mechanism that casts such selection problem as an optimization problem based on the remaining energy and distance-to-target. Finally, we also perform analysis on the target detection probability when selecting the task cluster nodes and their CH, owing to the directional sensing and observation limitations in field of view (FOV) of camera nodes in WCNs. From simulation results, the proposed tracking scheme shows an obvious improvement in balancing the energy consumption and tracking accuracy over the existing methods. PMID:28335537

  12. Spectral coarse grained controllability of complex networks

    Science.gov (United States)

    Wang, Pei; Xu, Shuang

    2017-07-01

    With the accumulation of interaction data from various systems, a fundamental question in network science is how to reduce the sizes while keeping certain properties of complex networks. Combined the spectral coarse graining theory and the structural controllability of complex networks, we explore the structural controllability of undirected complex networks during coarse graining processes. We evidence that the spectral coarse grained controllability (SCGC) properties for the Erdös-Rényi (ER) random networks, the scale-free (SF) random networks and the small-world (SW) random networks are distinct from each other. The SW networks are very robust, while the SF networks are sensitive during the coarse graining processes. As an emergent properties for the dense ER networks, during the coarse graining processes, there exists a threshold value of the coarse grained sizes, which separates the controllability of the reduced networks into robust and sensitive to coarse graining. Investigations on some real-world complex networks indicate that the SCGC properties are varied among different categories and different kinds of networks, some highly organized social or biological networks are more difficult to be controlled, while many man-made power networks and infrastructure networks can keep the controllability properties during the coarse graining processes. Furthermore, we speculate that the SCGC properties of complex networks may depend on their degree distributions. The associated investigations have potential implications in the control of large-scale complex networks, as well as in the understanding of the organization of complex networks.

  13. Virtualized Network Control. Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-02-01

    This document is the final report for the Virtualized Network Control (VNC) project, which was funded by the United States Department of Energy (DOE) Office of Science. This project was also informally referred to as Advanced Resource Computation for Hybrid Service and TOpology NEtworks (ARCHSTONE). This report provides a summary of the project's activities, tasks, deliverable, and accomplishments. It also provides a summary of the documents, software, and presentations generated as part of this projects activities. Namely, the Appendix contains an archive of the deliverables, documents, and presentations generated a part of this project.

  14. Green Frame Aggregation Scheme for IEEE 802.11n Networks

    KAUST Repository

    Alaslani, Maha S.

    2015-04-01

    Frame aggregation is one of the major MAC layer enhancements in the IEEE 802.11 family that boosts the network throughput performance. It aims to achieve higher throughput by transmitting huge amount of data in a single transmit oppor- tunity. With the increasing awareness of energy e ciency, it has become vital to rethink about the design of such frame aggregation protocol. Aggregation techniques help to reduce energy consumption over ideal channel conditions. However, in a noisy channel environment, a new energy-aware frame aggregation scheme is required. In this thesis, a novel Green Frame Aggregation (GFA) scheduling scheme has been proposed and evaluated. GFA optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects the optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel situations. The design, the implementation, and evaluation of GFA using testbed deployment is done. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy e ciency by about 6⇥ in the presence of severe interference conditions. Moreover, GFA also outperforms the static frame sizing method in terms of network goodput and maintains almost the same end- to-end latency.

  15. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  16. Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks

    KAUST Repository

    Daghistani, Anas H.

    2013-05-15

    Power management is an active area of research in wireless sensor networks (WSNs). Efficient power management is necessary because WSNs are battery-operated devices that can be deployed in mission-critical applications. From the communications perspective, one main approach to reduce energy is to maximize throughput so the data can be transmitted in a short amount of time. Frame fragmentation techniques aim to achieve higher throughput by reducing retransmissions. Using experiments on a WSN testbed, we show that frame fragmentation helps to reduce energy consumption. We then study and compare recent frame fragmentation schemes to find the most energy-efficient scheme. Our main contribution is to propose a new frame fragmentation scheme that is optimized to be energy efficient, which is originated from the chosen frame fragmentation scheme. This new energy-efficient frame fragmentation protocol is called (Green-Frag). Green-Frag uses an algorithm that gives sensor nodes the ability to transmit data with optimal transmit power and optimal frame structure based on environmental conditions. Green-Frag takes into consideration the channel conditions, interference patterns and level, as well as the distance between sender and receiver. The thesis discusses various design and implementation considerations for Green-Frag. Also, it shows empirical results of comparing Green-Frag with other frame fragmentation protocols in terms of energy efficiency. Green-Frag performance results shows that it is capable of choosing the best transmit according to the channel conditions. Subsequently, Green-Frag achieves the least energy consumption in all environmental conditions.

  17. Adaptive pinning control of deteriorated nonlinear coupling networks with circuit realization.

    Science.gov (United States)

    Jin, Xiao-Zheng; Yang, Guang-Hong; Che, Wei-Wei

    2012-09-01

    This paper deals with a class of complex networks with nonideal coupling networks, and addresses the problem of asymptotic synchronization of the complex network through designing adaptive pinning control and coupling adjustment strategies. A more general coupled nonlinearity is considered as perturbations of the network, while a serious faulty network named deteriorated network is also proposed to be further study. For the sake of eliminating these adverse impacts for synchronization, indirect adaptive schemes are designed to construct controllers and adjusters on pinned nodes and nonuniform couplings of un-pinned nodes, respectively. According to Lyapunov stability theory, the proposed adaptive strategies are successful in ensuring the achievement of asymptotic synchronization of the complex network even in the presence of perturbed and deteriorated networks. The proposed schemes are physically implemented by circuitries and tested by simulation on a Chua's circuit network.

  18. Group Authentication Scheme for Neighbourhood Area Networks (NANs in Smart Grids

    Directory of Open Access Journals (Sweden)

    Bashar Alohali

    2016-05-01

    Full Text Available A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM with the ESP. The SM is a dual interface, wireless communication device through which information is transacted across the user (a home and ESP domains. The security risk to the ESP increases since the components within the home, interconnected to the ESP via the SM, are not managed by the ESP. Secure operation of the SM is a necessary requirement. The SM should be resilient to attacks, which might be targeted either directly or via the network in the home. This paper presents and discusses a security scheme for groups of SMs in a Neighbourhood Area Network that enable entire groups to authenticate themselves, rather than one at a time. The results show that a significant improvement in terms of resilience against node capture attacks, replay attacks, confidentiality, authentication for groups of SMs in a NAN that enable entire groups to authenticate themselves, rather than one at a time.

  19. Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network

    Directory of Open Access Journals (Sweden)

    G. Kannan

    2015-07-01

    Full Text Available Wireless Sensor Network (WSN provides a significant contribution in the emerging fields such as ambient intelligence and ubiquitous computing. In WSN, optimization and load balancing of network resources are critical concern to provide the intelligence for long duration. Since clustering the sensor nodes can significantly enhance overall system scalability and energy efficiency this paper presents a distributed cluster head scheduling (DCHS algorithm to achieve the network longevity in WSN. The major novelty of this work is that the network is divided into primary and secondary tiers based on received signal strength indication of sensor nodes from the base station. The proposed DCHS supports for two tier WSN architecture and gives suggestion to elect the cluster head nodes and gateway nodes for both primary and secondary tiers. The DCHS mechanism satisfies an ideal distribution of the cluster head among the sensor nodes and avoids frequent selection of cluster head, based on Received Signal Strength Indication (RSSI and residual energy level of the sensor nodes. Since the RSSI is the key parameter for this paper, the practical experiment was conducted to measure RSSI value by using MSP430F149 processor and CC2500 transceiver. The measured RSSI values were given input to the event based simulator to test the DCHS mechanism. The real time experimental study validated the proposed scheme for various scenarios.

  20. A cloud-based forensics tracking scheme for online social network clients.

    Science.gov (United States)

    Lin, Feng-Yu; Huang, Chien-Cheng; Chang, Pei-Ying

    2015-10-01

    In recent years, with significant changes in the communication modes, most users are diverted to cloud-based applications, especially online social networks (OSNs), which applications are mostly hosted on the outside and available to criminals, enabling them to impede criminal investigations and intelligence gathering. In the virtual world, how the Law Enforcement Agency (LEA) identifies the "actual" identity of criminal suspects, and their geolocation in social networks, is a major challenge to current digital investigation. In view of this, this paper proposes a scheme, based on the concepts of IP location and network forensics, which aims to develop forensics tracking on OSNs. According to our empirical analysis, the proposed mechanism can instantly trace the "physical location" of a targeted service resource identifier (SRI), when the target client is using online social network applications (Facebook, Twitter, etc.), and can analyze the probable target client "identity" associatively. To the best of our knowledge, this is the first individualized location method and architecture developed and evaluated in OSNs. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  1. Two hybrid ARQ error control schemes for near Earth satellite communications

    Science.gov (United States)

    Lin, S.

    1986-01-01

    Two hybrid Automatic Repeat Request (ARQ) error control schemes are proposed for NASA near Earth satellite communications. Both schemes are adaptive in nature, and employ cascaded codes to achieve both high reliability and throughput efficiency for high data rate file transfer.

  2. Design and Simulation of a Distributed Control Scheme for Inter-Destination Media Synchronization

    NARCIS (Netherlands)

    Montagud, M.; Boronat, F.; Stokking, H.M.

    2013-01-01

    Inter-Destination Multimedia Synchronization (IDMS) is a key requirement to enable satisfying group shared media experiences. This paper presents the design and simulation of a Distributed Control Scheme (DCS) for IDMS. In this scheme, geographically dispersed receivers exchange (multicast) RTCP

  3. Controllability of the better chosen partial networks

    Science.gov (United States)

    Liu, Xueming; Pan, Linqiang

    2016-08-01

    How to control large complex networks is a great challenge. Recent studies have proved that the whole network can be sufficiently steered by injecting control signals into a minimum set of driver nodes, and the minimum numbers of driver nodes for many real networks are high, indicating that it is difficult to control them. For some large natural and technological networks, it is impossible and not feasible to control the full network. For example, in biological networks like large-scale gene regulatory networks it is impossible to control all the genes. This prompts us to explore the question how to choose partial networks that are easy for controlling and important in networked systems. In this work, we propose a method to achieve this goal. By computing the minimum driver nodes densities of the partial networks of Erdös-Rényi (ER) networks, scale-free (SF) networks and 23 real networks, we find that our method performs better than random method that chooses nodes randomly. Moreover, we find that the nodes chosen by our method tend to be the essential elements of the whole systems, via studying the nodes chosen by our method of a real human signaling network and a human protein interaction network and discovering that the chosen nodes from these networks tend to be cancer-associated genes. The implementation of our method shows some interesting connections between the structure and the controllability of networks, improving our understanding of the control principles of complex systems.

  4. Integration of Fault Detection and Isolation with Control Using Neuro-fuzzy Scheme

    Directory of Open Access Journals (Sweden)

    A. Asokan

    2009-10-01

    Full Text Available In this paper an algorithms is developed for fault diagnosis and fault tolerant control strategy for nonlinear systems subjected to an unknown time-varying fault. At first, the design of fault diagnosis scheme is performed using model based fault detection technique. The neuro-fuzzy chi-square scheme is applied for fault detection and isolation. The fault magnitude and time of occurrence of fault is obtained through neuro-fuzzy chi-square scheme. The estimated magnitude of the fault magnitude is normalized and used by the feed-forward control algorithm to make appropriate changes in the manipulated variable to keep the controlled variable near its set value. The feed-forward controller acts along with feed-back controller to control the multivariable system. The performance of the proposed scheme is applied to a three- tank process for various types of fault inputs to show the effectiveness of the proposed approach.

  5. Adaptive Reference Control for Pressure Management in Water Networks

    DEFF Research Database (Denmark)

    Kallesøe, Carsten; Jensen, Tom Nørgaard; Wisniewski, Rafal

    2015-01-01

    Water scarcity is an increasing problem worldwide and at the same time a huge amount of water is lost through leakages in the distribution network. It is well known that improved pressure control can lower the leakage problems. In this work water networks with a single pressure actuator and several....... Subsequently, these relations are exploited in an adaptive reference control scheme for the actuator pressure that ensures constant pressure at the critical points. Numerical experiments underpin the results. © Copyright IEEE - All rights reserved....

  6. Wireless Network Control with Privacy Using Hybrid ARQ

    CERN Document Server

    Sarikaya, Yunus; Koksal, Emre C

    2012-01-01

    We consider the problem of resource allocation in a wireless cellular network, in which nodes have both open and private information to be transmitted to the base station over block fading uplink channels. We develop a cross-layer solution, based on hybrid ARQ transmission with incremental redundancy. We provide a scheme that combines power control, flow control, and scheduling in order to maximize a global utility function, subject to the stability of the data queues, an average power constraint, and a constraint on the privacy outage probability. Our scheme is based on the assumption that each node has an estimate of its uplink channel gain at each block, while only the distribution of the cross channel gains is available. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility given the available channel state information.

  7. Observerless Scheme for Sensorless Speed Control of PMSM Using Direct Torque Control Method With LP Filter

    Directory of Open Access Journals (Sweden)

    BEKIROGLU, N.

    2010-08-01

    Full Text Available In this study, direct torque control (DTC of a permanent magnet synchronous motor is realized with a sensorless speed control technique without using an observer. Space vector pulse width modulation (SVPWM technique is applied in order to determine the switching sequence of the voltage source inverter. Torque and flux, the main variables of the DTC, are estimated by using the mathematical model of the motor. Estimated torque and flux values are compared with their references in every control cycle. Then, according to the torque and flux demand, the voltage vector is constituted. In the proposed control scheme, speed is estimated by using flux calculations and a PI controller is used to process the torque and flux errors. Furthermore, a low-pass (LP filter is implemented within the proposed system for voltage and current harmonics suppression. The results proved that proposed scheme for the DTC provides the speed control under various torque demands without employing a sensor. The proposed system performs very well for a sensorless operation and effectively eliminates the harmonics due to the LP filter.

  8. Robustness of network controllability in cascading failure

    Science.gov (United States)

    Chen, Shi-Ming; Xu, Yun-Fei; Nie, Sen

    2017-04-01

    It is demonstrated that controlling complex networks in practice needs more inputs than that predicted by the structural controllability framework. Besides, considering the networks usually faces to the external or internal failure, we define parameters to evaluate the control cost and the variation of controllability after cascades, exploring the effect of number of control inputs on the controllability for random networks and scale-free networks in the process of cascading failure. For different topological networks, the results show that the robustness of controllability will be stronger through allocating different control inputs and edge capacity.

  9. A Scalable QoS-Aware VoD Resource Sharing Scheme for Next Generation Networks

    Science.gov (United States)

    Huang, Chenn-Jung; Luo, Yun-Cheng; Chen, Chun-Hua; Hu, Kai-Wen

    In network-aware concept, applications are aware of network conditions and are adaptable to the varying environment to achieve acceptable and predictable performance. In this work, a solution for video on demand service that integrates wireless and wired networks by using the network aware concepts is proposed to reduce the blocking probability and dropping probability of mobile requests. Fuzzy logic inference system is employed to select appropriate cache relay nodes to cache published video streams and distribute them to different peers through service oriented architecture (SOA). SIP-based control protocol and IMS standard are adopted to ensure the possibility of heterogeneous communication and provide a framework for delivering real-time multimedia services over an IP-based network to ensure interoperability, roaming, and end-to-end session management. The experimental results demonstrate that effectiveness and practicability of the proposed work.

  10. Congestion control in satellite networks

    Science.gov (United States)

    Byun, Do Jun

    Due to exponential increases in internet traffic, Active Queue Management (AQM) has been heavily studied by numerous researchers. However, little is known about AQM in satellite networks. A microscopic examination of queueing behavior in satellite networks is conducted to identify problems with applying existing AQM methods. A new AQM method is proposed to overcome the problems and it is validated using a realistic emulation environment and a mathematical model. Three problems that were discovered during the research are discussed in this dissertation. The first problem is oscillatory queueing, which is caused by high buffering due to Performance Enhancing Proxy (PEP) in satellite networks where congestion control after the PEP buffering does not effectively control traffic senders. Existing AQMs that can solve this problem have tail drop queueing that results in consecutive packet drops (global synchronization). A new AQM method called Adaptive Virtual Queue Random Early Detection (AVQRED) is proposed to solve this problem. The second problem is unfair bandwidth sharing caused by inaccurate measurements of per-flow bandwidth usage. AVQRED is enhanced to accurately measure per-flow bandwidth usage to solve this problem without adding much complexity to the algorithm. The third problem is queueing instability caused by buffer flow control where TCP receive windows are adjusted to flow control traffic senders instead of dropping received packets during congestion. Although buffer flow control is quite attractive to satellite networks, queueing becomes unstable because accepting packets instead of dropping them aggravates the congestion level. Furthermore, buffer flow control has abrupt reductions in the TCP receive window size due to high PEP buffering causing more instability. AVQRED with packet drop is proposed to solve this problem. Networks with scarce bandwidth and high propagation delays can not afford to have an unstable AQM. In this research, three problems

  11. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  12. Improving SCTP Performance by Jitter-Based Congestion Control over Wired-Wireless Networks

    Directory of Open Access Journals (Sweden)

    Chen Jyh-Ming

    2011-01-01

    Full Text Available With the advances of wireless communication technologies, wireless networks gradually become the most adopted communication networks in the new generation Internet. Computing devices and mobile devices may be equipped with multiple wired and/or wireless network interfaces. Stream Control Transmission Protocol (SCTP has been proposed for reliable data transport and its multihoming feature makes use of network interfaces effectively to improve performance and reliability. However, like TCP, SCTP suffers unnecessary performance degradation over wired-wireless heterogeneous networks. The main reason is that the original congestion control scheme of SCTP cannot differentiate loss events so that SCTP reduces the congestion window inappropriately. In order to solve this problem and improve performance, we propose a jitter-based congestion control scheme with end-to-end semantics over wired-wireless networks. Besides, we solved ineffective jitter ratio problem which may cause original jitter-based congestion control scheme to misjudge congestion loss as wireless loss. Available bandwidth estimation scheme will be integrated into our congestion control mechanism to make the bottleneck more stabilized. Simulation experiments reveal that our scheme (JSCTP gives prominence to improve performance effectively over wired-wireless networks.

  13. Regulation control and energy management scheme for wireless power transfer

    Science.gov (United States)

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  14. Hopf Bifurcation Control in a FAST TCP and RED Model via Multiple Control Schemes

    Directory of Open Access Journals (Sweden)

    Dawei Ding

    2016-01-01

    Full Text Available We focus on the Hopf bifurcation control problem of a FAST TCP model with RED gateway. The system gain parameter is chosen as the bifurcation parameter, and the stable region and stability condition of the congestion control model are given by use of the linear stability analysis. When the system gain passes through a critical value, the system loses the stability and Hopf bifurcation occurs. Considering the negative influence caused by Hopf bifurcation, we apply state feedback controller, hybrid controller, and time-delay feedback controller to postpone the onset of undesirable Hopf bifurcation. Numerical simulations show that the hybrid controller is the most sensitive method to delay the Hopf bifurcation with identical parameter conditions. However, nonlinear state feedback control and time-delay feedback control schemes have larger control parameter range in the Internet congestion control system with FAST TCP and RED gateway. Therefore, we can choose proper control method based on practical situation including unknown conditions or parameter requirements. This paper plays an important role in setting guiding system parameters for controlling the FAST TCP and RED model.

  15. Opinion control in complex networks

    Science.gov (United States)

    Masuda, Naoki

    2015-03-01

    In many political elections, the electorate appears to be a composite of partisan and independent voters. Given that partisans are not likely to convert to a different party, an important goal for a political party could be to mobilize independent voters toward the party with the help of strong leadership, mass media, partisans, and the effects of peer-to-peer influence. Based on the exact solution of classical voter model dynamics in the presence of perfectly partisan voters (i.e., zealots), we propose a computational method that uses pinning control strategy to maximize the share of a party in a social network of independent voters. The party, corresponding to the controller or zealots, optimizes the nodes to be controlled given the information about the connectivity of independent voters and the set of nodes that the opposing party controls. We show that controlling hubs is generally a good strategy, but the optimized strategy is even better. The superiority of the optimized strategy is particularly eminent when the independent voters are connected as directed (rather than undirected) networks.

  16. Flexible Tube-Based Network Control Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Innovation Laboratory, Inc. builds a control system which controls the topology of an air traffic flow network and the network flow properties which enables Air...

  17. Controllability of flow-conservation networks

    Science.gov (United States)

    Zhao, Chen; Zeng, An; Jiang, Rui; Yuan, Zhengzhong; Wang, Wen-Xu

    2017-07-01

    The ultimate goal of exploring complex networks is to control them. As such, controllability of complex networks has been intensively investigated. Despite recent advances in studying the impact of a network's topology on its controllability, a comprehensive understanding of the synergistic impact of network topology and dynamics on controllability is still lacking. Here, we explore the controllability of flow-conservation networks, trying to identify the minimal number of driver nodes that can guide the network to any desirable state. We develop a method to analyze the controllability on flow-conservation networks based on exact controllability theory, transforming the original analysis on adjacency matrix to Laplacian matrix. With this framework, we systematically investigate the impact of some key factors of networks, including link density, link directionality, and link polarity, on the controllability of these networks. We also obtain the analytical equations by investigating the network's structural properties approximatively and design the efficient tools. Finally, we consider some real networks with flow dynamics, finding that their controllability is significantly different from that predicted by only considering the topology. These findings deepen our understanding of network controllability with flow-conservation dynamics and provide a general framework to incorporate real dynamics in the analysis of network controllability.

  18. Efficient Graph-Based Resource Allocation Scheme Using Maximal Independent Set for Randomly- Deployed Small Star Networks.

    Science.gov (United States)

    Zhou, Jian; Wang, Lusheng; Wang, Weidong; Zhou, Qingfeng

    2017-11-06

    In future scenarios of heterogeneous and dense networks, randomly-deployed small star networks (SSNs) become a key paradigm, whose system performance is restricted to inter-SSN interference and requires an efficient resource allocation scheme for interference coordination. Traditional resource allocation schemes do not specifically focus on this paradigm and are usually too time consuming in dense networks. In this article, a very efficient graph-based scheme is proposed, which applies the maximal independent set (MIS) concept in graph theory to help divide SSNs into almost interference-free groups. We first construct an interference graph for the system based on a derived distance threshold indicating for any pair of SSNs whether there is intolerable inter-SSN interference or not. Then, SSNs are divided into MISs, and the same resource can be repetitively used by all the SSNs in each MIS. Empirical parameters and equations are set in the scheme to guarantee high performance. Finally, extensive scenarios both dense and nondense are randomly generated and simulated to demonstrate the performance of our scheme, indicating that it outperforms the classical max K-cut-based scheme in terms of system capacity, utility and especially time cost. Its achieved system capacity, utility and fairness can be close to the near-optimal strategy obtained by a time-consuming simulated annealing search.

  19. B-iTRS: A Bio-Inspired Trusted Routing Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mingchuan Zhang

    2015-01-01

    Full Text Available In WSNs, routing algorithms need to handle dynamical changes of network topology, extra overhead, energy saving, and other requirements. Therefore, routing in WSNs is an extremely interesting and challenging issue. In this paper, we present a novel bio-inspired trusted routing scheme (B-iTRS based on ant colony optimization (ACO and Physarum autonomic optimization (PAO. For trust assessment, B-iTRS monitors neighbors’ behavior in real time, receives feedback from Sink, and then assesses neighbors’ trusts based on the acquired information. For routing scheme, each node finds routes to the Sink based on ACO and PAO. In the process of path finding, B-iTRS senses the load and trust value of each node and then calculates the link load and link trust of the found routes to support the route selection. Moreover, B-iTRS also assesses the route based on PAO to maintain the route table. Simulation results show how B-iTRS can achieve the effective performance compared to existing state-of-the-art algorithms.

  20. An energy efficient scheme for data gathering in wireless sensor networks using particle swarm optimization

    Directory of Open Access Journals (Sweden)

    Ayon Chakraborty

    2009-01-01

    Full Text Available Energy efficiency of sensor nodes is a sizzling issue,given the severe resource constraints of sensor nodes andpervasive nature of sensor networks. The base station beinglocated at variable distances from the nodes in the sensor field,each node actually dissipates a different amount of energy totransmit data to the same. The LEACH [4] and PEGASIS [5]protocols provide elegant solutions to this problem, but may notalways result in optimal performance. In this paper we haveproposed a novel data gathering protocol for enhancing thenetwork lifetime by optimizing energy dissipation in the nodes.To achieve our design objective we have applied particle swarmoptimization (PSO with Simulated Annealing (SA to form asub-optimal data gathering chain and devised a method forselecting an efficient leader for communicating to the basestation. In our scheme each node only communicates with aclose neighbor and takes turns in being the leader depending onits residual energy and location. This helps to rule out theunequal energy dissipation by the individual nodes of thenetwork and results in superior performance as compared toLEACH and PEGASIS. Extensive computer simulations havebeen carried out which shows that significant improvement isover these schemes.

  1. Performance characterization and transmission schemes for instantly decodable network coding in wireless broadcast

    Science.gov (United States)

    Yu, Mingchao; Sadeghi, Parastoo; Aboutorab, Neda

    2015-12-01

    We consider broadcasting a block of packets to multiple wireless receivers under random packet erasures using instantly decodable network coding (IDNC). The sender first broadcasts each packet uncoded once, then generates coded packets according to receivers' feedback about their missing packets. We focus on strict IDNC (S-IDNC), where each coded packet includes at most one missing packet of every receiver. But, we will also study its relation with generalized IDNC (G-IDNC), where this condition is relaxed. We characterize two fundamental performance limits of S-IDNC: (1) the number of transmissions to complete the broadcast, which measures throughput and (2) average packet decoding delay, which measures how fast each packet is decoded at each receiver on average. We derive a closed-form expression for the expected minimum number of transmissions in terms of the number of packets and receivers and the erasure probability. We prove that it is NP-hard to minimize the average packet decoding delay of S-IDNC. We also prove that the graph models of S- and G-IDNC share the same chromatic number. Next, we design efficient S-IDNC transmission schemes and coding algorithms with full/intermittent receiver feedback. We present simulation results to corroborate the developed theory and compare our schemes with existing ones.

  2. Selective Route Based on SNR with Cross-Layer Scheme in Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Istikmal

    2017-01-01

    Full Text Available In this study, we developed network and throughput formulation models and proposed new method of the routing protocol algorithm with a cross-layer scheme based on signal-to-noise ratio (SNR. This method is an enhancement of routing protocol ad hoc on-demand distance vector (AODV. This proposed scheme uses selective route based on the SNR threshold in the reverse route mechanism. We developed AODV SNR-selective route (AODV SNR-SR for a mechanism better than AODV SNR, that is, the routing protocol that used average or sum of path SNR, and also better than AODV which is hop-count-based. We also used selective reverse route based on SNR mechanism, replacing the earlier method to avoid routing overhead. The simulation results show that AODV SNR-SR outperforms AODV SNR and AODV in terms of throughput, end-to-end delay, and routing overhead. This proposed method is expected to support Device-to-Device (D2D communications that are concerned with the quality of the channel awareness in the development of the future Fifth Generation (5G.

  3. P-bRS: A Physarum-Based Routing Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mingchuan Zhang

    2014-01-01

    Full Text Available Routing in wireless sensor networks (WSNs is an extremely challenging issue due to the features of WSNs. Inspired by the large and single-celled amoeboid organism, slime mold Physarum polycephalum, we establish a novel selecting next hop model (SNH. Based on this model, we present a novel Physarum-based routing scheme (P-bRS for WSNs to balance routing efficiency and energy equilibrium. In P-bRS, a sensor node can choose the proper next hop by using SNH which comprehensively considers the distance, energy residue, and location of the next hop. The simulation results show how P-bRS can achieve the effective trade-off between routing efficiency and energy equilibrium compared to two famous algorithms.

  4. Performance analysis of a handoff scheme for two-tier cellular CDMA networks

    Directory of Open Access Journals (Sweden)

    Ahmed Hamad

    2011-07-01

    Full Text Available A two-tier model is used in cellular networks to improve the Quality of Service (QoS, namely to reduce the blocking probability of new calls and the forced termination probability of ongoing calls. One tier, the microcells, is used for slow or stationary users, and the other, the macrocell, is used for high speed users. In Code-Division Multiple-Access (CDMA cellular systems, soft handoffs are supported, which provides ways for further QoS improvement. In this paper, we introduce such a way; namely, a channel borrowing scheme used in conjunction with a First-In-First-Out (FIFO queue in the macrocell tier. A multidimensional Markov chain to model the resulting system is established, and an iterative technique to find the steady-state probability distribution is utilized. This distribution is then used to find the performance measures of interest: new call blocking probability, and forced termination probability.

  5. An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zichuan Xu

    2010-10-01

    Full Text Available A high degree of reliability for critical data transmission is required in body sensor networks (BSNs. However, BSNs are usually vulnerable to channel impairments due to body fading effect and RF interference, which may potentially cause data transmission to be unreliable. In this paper, an adaptive and flexible fault-tolerant communication scheme for BSNs, namely AFTCS, is proposed. AFTCS adopts a channel bandwidth reservation strategy to provide reliable data transmission when channel impairments occur. In order to fulfill the reliability requirements of critical sensors, fault-tolerant priority and queue are employed to adaptively adjust the channel bandwidth allocation. Simulation results show that AFTCS can alleviate the effect of channel impairments, while yielding lower packet loss rate and latency for critical sensors at runtime.

  6. SVM-based spectrum mobility prediction scheme in mobile cognitive radio networks.

    Science.gov (United States)

    Wang, Yao; Zhang, Zhongzhao; Ma, Lin; Chen, Jiamei

    2014-01-01

    Spectrum mobility as an essential issue has not been fully investigated in mobile cognitive radio networks (CRNs). In this paper, a novel support vector machine based spectrum mobility prediction (SVM-SMP) scheme is presented considering time-varying and space-varying characteristics simultaneously in mobile CRNs. The mobility of cognitive users (CUs) and the working activities of primary users (PUs) are analyzed in theory. And a joint feature vector extraction (JFVE) method is proposed based on the theoretical analysis. Then spectrum mobility prediction is executed through the classification of SVM with a fast convergence speed. Numerical results validate that SVM-SMP gains better short-time prediction accuracy rate and miss prediction rate performance than the two algorithms just depending on the location and speed information. Additionally, a rational parameter design can remedy the prediction performance degradation caused by high speed SUs with strong randomness movements.

  7. Control charts for location based on different sampling schemes

    NARCIS (Netherlands)

    Mehmood, R.; Riaz, M.; Does, R.J.M.M.

    2013-01-01

    Control charts are the most important statistical process control tool for monitoring variations in a process. A number of articles are available in the literature for the X̄ control chart based on simple random sampling, ranked set sampling, median-ranked set sampling (MRSS), extreme-ranked set

  8. A fuzzy robust control scheme for vibration suppression of a nonlinear electromagnetic-actuated flexible system

    Science.gov (United States)

    Tavakolpour-Saleh, A. R.; Haddad, M. A.

    2017-03-01

    In this paper, a novel robust vibration control scheme, namely, one degree-of-freedom fuzzy active force control (1DOF-FAFC) is applied to a nonlinear electromagnetic-actuated flexible plate system. First, the flexible plate with clamped-free-clamped-free (CFCF) boundary conditions is modeled and simulated. Then, the validity of the simulation platform is evaluated through experiment. A nonlinear electromagnetic actuator is developed and experimentally modeled through a parametric system identification scheme. Next, the obtained nonlinear model of the actuator is applied to the simulation platform and performance of the proposed control technique in suppressing unwanted vibrations is investigated via simulation. A fuzzy controller is applied to the robust 1DOF control scheme to tune the controller gain using acceleration feedback. Consequently, an intelligent self-tuning vibration control strategy based on an inexpensive acceleration sensor is proposed in the paper. Furthermore, it is demonstrated that the proposed acceleration-based control technique owns the benefits of the conventional velocity feedback controllers. Finally, an experimental rig is developed to investigate the effectiveness of the 1DOF-FAFC scheme. It is found that the first, second, and third resonant modes of the flexible system are attenuated up to 74%, 81%, and 90% respectively through which the effectiveness of the proposed control scheme is affirmed.

  9. A Deadline-Aware Scheduling and Forwarding Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thi-Nga Dao

    2016-01-01

    Full Text Available Many applications in wireless sensor networks (WSNs require energy consumption to be minimized and the data delivered to the sink within a specific delay. A usual solution for reducing energy consumption is duty cycling, in which nodes periodically switch between sleep and active states. By increasing the duty cycle interval, consumed energy can be reduced more. However, a large duty cycle interval causes a long end-to-end (E2E packet delay. As a result, the requirement of a specific delay bound for packet delivery may not be satisfied. In this paper, we aim at maximizing the duty cycle while still guaranteeing that the packets arrive at the sink with the required probability, i.e., the required delay-constrained success ratio (DCSR is achieved. In order to meet this objective, we propose a novel scheduling and forwarding scheme, namely the deadline-aware scheduling and forwarding (DASF algorithm. In DASF, the E2E delay distribution with the given network model and parameters is estimated in order to determine the maximum duty cycle interval, with which the required DCSR is satisfied. Each node independently selects a wake-up time using the selected interval, and packets are forwarded to a node in the potential forwarding set, which is determined based on the distance between nodes and the sink. DASF does not require time synchronization between nodes, and a node does not need to maintain neighboring node information in advance. Simulation results show that the proposed scheme can satisfy a required delay-constrained success ratio and outperforms existing algorithms in terms of E2E delay and DCSR.

  10. Loss Performance Modeling for Hierarchical Heterogeneous Wireless Networks With Speed-Sensitive Call Admission Control

    DEFF Research Database (Denmark)

    Huang, Qian; Huang, Yue-Cai; Ko, King-Tim

    2011-01-01

    A hierarchical overlay structure is an alternative solution that integrates existing and future heterogeneous wireless networks to provide subscribers with better mobile broadband services. Traffic loss performance in such integrated heterogeneous networks is necessary for an operator's network...... dimensioning and planning. This paper investigates the computationally efficient loss performance modeling for multiservice in hierarchical heterogeneous wireless networks. A speed-sensitive call admission control (CAC) scheme is considered in our model to assign overflowed calls to appropriate tiers...

  11. A Robust Control Scheme for Medium-Voltage-Level DVR Implementation

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Li, Yun Wei

    2007-01-01

    of Hinfin controller weighting function selection, inner current loop tuning, and system disturbance rejection capability is presented. Finally, the designed control scheme is extensively tested on a laboratory 10-kV MV-level DVR system with varying voltage sag (balanced and unbalanced) and loading (linear......In this paper, a robust control scheme with an outer Hinfin voltage control loop and an inner current control loop is designed and implemented on a medium-voltage (MV)-level dynamic voltage restorer (DVR) system. Through a simple selection of weighting functions, the synthesized Hinfin controller....../nonlinear load and induction motor load) conditions. It is shown that the proposed control scheme is effective in both balanced and unbalanced sag compensation and load disturbance rejection, as its robustness is explicitly specified....

  12. Constrained target controllability of complex networks

    Science.gov (United States)

    Guo, Wei-Feng; Zhang, Shao-Wu; Wei, Ze-Gang; Zeng, Tao; Liu, Fei; Zhang, Jingsong; Wu, Fang-Xiang; Chen, Luonan

    2017-06-01

    It is of great theoretical interest and practical significance to study how to control a system by applying perturbations to only a few driver nodes. Recently, a hot topic of modern network researches is how to determine driver nodes that allow the control of an entire network. However, in practice, to control a complex network, especially a biological network, one may know not only the set of nodes which need to be controlled (i.e. target nodes), but also the set of nodes to which only control signals can be applied (i.e. constrained control nodes). Compared to the general concept of controllability, we introduce the concept of constrained target controllability (CTC) of complex networks, which concerns the ability to drive any state of target nodes to their desirable state by applying control signals to the driver nodes from the set of constrained control nodes. To efficiently investigate the CTC of complex networks, we further design a novel graph-theoretic algorithm called CTCA to estimate the ability of a given network to control targets by choosing driver nodes from the set of constrained control nodes. We extensively evaluate the CTC of numerous real complex networks. The results indicate that biological networks with a higher average degree are easier to control than biological networks with a lower average degree, while electronic networks with a lower average degree are easier to control than web networks with a higher average degree. We also show that our CTCA can more efficiently produce driver nodes for target-controlling the networks than existing state-of-the-art methods. Moreover, we use our CTCA to analyze two expert-curated bio-molecular networks and compare to other state-of-the-art methods. The results illustrate that our CTCA can efficiently identify proven drug targets and new potentials, according to the constrained controllability of those biological networks.

  13. An Optimal Control Scheme to Minimize Loads in Wind Farms

    DEFF Research Database (Denmark)

    Soleimanzadeh, Maryam; Wisniewski, Rafal

    2012-01-01

    This work presents a control algorithm for wind farms that optimizes the power production of the farm and helps to increase the lifetime of wind turbines components. The control algorithm is a centralized approach, and it determines the power reference signals for individual wind turbines...... such that the structural loads of the wind turbines in low frequencies are reduced. The controller is relatively easy to implement on a wind farm, and in here the results of simulating the controller on a small wind farm is presented....

  14. Energy efficiency analysis of two-sided feed scheme of DC traction network with high asymmetry of feeders parameters

    Science.gov (United States)

    Abramov, E. Y.; Sopov, V. I.

    2017-10-01

    In a given research using the example of traction network area with high asymmetry of power supply parameters, the sequence of comparative assessment of power losses in DC traction network with parallel and traditional separated operating modes of traction substation feeders was shown. Experimental measurements were carried out under these modes of operation. The calculation data results based on statistic processing showed the power losses decrease in contact network and the increase in feeders. The changes proved to be critical ones and this demonstrates the significance of potential effects when converting traction network areas into parallel feeder operation. An analytical method of calculation the average power losses for different feed schemes of the traction network was developed. On its basis, the dependences of the relative losses were obtained by varying the difference in feeder voltages. The calculation results showed unreasonableness transition to a two-sided feed scheme for the considered traction network area. A larger reduction in the total power loss can be obtained with a smaller difference of the feeders’ resistance and / or a more symmetrical sectioning scheme of contact network.

  15. A hybrid iterative scheme for optimal control problems governed by ...

    African Journals Online (AJOL)

    MRT

    obtaining approximate solutions of optimal control problems governed by some Fredholm integral equations. By some numerical ... Trace of numerical approaches in optimal control problems can be found in many applications and academic literatures. ...... Progress In Electromagnetics Research 78: 361–376. Ghasemi, M.

  16. Adaptive control schemes for mobile robot formations with triangularised structures

    NARCIS (Netherlands)

    Guo, J.; Lin, Z.; Cao, M.; Yan, G.

    The study investigates the leader-follower formation control problem, for which the objective is to control a group of robots such that they move as a rigid formation with a prescribed constant velocity. It is assumed in the study that there are two leader robots, who are the only robots in the

  17. Analysis of Contracting Processes, Internal Controls, and Procurement Fraud Schemes

    Science.gov (United States)

    2013-06-01

    of the Treadway Commission ( COSO ). (1992). Internal control-integrated framework . Retrieved from http://www.coso.org Competition in Contracting...United States COR Contracting Officer Representative COSO Committee of Sponsoring Organizations DAU Defense Acquisition University DAWIA Defense...adopted from the Committee of Sponsoring Organizations of the Treadway Commission ( COSO ) (1992). There are five components: control environment, risk

  18. Algorithms for Optimal Model Distributions in Adaptive Switching Control Schemes

    NARCIS (Netherlands)

    Ghosh, D.; Baldi, S.

    2016-01-01

    Several multiple model adaptive control architectures have been proposed in the literature. Despite many advances in theory, the crucial question of how to synthesize the pairs model/controller in a structurally optimal way is to a large extent not addressed. In particular, it is not clear how to

  19. Synchronization of delayed complex networks via intermittent control with non-period

    Science.gov (United States)

    Liang, Yi; Qi, Xiaolong; Wei, Qiang

    2018-02-01

    In this paper, a pinning synchronization scheme of nonlinear coupled complex networks is investigated via non-periodically intermittent control method, in which dynamical system is delayed nonlinear system, and its coupling matrices can be nonsymmetric. In the case that control ratio of control width to total time width is equal in any time interval, the control scheme is studied, and some sufficient conditions are given to ensure global exponential synchronization. Furthermore, two main corollaries are derived. At last, numerical simulations show effectiveness of the synchronization scheme.

  20. Hierarchical Agglomerative Clustering Schemes for Energy-Efficiency in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taleb Tariq

    2017-06-01

    Full Text Available Extending the lifetime of wireless sensor networks (WSNs while delivering the expected level of service remains a hot research topic. Clustering has been identified in the literature as one of the primary means to save communication energy. In this paper, we argue that hierarchical agglomerative clustering (HAC provides a suitable foundation for designing highly energy efficient communication protocols for WSNs. To this end, we study a new mechanism for selecting cluster heads (CHs based both on the physical location of the sensors and their residual energy. Furthermore, we study different patterns of communications between the CHs and the base station depending on the possible transmission ranges and the ability of the sensors to act as traffic relays. Simulation results show that our proposed clustering and communication schemes outperform well-knows existing approaches by comfortable margins. In particular, networks lifetime is increased by more than 60% compared to LEACH and HEED, and by more than 30% compared to K-means clustering.

  1. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    Science.gov (United States)

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  2. Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzan Doroodgar

    2014-03-01

    Full Text Available Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare. Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  3. A source-based congestion control strategy for real-time video transport on IP network

    Science.gov (United States)

    Chen, Xia; Cai, Canhui

    2005-07-01

    The goal of this paper is to design a TCP friendly real-time video transport protocol that will not only utilize network resource efficiently, but also prevent network congestion from the real-time video transmitting effectively. To this end, we proposed a source based congestion control scheme to adapt video coding rate to the channel capacity of the IP network, including three stages: rate control, rate-adaptive video encoding, and rate shaping.

  4. Adaptive optimization and control using neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Mead, W.C.; Brown, S.K.; Jones, R.D.; Bowling, P.S.; Barnes, C.W.

    1993-10-22

    Recent work has demonstrated the ability of neural-network-based controllers to optimize and control machines with complex, non-linear, relatively unknown control spaces. We present a brief overview of neural networks via a taxonomy illustrating some capabilities of different kinds of neural networks. We present some successful control examples, particularly the optimization and control of a small-angle negative ion source.

  5. A Global Sliding-Mode Control Scheme with Adjustable Robustness for A Linear Variable Reluctance Motor

    Science.gov (United States)

    Lin, Jin-Yuan; Lu, Yu-Sheng; Chen, Jian-Shiang

    A novel global sliding-mode control (GSMC) scheme with adjustable robustness is presented in this article. The proposed scheme offers a switching function together with unperturbed system dynamics to weigh the contribution from SMC such that all of the closed-loop poles can be located within predefined regions to provide design flexibility, and the robustness of system can thus be adjusted. By this scheme, the maximal control effort and chattering level can be reduced according to designer's specifications directly. Since the switching function can initially be made to equal to zero, the adjustable performance during the entire response can be guaranteed, and the reaching condition is thus lifted. The efficacy of this scheme is demonstrated via successful implementation on a linear variable reluctance motor (LVRM) servo system. Both simulation and experimental studies further demonstrate its feasibility and effectiveness.

  6. Research on a New Control Scheme of Photovoltaic Grid Power Generation System

    Directory of Open Access Journals (Sweden)

    Dong-Hui Li

    2014-01-01

    Full Text Available A new type of photovoltaic grid power generation system control scheme to solve the problems of the conventional photovoltaic grid power generation systems is presented. To aim at the oscillation and misjudgment of traditional perturbation observation method, an improved perturbation observation method comparing to the next moment power is proposed, combining with BOOST step-up circuit to realize the maximum power tracking. To counter the harmonic pollution problem in photovoltaic grid power generation system, the deadbeat control scheme in fundamental wave synchronous frequency rotating coordinate system of power grid is presented. A parameter optimization scheme based on positive feedback of active frequency shift island detection to solve the problems like the nondetection zone due to the import of disturbance in traditional island detection method is proposed. Finally, the results in simulation environment by MATLAB/Simulink simulation and experiment environment verify the validity and superiority of the proposed scheme.

  7. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  8. Simplified LQG Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1997-01-01

    A new neural network application for non-linear state control is described. One neural network is modelled to form a Kalmann predictor and trained to act as an optimal state observer for a non-linear process. Another neural network is modelled to form a state controller and trained to produce...

  9. Synchronizability on complex networks via pinning control

    Indian Academy of Sciences (India)

    pinning strategies have different pinning synchronizability on the same complex network, and the synchronizability with pinning control is consistent with one without pinning control in various complex networks. Keywords. Complex network; the pinning synchronization; synchronizability. PACS Nos 05.45.Xt; 89.75.−k; 05.45.

  10. Opinion control in complex networks

    CERN Document Server

    Masuda, Naoki

    2014-01-01

    In many instances of election, the electorate appears to be a composite of partisan and independent voters. Given that partisans are not likely to convert to a different party, a main goal for a party could be to mobilize independent voters toward the party with the help of strong leadership, mass media, partisans, and effects of peer-to-peer influence. Based on the exact solution of the classical voter model dynamics in the presence of perfectly partisan voters (i.e., zealots), we propose a computational method to maximize the share of the party in a social network of independent voters by pinning control strategy. The party, corresponding to the controller or zealots, optimizes the nodes to be controlled given the information about the connectivity of independent voters and the set of nodes that the opponent party controls. We show that controlling hubs is generally a good strategy, whereas the optimized strategy is even better. The superiority of the optimized strategy is particularly eminent when the inde...

  11. Connection adaption for control of networked mobile chaotic agents.

    Science.gov (United States)

    Zhou, Jie; Zou, Yong; Guan, Shuguang; Liu, Zonghua; Xiao, Gaoxi; Boccaletti, S

    2017-11-22

    In this paper, we propose a strategy for the control of mobile chaotic oscillators by adaptively rewiring connections between nearby agents with local information. In contrast to the dominant adaptive control schemes where coupling strength is adjusted continuously according to the states of the oscillators, our method does not request adaption of coupling strength. As the resulting interaction structure generated by this proposed strategy is strongly related to unidirectional chains, by investigating synchronization property of unidirectional chains, we reveal that there exists a certain coupling range in which the agents could be controlled regardless of the length of the chain. This feature enables the adaptive strategy to control the mobile oscillators regardless of their moving speed. Compared with existing adaptive control strategies for networked mobile agents, our proposed strategy is simpler for implementation where the resulting interaction networks are kept unweighted at all time.

  12. Performance analysis of joint diversity combining, adaptive modulation, and power control schemes

    KAUST Repository

    Qaraqe, Khalid A.

    2011-01-01

    Adaptive modulation and diversity combining represent very important adaptive solutions for future generations of wireless communication systems. Indeed, in order to improve the performance and the efficiency of these systems, these two techniques have been recently used jointly in new schemes named joint adaptive modulation and diversity combining (JAMDC) schemes. Considering the problem of finding low hardware complexity, bandwidth-efficient, and processing-power efficient transmission schemes for a downlink scenario and capitalizing on some of these recently proposed JAMDC schemes, we propose and analyze in this paper three joint adaptive modulation, diversity combining, and power control (JAMDCPC) schemes where a constant-power variable-rate adaptive modulation technique is used with an adaptive diversity combining scheme and a common power control process. More specifically, the modulation constellation size, the number of combined diversity paths, and the needed power level are jointly determined to achieve the highest spectral efficiency with the lowest possible processing power consumption quantified in terms of the average number of combined paths, given the fading channel conditions and the required bit error rate (BER) performance. In this paper, the performance of these three JAMDCPC schemes is analyzed in terms of their spectral efficiency, processing power consumption, and error-rate performance. Selected numerical examples show that these schemes considerably increase the spectral efficiency of the existing JAMDC schemes with a slight increase in the average number of combined paths for the low signal-to-noise ratio range while maintaining compliance with the BER performance and a low radiated power which yields to a substantial decrease in interference to co-existing users and systems. © 2011 IEEE.

  13. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  14. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chun-Ta Li

    2013-07-01

    Full Text Available Wireless sensor networks (WSNs can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs. Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.’s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users’ attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.’s authentication scheme are left unchanged.

  15. A low order adaptive control scheme for hydraulic servo systems

    DEFF Research Database (Denmark)

    Andersen, Torben Ole; Pedersen, Henrik Clemmensen; Bech, Michael Møller

    2015-01-01

    This paper deals with high-performance position control of hydraulics servo systems in general. The hydraulic servo system used is a two link robotic manipulator actuated by two hydraulic servo cylinders. A non-linear model of the hydraulic system and a Newton-Euler based model of the mechanical...

  16. Parameter Identification and Control Scheme for Monitoring Automatic Thickness Control System with Measurement Delay

    Directory of Open Access Journals (Sweden)

    Xu Yang

    2017-01-01

    Full Text Available The thickness of the steel strip is an important indicator of the overall strip quality. Deviations in thickness are primarily controlled using the automatic gauge control (AGC system of each rolling stand. At the last stand, the monitoring AGC system is usually used, where the deviations in thickness can be directly measured by the X-ray thickness gauge device and used as the input to the AGC system. However, due to the physical distance between the thickness detection device and the rolling stand, time delay is unavoidably present in the thickness control loop, which can affect control performance and lead to system oscillations. Furthermore, the parameters of the system can change due to perturbations from external disturbances. Therefore, this paper proposes an identification and control scheme for monitoring AGC system that can handle time delay and parameter uncertainty. The cross-correlation function is used to estimate the time delay of the system, while the system parameters are identified using a recursive least squares method. The time delay and parameter estimates are then further refined using the Levenberg-Marquardt algorithm, so as to provide the most accurate parameter estimates for the complete system. Simulation results show that, compared with the standard Proportion Integration Differentiation (PID controller approach, the proposed approach is not affected by changes in the time delay and parameter uncertainties.

  17. Demonstration of flexible and reconfigurable WDM multicast scheme supporting downstream emergency multicast communication for WDM optical access network

    Science.gov (United States)

    Li, Ze; Zhang, Min; Wang, Danshi; Cui, Yue

    2017-09-01

    We propose a flexible and reconfigurable wavelength-division multiplexing (WDM) multicast scheme supporting downstream emergency multicast communication for WDM optical access network (WDM-OAN) via a multicast module (MM) based on four-wave mixing (FWM) in a semiconductor optical amplifier. It serves as an emergency measure to dispose of the burst, large bandwidth, and real-time multicast service with fast service provisioning and high resource efficiency. It also plays the role of physical backup in cases of big data migration or network disaster caused by invalid lasers or modulator failures. It provides convenient and reliable multicast service and emergency protection for WDM-OAN without modifying WDM-OAN structure. The strategies of an MM setting at the optical line terminal and remote node are discussed to apply this scheme to passive optical networks and active optical networks, respectively. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment in which one-to-six/eight 10-Gbps nonreturn-to-zero-differential phase-shift keying WDM multicasts in both strategies are successfully transmitted over single-mode fiber of 20.2 km. One-to-many reconfigurable WDM multicasts dealing with higher data rate and other modulation formats of multicast service are possible through the proposed scheme. It can be applied to different WDM access technologies, e.g., time-wavelength-division multiplexing-OAN and coherent WDM-OAN, and upgraded smoothly.

  18. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network.

    Science.gov (United States)

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  19. A New Cooperative MIMO Scheme Based on SM for Energy-Efficiency Improvement in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yuyang Peng

    2014-01-01

    Full Text Available Improving the energy efficiency in wireless sensor networks (WSN has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  20. A New Cooperative MIMO Scheme Based on SM for Energy-Efficiency Improvement in Wireless Sensor Network

    Science.gov (United States)

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system. PMID:24707224

  1. Controlling complex networks with conformity behavior

    Science.gov (United States)

    Wang, Xu-Wen; Nie, Sen; Wang, Wen-Xu; Wang, Bing-Hong

    2015-09-01

    Controlling complex networks accompanied by common conformity behavior is a fundamental problem in social and physical science. Conformity behavior that individuals tend to follow the majority in their neighborhood is common in human society and animal communities. Despite recent progress in understanding controllability of complex networks, the existent controllability theories cannot be directly applied to networks associated with conformity. Here we propose a simple model to incorporate conformity-based decision making into the evolution of a network system, which allows us to employ the exact controllability theory to explore the controllability of such systems. We offer rigorous theoretical results of controllability for representative regular networks. We also explore real networks in different fields and some typical model networks, finding some interesting results that are different from the predictions of structural and exact controllability theory in the absence of conformity. We finally present an example of steering a real social network to some target states to further validate our controllability theory and tools. Our work offers a more realistic understanding of network controllability with conformity behavior and can have potential applications in networked evolutionary games, opinion dynamics and many other complex networked systems.

  2. Implementation of an effective video transmission scheme over ad hoc networks

    Science.gov (United States)

    Liu, Lei; Jin, Zhigang; Shu, Yantai; Dong, Linfang; Han, Lu

    2006-10-01

    Real-time video transmission over ad hoc networks faces many challenges including low bandwidth, long end-to-end delay, high packet loss rate, frequently changing topology and limited-powered mobile nodes. This paper presents an effective real-time video transmission scheme and improves implementation of DSR (Dynamic Source Routing) protocol. We set up a test-bed by using DSR routing in the IP layer, and an application transmitting video stream over UDP protocol. We get a continuous JPEG image stream from a ZC0301p web camera and split each image into small blocks according to the MCU (Minimum Coding Unit) borderline. The strong point of splitting JPEG image is that IP layer fragmentation can be avoided so we can determine which part of data in the frame gets lost to do loss recovery at the receiver. By using JPEG image stream, the video encoding complexity is reduced, which can save computing power of mobile nodes compared with MPEG and other Multiple Description Coding (MDC) methods. We also improve implementation of DSR to make it suitable to transfer real-time multimedia data. First different priorities are given to different traffic classes in DSR routing. Second the route maintenance scheme is modified to decrease overhead and link failure misjudgments. We carry out two experiments both indoors and outdoors using six mobile nodes. The first is to transmit continuous JPEG images using our former DSR implementation according to DSR draft. The second is that we split JPEG images into blocks and then transmit them using improved DSR implementation. Results show the latter gives better video stream fluency and higher image quality.

  3. Model-based control of networked systems

    CERN Document Server

    Garcia, Eloy; Montestruque, Luis A

    2014-01-01

    This monograph introduces a class of networked control systems (NCS) called model-based networked control systems (MB-NCS) and presents various architectures and control strategies designed to improve the performance of NCS. The overall performance of NCS considers the appropriate use of network resources, particularly network bandwidth, in conjunction with the desired response of the system being controlled.   The book begins with a detailed description of the basic MB-NCS architecture that provides stability conditions in terms of state feedback updates . It also covers typical problems in NCS such as network delays, network scheduling, and data quantization, as well as more general control problems such as output feedback control, nonlinear systems stabilization, and tracking control.   Key features and topics include: Time-triggered and event-triggered feedback updates Stabilization of uncertain systems subject to time delays, quantization, and extended absence of feedback Optimal control analysis and ...

  4. Logistic control in automated transportation networks

    NARCIS (Netherlands)

    Ebben, Mark

    2001-01-01

    Increasing congestion problems lead to a search for alternative transportation systems. Automated transportation networks, possibly underground, are an option. Logistic control systems are essential for future implementations of such automated transportation networks. This book contributes to the

  5. A unified numerical scheme for linear-quadratic optimal control problems with joint control and state constraints

    NARCIS (Netherlands)

    Han, Lanshan; Camlibel, M. Kanat; Pang, Jong-Shi; Heemels, W. P. Maurice H.

    2012-01-01

    This paper presents a numerical scheme for solving the continuous-time convex linear-quadratic (LQ) optimal control problem with mixed polyhedral state and control constraints. Unifying a discretization of this optimal control problem as often employed in model predictive control and that obtained

  6. PLS-based memory control scheme for enhanced process monitoring

    KAUST Repository

    Harrou, Fouzi

    2017-01-20

    Fault detection is important for safe operation of various modern engineering systems. Partial least square (PLS) has been widely used in monitoring highly correlated process variables. Conventional PLS-based methods, nevertheless, often fail to detect incipient faults. In this paper, we develop new PLS-based monitoring chart, combining PLS with multivariate memory control chart, the multivariate exponentially weighted moving average (MEWMA) monitoring chart. The MEWMA are sensitive to incipient faults in the process mean, which significantly improves the performance of PLS methods and widen their applicability in practice. Using simulated distillation column data, we demonstrate that the proposed PLS-based MEWMA control chart is more effective in detecting incipient fault in the mean of the multivariate process variables, and outperform the conventional PLS-based monitoring charts.

  7. A network-based detection scheme for the jet stream core

    Science.gov (United States)

    Molnos, Sonja; Mamdouh, Tarek; Petri, Stefan; Nocke, Thomas; Weinkauf, Tino; Coumou, Dim

    2017-02-01

    The polar and subtropical jet streams are strong upper-level winds with a crucial influence on weather throughout the Northern Hemisphere midlatitudes. In particular, the polar jet is located between cold arctic air to the north and warmer subtropical air to the south. Strongly meandering states therefore often lead to extreme surface weather. Some algorithms exist which can detect the 2-D (latitude and longitude) jets' core around the hemisphere, but all of them use a minimal threshold to determine the subtropical and polar jet stream. This is particularly problematic for the polar jet stream, whose wind velocities can change rapidly from very weak to very high values and vice versa. We develop a network-based scheme using Dijkstra's shortest-path algorithm to detect the polar and subtropical jet stream core. This algorithm not only considers the commonly used wind strength for core detection but also takes wind direction and climatological latitudinal position into account. Furthermore, it distinguishes between polar and subtropical jet, and between separate and merged jet states. The parameter values of the detection scheme are optimized using simulated annealing and a skill function that accounts for the zonal-mean jet stream position (Rikus, 2015). After the successful optimization process, we apply our scheme to reanalysis data covering 1979-2015 and calculate seasonal-mean probabilistic maps and trends in wind strength and position of jet streams. We present longitudinally defined probability distributions of the positions for both jets for all on the Northern Hemisphere seasons. This shows that winter is characterized by two well-separated jets over Europe and Asia (ca. 20° W to 140° E). In contrast, summer normally has a single merged jet over the western hemisphere but can have both merged and separated jet states in the eastern hemisphere. With this algorithm it is possible to investigate the position of the jets' cores around the hemisphere and it is

  8. Integrated Backstepping Design of Missile Guidance andControl with Time delay Adaptive Scheme

    Science.gov (United States)

    2016-03-30

    Guidance and Control with Time-delay Adaptive Scheme Seong-Min Hong 1 , Min-Guk Seo 1 , Chang-Hun Lee 2 and Min-Jea Tahk 1 1 Department...engagement kinematics are merged. Control input for the overall system is derived by backstepping approach. The stability of control logic is proved...estimated by using a time-delay adaptive control law. The performance of designed controller is investigated by numerical simulation. Keywords

  9. Adaptive Ranging Code Allocation Scheme in IEEE 802.16 Networks

    Directory of Open Access Journals (Sweden)

    Chu Kuo-Chih

    2010-01-01

    Full Text Available IEEE 802.16 uses the code division multiple access (CDMA method as the channel access method to decrease the collision probability of data delivery. However, IEEE 802.16 does not regulate a ranging code allocation scheme in its specification. In this paper, we propose the adaptive ranging code allocation (ARCA scheme, a novel ranging code allocation scheme for IEEE 802.16. According to the traffic sent to the base station (BS from the mobile station (MS, the ARCA scheme not only forecasts the traffic quantity of the MS but also finds the optimal ranging code allocation value for the MS to improve the transmission success rate next time. The ARCA scheme is verified with simulation and compared with other schemes in performance differences. According to the simulation results, the ARCA scheme is proved to have better performance than other schemes.

  10. Controller placement problem in industrial networks

    OpenAIRE

    Macián Ribera, Sergi

    2016-01-01

    SDN is the new trend in networks, for next Mobile and optical networks. Dimensioning, design and optimization of Software Defined Optical Networks. To be done at Technical University Munich (TUM) In this work the Controller Placement Problem (CPP) for SDN architecture is studied when it is applied to industrial networks. En este trabajo se estudia el problema CPP (controller placement problem) para la arquitectura SDN, aplicado a redes industriales. En aquest treball s'estudia el pro...

  11. A New Scheme to Improve Overall TCP Throughput with Vertical Handover between 3G Cellular Packet Networks and Wireless LANs

    Directory of Open Access Journals (Sweden)

    Jang JuWook

    2009-01-01

    Full Text Available One major difference between 3G cellular networks and Wireless LANs is in how packet losses are dealt with. 3G cellular networks employ selective repeat ARQ (SR-ARQ which may result in packet-reordering due to local retransmissions. Wireless LANs employ stop-and-wait ARQ which may drop some packets in case the buffer overflows. While much work has been performed for TCP throughput enhancement with vertical handover between wired networks and wireless networks, little attention is paid to the vertical handover between two different wireless networks. It is expected for majority of new mobile devices to be able to connect to both 3G cellular networks and wireless LANs by being equipped with multiple wireless interfaces. If this is the case, on-going TCP transmission may move between 3G cellular networks and wireless LANs. In this paper, we propose a scheme to improve TCP throughput with vertical handoff between 3G cellular networks and wireless LANs. For this we develop an algorithm which differentiates packet-reordering from packet losses and congestion losses from wireless losses. Simulation of our algorithm using ns-2 shows significant increase in throughput as large as 80% compared to TCP-SACK. The proposed scheme is able to respond to the change of loss pattern and then improve the TCP throughput during handover.

  12. Performance Comparison of Grid-Faulty Control Schemes for Inverter-Based Industrial Microgrids

    Directory of Open Access Journals (Sweden)

    Antonio Camacho

    2017-12-01

    Full Text Available Several control schemes specifically designed to operate inverter-based industrial microgrids during voltage sags have been recently proposed. This paper first classifies these control schemes in three categories and then performs a comparative analysis of them. Representative control schemes of each category are selected, described and used to identify the main features and performance of the considered category. The comparison is based on the evaluation of several indexes, which measure the power quality of the installation and utility grid during voltage sags, including voltage regulation, reactive current injection and transient response. The paper includes selected simulation results from a 500 kVA industrial microgrid to validate the expected features of the considered control schemes. Finally, in view of the obtained results, the paper proposes an alternative solution to cope with voltage sags, which includes the use of a static compensator in parallel with the microgrid. The novelty of this proposal is the suitable selection of the control schemes for both the microgrid and the static compensator. The superior performance of the proposal is confirmed by the analysis of the quality indexes. Its practical limitations are also revealed, showing that the topic studied in this paper is still open for further research.

  13. Adaptive Test Schemes for Control of Paratuberculosis in Dairy Cows.

    Directory of Open Access Journals (Sweden)

    Carsten Kirkeby

    Full Text Available Paratuberculosis is a chronic infection that in dairy cattle causes reduced milk yield, weight loss, and ultimately fatal diarrhea. Subclinical animals can excrete bacteria (Mycobacterium avium ssp. paratuberculosis, MAP in feces and infect other animals. Farmers identify the infectious animals through a variety of test-strategies, but are challenged by the lack of perfect tests. Frequent testing increases the sensitivity but the costs of testing are a cause of concern for farmers. Here, we used a herd simulation model using milk ELISA tests to evaluate the epidemiological and economic consequences of continuously adapting the sampling interval in response to the estimated true prevalence in the herd. The key results were that the true prevalence was greatly affected by the hygiene level and to some extent by the test-frequency. Furthermore, the choice of prevalence that will be tolerated in a control scenario had a major impact on the true prevalence in the normal hygiene setting, but less so when the hygiene was poor. The net revenue is not greatly affected by the test-strategy, because of the general variation in net revenues between farms. An exception to this is the low hygiene herd, where frequent testing results in lower revenue. When we look at the probability of eradication, then it is correlated with the testing frequency and the target prevalence during the control phase. The probability of eradication is low in the low hygiene herd, and a test-and-cull strategy should probably not be the primary strategy in this herd. Based on this study we suggest that, in order to control MAP, the standard Danish dairy farm should use an adaptive strategy where a short sampling interval of three months is used when the estimated true prevalence is above 1%, and otherwise use a long sampling interval of one year.

  14. Adaptive Test Schemes for Control of Paratuberculosis in Dairy Cows.

    Science.gov (United States)

    Kirkeby, Carsten; Græsbøll, Kaare; Nielsen, Søren Saxmose; Christiansen, Lasse Engbo; Toft, Nils; Halasa, Tariq

    2016-01-01

    Paratuberculosis is a chronic infection that in dairy cattle causes reduced milk yield, weight loss, and ultimately fatal diarrhea. Subclinical animals can excrete bacteria (Mycobacterium avium ssp. paratuberculosis, MAP) in feces and infect other animals. Farmers identify the infectious animals through a variety of test-strategies, but are challenged by the lack of perfect tests. Frequent testing increases the sensitivity but the costs of testing are a cause of concern for farmers. Here, we used a herd simulation model using milk ELISA tests to evaluate the epidemiological and economic consequences of continuously adapting the sampling interval in response to the estimated true prevalence in the herd. The key results were that the true prevalence was greatly affected by the hygiene level and to some extent by the test-frequency. Furthermore, the choice of prevalence that will be tolerated in a control scenario had a major impact on the true prevalence in the normal hygiene setting, but less so when the hygiene was poor. The net revenue is not greatly affected by the test-strategy, because of the general variation in net revenues between farms. An exception to this is the low hygiene herd, where frequent testing results in lower revenue. When we look at the probability of eradication, then it is correlated with the testing frequency and the target prevalence during the control phase. The probability of eradication is low in the low hygiene herd, and a test-and-cull strategy should probably not be the primary strategy in this herd. Based on this study we suggest that, in order to control MAP, the standard Danish dairy farm should use an adaptive strategy where a short sampling interval of three months is used when the estimated true prevalence is above 1%, and otherwise use a long sampling interval of one year.

  15. Sufficient Condition for the Existence of the Compact Set in the RBF Neural Network Control.

    Science.gov (United States)

    Zhu, Jiaming; Cao, Zhiqiang; Zhang, Tianping; Yang, Yuequan; Yi, Yang

    2017-06-20

    In this brief, sufficient conditions are proposed for the existence of the compact sets in the neural network controls. First, we point out that the existence of the compact set in a classical neural network control scheme is unsolved and its result is incomplete. Next, as a simple case, we derive the sufficient condition of the existence of the compact set for the neural network control of first-order systems. Finally, we propose the sufficient condition of the existence of the compact set for the neural-network-based backstepping control of high-order nonlinear systems. The theoretic result is illustrated through a simulation example.

  16. A Novel, Automatic Quality Control Scheme for Real Time Image Transmission

    Directory of Open Access Journals (Sweden)

    S. Ramachandran

    2002-01-01

    Full Text Available A novel scheme to compute energy on-the-fly and thereby control the quality of the image frames dynamically is presented along with its FPGA implementation. This scheme is suitable for incorporation in image compression systems such as video encoders. In this new scheme, processing is automatically stopped when the desired quality is achieved for the image being processed by using a concept called pruning. Pruning also increases the processing speed by a factor of more than two when compared to the conventional method of processing without pruning. An MPEG-2 encoder implemented using this scheme is capable of processing good quality monochrome and color images of sizes up to 1024 × 768 pixels at the rate of 42 and 28 frames per second, respectively, with a compression ratio of over 17:1. The encoder is also capable of working in the fixed pruning level mode with user programmable features.

  17. A circuit scheme to control current surge for RFID-NVM pumps

    Energy Technology Data Exchange (ETDEWEB)

    Li Ming; Kang Jinfeng; Wang Yangyuan [Institute of Microelectronics, Peking University, Beijing 100871 (China); Yang Liwu, E-mail: prettynecess@163.co [Semiconductor Manufacturing International Corporation, Shanghai 201203 (China)

    2010-02-15

    This paper presents a new circuit scheme to control the current surge in the boosting phase of an radio frequency idenfication-nonvolative memory pump. By introducing a circuit block consisting of a current reference and a current mirror, the new circuit scheme can keep the period-average current of the pump constantly below the desired level, for example, 2.5 {mu}A. Therefore, it can prevent the rectified supply of the RFID tag IC from collapsing in the boosting phase of the pump. The presented scheme could effectively reduce the voltage drop on the rectified supply from more than 50% to even zero, but could cost less area. Moreover, an analytical expression to calculate the boosting time of a pump in the new scheme is developed. (semiconductor integrated circuits)

  18. Two stage neural network modelling for robust model predictive control.

    Science.gov (United States)

    Patan, Krzysztof

    2017-11-02

    The paper proposes a novel robust model predictive control scheme realized by means of artificial neural networks. The neural networks are used twofold: to design the so-called fundamental model of a plant and to catch uncertainty associated with the plant model. In order to simplify the optimization process carried out within the framework of predictive control an instantaneous linearization is applied which renders it possible to define the optimization problem in the form of constrained quadratic programming. Stability of the proposed control system is also investigated by showing that a cost function is monotonically decreasing with respect to time. Derived robust model predictive control is tested and validated on the example of a pneumatic servomechanism working at different operating regimes. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Experimental bifurcation analysis of an impact oscillator - Tuning a non-invasive control scheme

    DEFF Research Database (Denmark)

    Bureau, Emil; Schilder, Frank; Santos, Ilmar

    2013-01-01

    We investigate a non-invasive, locally stabilizing control scheme necessary for an experimental bifurcation analysis. Our test-rig comprises a harmonically forced impact oscillator with hardening spring nonlinearity controlled by electromagnetic actuators, and serves as a prototype for electromag...

  20. Lyapunov-Based Control Scheme for Single-Phase Grid-Connected PV Central Inverters

    NARCIS (Netherlands)

    Meza, C.; Biel, D.; Jeltsema, D.; Scherpen, J. M. A.

    A Lyapunov-based control scheme for single-phase single-stage grid-connected photovoltaic central inverters is presented. Besides rendering the closed-loop system globally stable, the designed controller is able to deal with the system uncertainty that depends on the solar irradiance. A laboratory

  1. Design of zone-based bandwidth management scheme in IEEE 802.16 multi-hop relay networks

    Directory of Open Access Journals (Sweden)

    Chen Kuo-Yang

    2011-01-01

    Full Text Available Abstract IEEE 802.16 Wireless Network technology is a hot research issue in recent years. It provides wider coverage of radio and higher speed wireless access, and Quality-of-Service plays an important part in the standard. For mobile multi-hop wireless network, IEEE 802.16j/MR network not only can supply large area wireless deployment, but also can provide high quality network service to mobile users. Although Mobile QoS supporting has been extensively investigated, Mobile QoS supporting in the IEEE 802.16-MR network is relatively unexplored. In this article, the probability of a mobile user who visits a Relay Station (RS is known beforehand. With the visiting probability at each RS and the system specified size of the range for bandwidth allocation, Base Station (BS can calculate the required bandwidth to meet the mobile user's demand and allocate appropriate bandwidth for a mobile user roaming in the range of the bandwidth allocation. The range of bandwidth allocation for mobile users is called the Zone in this article, which includes the user's current RS and the nearby RSs. The proposed scheme is therefore called Zone-based bandwidth management scheme. The simulation results demonstrate that Zone-based bandwidth management scheme can reduce QoS degradation and bandwidth re-allocation overhead.

  2. 2016 Network Games, Control, and Optimization Conference

    CERN Document Server

    Jimenez, Tania; Solan, Eilon

    2017-01-01

    This contributed volume offers a collection of papers presented at the 2016 Network Games, Control, and Optimization conference (NETGCOOP), held at the University of Avignon in France, November 23-25, 2016. These papers highlight the increasing importance of network control and optimization in many networking application domains, such as mobile and fixed access networks, computer networks, social networks, transportation networks, and, more recently, electricity grids and biological networks. Covering a wide variety of both theoretical and applied topics in the areas listed above, the authors explore several conceptual and algorithmic tools that are needed for efficient and robust control operation, performance optimization, and better understanding the relationships between entities that may be acting cooperatively or selfishly in uncertain and possibly adversarial environments. As such, this volume will be of interest to applied mathematicians, computer scientists, engineers, and researchers in other relate...

  3. A memory efficient implementation scheme of Gauss error function in a Laguerre-Volterra network for neuroprosthetic devices

    Science.gov (United States)

    Li, Will X. Y.; Cui, Ke; Zhang, Wei

    2017-04-01

    Cognitive neural prosthesis is a manmade device which can be used to restore or compensate for lost human cognitive modalities. The generalized Laguerre-Volterra (GLV) network serves as a robust mathematical underpinning for the development of such prosthetic instrument. In this paper, a hardware implementation scheme of Gauss error function for the GLV network targeting reconfigurable platforms is reported. Numerical approximations are formulated which transform the computation of nonelementary function into combinational operations of elementary functions, and memory-intensive look-up table (LUT) based approaches can therefore be circumvented. The computational precision can be made adjustable with the utilization of an error compensation scheme, which is proposed based on the experimental observation of the mathematical characteristics of the error trajectory. The precision can be further customizable by exploiting the run-time characteristics of the reconfigurable system. Compared to the polynomial expansion based implementation scheme, the utilization of slice LUTs, occupied slices, and DSP48E1s on a Xilinx XC6VLX240T field-programmable gate array has decreased by 94.2%, 94.1%, and 90.0%, respectively. While compared to the look-up table based scheme, 1.0 ×1017 bits of storage can be spared under the maximum allowable error of 1.0 ×10-3 . The proposed implementation scheme can be employed in the study of large-scale neural ensemble activity and in the design and development of neural prosthetic device.

  4. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  5. Support Vector Machine Based Mobility Prediction Scheme in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Jiamei Chen

    2015-01-01

    Full Text Available To improve the intelligence of the mobile-aware applications in the heterogeneous wireless networks (HetNets, it is essential to establish an advanced mechanism to anticipate the change of the user location in every subnet for HetNets. This paper proposes a multiclass support vector machine based mobility prediction (Multi-SVMMP scheme to estimate the future location of mobile users according to the movement history information of each user in HetNets. In the location prediction process, the regular and random user movement patterns are treated differently, which can reflect the user movements more realistically than the existing movement models in HetNets. And different forms of multiclass support vector machines are embedded in the two mobility patterns according to the different characteristics of the two mobility patterns. Moreover, the introduction of target region (TR cuts down the energy consumption efficiently without impacting the prediction accuracy. As reported in the simulations, our Multi-SVMMP can overcome the difficulties found in the traditional methods and obtain a higher prediction accuracy and user adaptability while reducing the cost of prediction resources.

  6. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  7. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  8. Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks.

    Science.gov (United States)

    Yim, Yongbin; Kim, Kyong Hoon; Aldwairi, Monther; Kim, Ki-Il

    2017-12-30

    Mobile sink groups play crucial roles to perform their own missions in many wireless sensor network (WSN) applications. In order to support mobility of such sink groups, it is important to design a mechanism for effective discovery of the group in motion. However, earlier studies obtain group region information by periodic query. For that reason, the mechanism leads to significant signaling overhead due to frequent flooding for the query regardless of the group movement. Furthermore, the mechanism worsens the problem by the flooding in the whole expected area. To deal with this problem, we propose a novel mobile sink group support scheme with low communication cost, called Region-Shift-based Mobile Geocasting Protocol (RSMGP). In this study, we utilize the group mobility feature for which members of a group have joint motion patterns. Thus, we could trace group movement by shifting the region as much as partial members move out of the previous region. Furthermore, the region acquisition is only performed at the moment by just deviated members without collaboration of all members. Experimental results validate the improved signaling overhead of our study compared to the previous studies.

  9. iFrag: interference-aware frame fragmentation scheme for wireless sensor networks

    KAUST Repository

    Showail, Ahmad

    2014-05-01

    Reliable data transmission is a fundamental challenge in resource-constrained wireless sensor networks. In current implementations, a single bit error requires retransmitting the entire frame. This incurs extra processing overhead and power consumption, especially for large frames. Frame fragmentation into small blocks with individual error detection codes can reduce the unnecessary retransmission of the correctly received blocks. The optimal block size, however, varies based on the wireless channel conditions. In this paper, we propose an interference-aware frame fragmentation scheme called iFrag. iFrag dynamically adjusts the number of blocks inside a frame based on current channel conditions, and effectively addresses all challenges associated with such dynamic partitioning. Through analytical and experimental results, we show that iFrag achieves up to 3× improvement in goodput when the channel is noisy, while reducing the delay by 12 % compared to other static fragmentation approaches. On average, it shows a 13 % gain in goodput across all channel conditions used in our experiments. Our testbed results also show that iFrag lowers the energy consumed per useful bit by 60 %, as improved data transmission reliability reduces the number of frame retransmissions which increases the motes energy efficiency.

  10. HYBRID SYSTEM BASED FUZZY-PID CONTROL SCHEMES FOR UNPREDICTABLE PROCESS

    Directory of Open Access Journals (Sweden)

    M.K. Tan

    2011-07-01

    Full Text Available In general, the primary aim of polymerization industry is to enhance the process operation in order to obtain high quality and purity product. However, a sudden and large amount of heat will be released rapidly during the mixing process of two reactants, i.e. phenol and formalin due to its exothermic behavior. The unpredictable heat will cause deviation of process temperature and hence affect the quality of the product. Therefore, it is vital to control the process temperature during the polymerization. In the modern industry, fuzzy logic is commonly used to auto-tune PID controller to control the process temperature. However, this method needs an experienced operator to fine tune the fuzzy membership function and universe of discourse via trial and error approach. Hence, the setting of fuzzy inference system might not be accurate due to the human errors. Besides that, control of the process can be challenging due to the rapid changes in the plant parameters which will increase the process complexity. This paper proposes an optimization scheme using hybrid of Q-learning (QL and genetic algorithm (GA to optimize the fuzzy membership function in order to allow the conventional fuzzy-PID controller to control the process temperature more effectively. The performances of the proposed optimization scheme are compared with the existing fuzzy-PID scheme. The results show that the proposed optimization scheme is able to control the process temperature more effectively even if disturbance is introduced.

  11. Modification of the SUNFLUX solar radiation scheme with a new aerosol parameterization and its validation using observation network data

    Science.gov (United States)

    He, Yongjian; Sun, Zhi'an; Shi, Guoping; Liu, Jingmiao; Li, Jiandong

    2017-11-01

    SUNFLUX is a fast parameterization scheme for determination of the solar radiation at the Earth's surface. In this paper, SUNFLUX is further modified in the treatment of aerosols. A new aerosol parameterization scheme is developed for five aerosol species. Observational data from Baseline Surface Radiation Network (BSRN), Surface Radiation Budget Network (SURFRAD) and Aerosol Robotic Network (AERONET) stations are used to evaluate the accuracy of the original and modified SUNFLUX schemes. General meteorological data are available at SURFRAD stations, but not at BSRN stations. Therefore, the total precipitable water content and aerosol data are obtained from AERONET stations. Fourteen stations are selected from both BSRN and AERONET. Cloud fraction data from MODIS are further used to screen the cloud. Ten-year average aerosol mixing ratios simulated by the CAM-chem system are used to calculate the fractions of aerosol optical depth for each aerosol species, and these fractions are further used to convert the observed total aerosol optical depth into the components of individual species for use in the evaluations. The proper treatment of multiple aerosol types in the model is discussed. The evaluation results using SUNFLUX with the new aerosol scheme, in terms of the BSRN dataset, are better than those using the original aerosol scheme under clear-sky conditions. However, the results using the SURFRAD dataset are slightly worse, attributable to the differences in the input water vapor and aerosol optical depth. Sensitivity tests are conducted to investigate the error response of the SUNFLUX scheme to the errors in the input variables.

  12. Travelling Wave Pulse Coupled Oscillator (TWPCO) Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks

    Science.gov (United States)

    Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Recently, Pulse Coupled Oscillator (PCO)-based travelling waves have attracted substantial attention by researchers in wireless sensor network (WSN) synchronization. Because WSNs are generally artificial occurrences that mimic natural phenomena, the PCO utilizes firefly synchronization of attracting mating partners for modelling the WSN. However, given that sensor nodes are unable to receive messages while transmitting data packets (due to deafness), the PCO model may not be efficient for sensor network modelling. To overcome this limitation, this paper proposed a new scheme called the Travelling Wave Pulse Coupled Oscillator (TWPCO). For this, the study used a self-organizing scheme for energy-efficient WSNs that adopted travelling wave biologically inspired network systems based on phase locking of the PCO model to counteract deafness. From the simulation, it was found that the proposed TWPCO scheme attained a steady state after a number of cycles. It also showed superior performance compared to other mechanisms, with a reduction in the total energy consumption of 25%. The results showed that the performance improved by 13% in terms of data gathering. Based on the results, the proposed scheme avoids the deafness that occurs in the transmit state in WSNs and increases the data collection throughout the transmission states in WSNs. PMID:28056020

  13. Travelling Wave Pulse Coupled Oscillator (TWPCO Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks.

    Directory of Open Access Journals (Sweden)

    Zeyad Ghaleb Al-Mekhlafi

    Full Text Available Recently, Pulse Coupled Oscillator (PCO-based travelling waves have attracted substantial attention by researchers in wireless sensor network (WSN synchronization. Because WSNs are generally artificial occurrences that mimic natural phenomena, the PCO utilizes firefly synchronization of attracting mating partners for modelling the WSN. However, given that sensor nodes are unable to receive messages while transmitting data packets (due to deafness, the PCO model may not be efficient for sensor network modelling. To overcome this limitation, this paper proposed a new scheme called the Travelling Wave Pulse Coupled Oscillator (TWPCO. For this, the study used a self-organizing scheme for energy-efficient WSNs that adopted travelling wave biologically inspired network systems based on phase locking of the PCO model to counteract deafness. From the simulation, it was found that the proposed TWPCO scheme attained a steady state after a number of cycles. It also showed superior performance compared to other mechanisms, with a reduction in the total energy consumption of 25%. The results showed that the performance improved by 13% in terms of data gathering. Based on the results, the proposed scheme avoids the deafness that occurs in the transmit state in WSNs and increases the data collection throughout the transmission states in WSNs.

  14. PID Controller Based on Memristive CMAC Network

    Directory of Open Access Journals (Sweden)

    Lidan Wang

    2013-01-01

    Full Text Available Compound controller which consists of CMAC network and PID network is mainly used in control system, especially in robot control. It can realize nonlinear tracking control of the real-time dynamic trajectory and possesses good approximation effect. According to the structure and principle of the compound controller, memristor is introduced to CMAC network to be a compound controller in this paper. The new PID controller based on memristive CMAC network is built up by replacing the synapse in the original controller by memristors. The effect of curve approximation is obtained by MATLAB simulation experiments. This network improves the response and learning speed of the system and processes better robustness and antidisturbance performance.

  15. Physical control oriented model of large scale refrigerators to synthesize advanced control schemes. Design, validation, and first control results

    Science.gov (United States)

    Bonne, François; Alamir, Mazen; Bonnay, Patrick

    2014-01-01

    In this paper, a physical method to obtain control-oriented dynamical models of large scale cryogenic refrigerators is proposed, in order to synthesize model-based advanced control schemes. These schemes aim to replace classical user experience designed approaches usually based on many independent PI controllers. This is particularly useful in the case where cryoplants are submitted to large pulsed thermal loads, expected to take place in the cryogenic cooling systems of future fusion reactors such as the International Thermonuclear Experimental Reactor (ITER) or the Japan Torus-60 Super Advanced Fusion Experiment (JT-60SA). Advanced control schemes lead to a better perturbation immunity and rejection, to offer a safer utilization of cryoplants. The paper gives details on how basic components used in the field of large scale helium refrigeration (especially those present on the 400W @1.8K helium test facility at CEA-Grenoble) are modeled and assembled to obtain the complete dynamic description of controllable subsystems of the refrigerator (controllable subsystems are namely the Joule-Thompson Cycle, the Brayton Cycle, the Liquid Nitrogen Precooling Unit and the Warm Compression Station). The complete 400W @1.8K (in the 400W @4.4K configuration) helium test facility model is then validated against experimental data and the optimal control of both the Joule-Thompson valve and the turbine valve is proposed, to stabilize the plant under highly variable thermals loads. This work is partially supported through the European Fusion Development Agreement (EFDA) Goal Oriented Training Program, task agreement WP10-GOT-GIRO.

  16. An improved current control scheme for grid-connected DG unit based distribution system harmonic compensation

    DEFF Research Database (Denmark)

    He, Jinwei; Wei Li, Yun; Wang, Xiongfei

    2013-01-01

    In order to utilize DG unit interfacing converters to actively compensate distribution system harmonics, this paper proposes an enhanced current control approach. It seamlessly integrates system harmonic mitigation capabilities with the primary DG power generation function. As the proposed current...... controller has two well decoupled control branches to independently control fundamental and harmonic DG currents, phase-locked loops (PLL) and system harmonic component extractions can be avoided during system harmonic compensation. Moreover, a closed-loop power control scheme is also employed to derive...... the fundamental current reference. The proposed power control scheme effectively eliminates the impacts of steady-state fundamental current tracking errors in the DG units. Thus, an accurate power control is realized even when the harmonic compensation functions are activated. Experimental results from a single...

  17. Users’ classification-based call admission control with adaptive resource reservation for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Salman Ali AlQahtani

    2017-01-01

    In this paper, we introduce the user’s privileges and traffic maximum delay tolerance as additional dimensions in the call admission control processes to efficiently control the utilization of LTE-A network resources. Based on this idea, we propose an efficient call admission control scheme named “delay aware and user categorizing-based CAC with adaptive resource reservation (DA–UC-ARR”, where the user priority is adjusted dynamically based on the current network conditions and the users’ categorizations and traffic delay tolerances, to increase the network’s resource utilization and at the same time to maximize the operators’ revenue. In this proposed scheme, the users are classified into Golden users and Silver users, and the type of service per user is classified as real time (RT and non-real time (NRT services. We compare the performance of the proposed scheme with the corresponding results of previous schemes, referred to as the adaptive resource reservation-based call admission control (ARR-CAC (Andrews et al., 2010; AlQahtani, 2014, where user categorization and delay were not taken into consideration in the call admission control process. Simulation results indicate the superiority of the proposed scheme because it is able to achieve a better balance between system utilization, users’ privileges provided by network operators and QoS provisioning compared to the ARR-CAC scheme.

  18. A scheme of de-synchronization in globally coupled neural networks and its possible implications for vagus nerve stimulation

    Energy Technology Data Exchange (ETDEWEB)

    Li Yanlong [Institute of Theoretical Physics, Lanzhou University of Technology, Lanzhou 730050 (China) and Institute of Theoretical Physics, Lanzhou University, Lanzhou 730000 (China)], E-mail: liyl20031@126.com; Wu Min; Ma Jun [Institute of Theoretical Physics, Lanzhou University of Technology, Lanzhou 730050 (China); Chen Zhaoyang [Department of Chemistry, George Washington University, Washington, DC 20052 (United States); Wang Yinghai [Institute of Theoretical Physics, Lanzhou University, Lanzhou 730000 (China)

    2009-02-15

    A scheme of de-synchronization via pulse stimulation is numerically investigated in the Hindmarsh Rose globally coupled neural networks. The simulations show that synchronization evolves into de-synchronization in the globally coupled HR neural network when a part (about 10%) of neurons are stimulated with a pulse current signal. The network de-synchronization appears to be sensitive to the stimulation parameters. For the case of the same stimulation intensity, those weakly coupled networks reach de-synchronization more easily than strongly coupled networks. There exists a homologous asymptotic behavior in the region of higher frequency, and exist the optimal stimulation interval and period of continuous stimulation time when other stimulation parameters remain invariable.

  19. Additive Feed Forward Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1999-01-01

    This paper demonstrates a method to control a non-linear, multivariable, noisy process using trained neural networks. The basis for the method is a trained neural network controller acting as the inverse process model. A training method for obtaining such an inverse process model is applied....... A suitable 'shaped' (low-pass filtered) reference is used to overcome problems with excessive control action when using a controller acting as the inverse process model. The control concept is Additive Feed Forward Control, where the trained neural network controller, acting as the inverse process model......, is placed in a supplementary pure feed-forward path to an existing feedback controller. This concept benefits from the fact, that an existing, traditional designed, feedback controller can be retained without any modifications, and after training the connection of the neural network feed-forward controller...

  20. A unified framework for shared protection schemes in optical mesh network

    Directory of Open Access Journals (Sweden)

    Caroline Rocha

    2009-12-01

    Full Text Available While the advantages of p-cycles and FIPP p-cycles are well established, there has been no systematic analysis of how much bandwidth they consume in comparison with the classical shared link and path protection schemes. It was recently observed that, even enumerating a huge number of cycles, is not necessarily a guarantee for obtaining good quality solutions with the ILP models if tools for large scale programming are not used. We propose to investigate the bandwidth protection costs of p-cycles and FIPP p-cycles in comparison with those of shared link and path protection by applying the column generation technique to solve relaxed LP models for the four protection schemes, and then solving the resulting ILP models. Provably near-optimal solutions allow us to perform accurate quantitative comparisons on real-world networks.Embora as vantagens dos p-ciclos e FIPP p-ciclos estejam bem estabelecidas, não existe uma análise sistemática de quanta largura de banda eles consomem em comparação aos mecanismos clássicos de proteção compartilhada por caminhos e por links. Foi observado recentemente que a enumeração de um enorme número de ciclos não é necessariamente uma garantia de se obter soluções de boa qualidade se ferramentas para programação de larga escala não forem usadas. Nós propomos investigar os custos de proteção de largura de banda dos p-ciclos e FIPP p-ciclos em comparação com aqueles de proteção compartilhada por links e por caminhos, através da aplicação da técnica de geração de colunas para resolver modelos relaxados para os quatro esquemas de proteção. Em seguida, resolvemos os modelos de programação inteira resultantes. Soluções próximas da otimalidade nos permitem desempenhar comparações quantitativas exatas em redes reais.

  1. An energy-efficient and compact clustering scheme with temporary support nodes for cognitive radio sensor networks.

    Science.gov (United States)

    Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong

    2014-08-11

    A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members.

  2. Nonlinear H∞ Optimal Control Scheme for an Underwater Vehicle with Regional Function Formulation

    Directory of Open Access Journals (Sweden)

    Zool H. Ismail

    2013-01-01

    Full Text Available A conventional region control technique cannot meet the demands for an accurate tracking performance in view of its inability to accommodate highly nonlinear system dynamics, imprecise hydrodynamic coefficients, and external disturbances. In this paper, a robust technique is presented for an Autonomous Underwater Vehicle (AUV with region tracking function. Within this control scheme, nonlinear H∞ and region based control schemes are used. A Lyapunov-like function is presented for stability analysis of the proposed control law. Numerical simulations are presented to demonstrate the performance of the proposed tracking control of the AUV. It is shown that the proposed control law is robust against parameter uncertainties, external disturbances, and nonlinearities and it leads to uniform ultimate boundedness of the region tracking error.

  3. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  4. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  5. From network reliability to the Ising model: A parallel scheme for estimating the joint density of states.

    Science.gov (United States)

    Ren, Yihui; Eubank, Stephen; Nath, Madhurima

    2016-10-01

    Network reliability is the probability that a dynamical system composed of discrete elements interacting on a network will be found in a configuration that satisfies a particular property. We introduce a reliability property, Ising feasibility, for which the network reliability is the Ising model's partition function. As shown by Moore and Shannon, the network reliability can be separated into two factors: structural, solely determined by the network topology, and dynamical, determined by the underlying dynamics. In this case, the structural factor is known as the joint density of states. Using methods developed to approximate the structural factor for other reliability properties, we simulate the joint density of states, yielding an approximation for the partition function. Based on a detailed examination of why naïve Monte Carlo sampling gives a poor approximation, we introduce a parallel scheme for estimating the joint density of states using a Markov-chain Monte Carlo method with a spin-exchange random walk. This parallel scheme makes simulating the Ising model in the presence of an external field practical on small computer clusters for networks with arbitrary topology with ∼10^{6} energy levels and more than 10^{308} microstates.

  6. A Hybrid Combination Scheme for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Changhua Yao

    2014-01-01

    Full Text Available We propose a novel hybrid combination scheme in cooperative spectrum sensing (CSS, which utilizes the diversity of reporting channels to achieve better throughput performance. Secondary users (SUs with good reporting channel quality transmit quantized local observation statistics to fusion center (FC, while others report their local decisions. FC makes the final decision by carrying out hybrid combination. We derive the closed-form expressions of throughput and detection performance as a function of the number of SUs which report local observation statistics. The simulation and numerical results show that the hybrid combination scheme can achieve better throughput performance than hard combination scheme and soft combination scheme.

  7. On adaptive control of mobile slotted aloha networks

    Directory of Open Access Journals (Sweden)

    Lim J.-T.

    1995-01-01

    Full Text Available An adaptive control scheme for mobile slotted ALOHA is presented and the effect of capture on the adaptive control scheme is investigated. It is shown that with the proper choice of adaptation parameters the adaptive control scheme can be made independent of the effect of capture.

  8. Cloud-based Networked Visual Servo Control

    DEFF Research Database (Denmark)

    Wu, Haiyan; Lu, Lei; Chen, Chih-Chung

    2013-01-01

    feedback, ii) a stabilizing control law for the networked visual servo control system with time-varying feedback time delay, and iii) a sending rate scheduling strategy aiming at reducing the communication network load. The performance of the networked visual servo control system with sending rate......The performance of vision-based control systems, in particular of highly dynamic vision-based motion control systems, is often limited by the low sampling rate of the visual feedback caused by the long image processing time. In order to overcome this problem, the networked visual servo control......, which integrates networked computational resources for cloud image processing, is considered in this article. The main contributions of this article are i) a real-time transport protocol for transmitting large volume image data on a cloud computing platform, which enables high sampling rate visual...

  9. Design of proportional-derivative-type state feedback controllers for congestion control of transmission control protocol networks

    Science.gov (United States)

    Azadegan, Masoumeh; Beheshti, Mohammad T. H.; Tavassoli, Babak

    2015-07-01

    A new proportional-derivative-type state feedback controller is proposed for congestion control of transmission control protocol (TCP) networks. An analytical TCP model is adopted. In the proposed control scheme, it is possible to efficiently control the TCP traffic using only the queue length at the router without the need to know the TCP window size which is not available locally. The results are presented in terms of delay-dependent linear matrix inequality. The proposed method is verified by simulation examples using NS software, and the effectiveness and superiority of our method over other control schemes, such as the proportional-integral, random early detection and generalised minimum variancemethods, are also shown.

  10. Trends in Integrated Ship Control Networking

    DEFF Research Database (Denmark)

    Jørgensen, N.; Nielsen, Jens Frederik Dalsgaard

    1997-01-01

    Integrated Ship Control systems can be designed as robust, distributed, autonomous control systems. The EU funded ATOMOS and ATOMOS II projects involves both technical and non technical aspects of this process. A reference modelling concept giving an outline of a generic ISC system covering...... the network and the equipment connected to it, a framework for verification of network functionality and performance by simulation and a general distribution platform for ISC systems, The ATOMOS Network, are results of this work....

  11. Design, implementation and testing of a fuzzy control scheme for laser welding

    NARCIS (Netherlands)

    Jauregui Becker, Juan Manuel; Aalderink, B.J.; Aalderink, Benno; Aarts, Ronald G.K.M.; Olde Benneker, Jeroen; Meijer, J.

    2008-01-01

    A fuzzy logic controller (FLC) scheme has been developed for laser welding. Process light emissions are measured and combined to determine the current status of the welding process. If the process is not in a desired welding state, the FLC will adapt the laser power. The FLC has been demonstrated

  12. An Adaptive Measurement Report Period and Handoff Threshold Scheme Based on SINR Variation in LTE-A Networks

    Directory of Open Access Journals (Sweden)

    Jenhui Chen

    2015-01-01

    Full Text Available This paper deals with the problem of triggering handoff procedure at an appropriate point of time to reduce the ping-pong effect problem in the long-term evolution advanced (LTE-A network. In the meantime, we also have studied a dynamic handoff threshold scheme, named adaptive measurement report period and handoff threshold (AMPHT, based on the user equipment’s (UE’s reference signal received quality (RSRQ variation and the moving velocity of UE. AMPHT reduces the probability of unnecessarily premature handoff decision making and also avoids the problem of handoff failure due to too late handoff decision making when the moving velocity of UE is high. AMPHT is achieved by two critical parameters: (1 a dynamic RSRQ threshold for handoff making; (2 a dynamic interval of time for the UE’s RSRQ reporting. The performance of AMPHT is validated by comparing numerical experiments (MATLAB tool with simulation results (the ns-3 LENA module. Our experiments show that AMPHT reduces the premature handoff probability by 34% at most in a low moving velocity and reduces the handoff failure probability by 25% in a high moving velocity. Additionally, AMPHT can reduce a large number of unnecessary handoff overheads and can be easily implemented because it uses the original control messages of 3GPP E-UTRA.

  13. Optimization of ITS Construction Scheme for Road Network under the Restriction of Different Transports’ Passenger Person-Kilometers

    Directory of Open Access Journals (Sweden)

    Ming-wei Li

    2017-01-01

    Full Text Available Diversified transport modes and increased personal transportation demands have increased in urban traffic problems such as traffic congestion and environmental pollution. To cope with traffic problems, advanced transportation technologies are being developed as intelligent transportation system (ITS. There is a growing trend to coordinate varying kinds of transportation modes. However, the effective construction and application of ITS in urban traffic can be affected by many factors, such as transport mode. Therefore, how to reasonably construct ITS by consideration of different transport modes’ characteristics and requirements is an important research challenge. Additionally, both costs and negative effects must be minimized and application efficiency is required to be optimal in the construction process. To address these requirements, a multiobjective optimization model and a fuzzy selecting optimum model were combined to study the construction scheme based on optimization results. The empirical analysis of Beijing, China, suggested several considerations for improvements to future road network ITS construction with controlled costs. Finally, guidelines are proposed to facilitate ITS construction, improve ITS application efficiency, and transform and innovate strategies to cope with urban traffic.

  14. Neural Networks for Non-linear Control

    DEFF Research Database (Denmark)

    Sørensen, O.

    1994-01-01

    This paper describes how a neural network, structured as a Multi Layer Perceptron, is trained to predict, simulate and control a non-linear process.......This paper describes how a neural network, structured as a Multi Layer Perceptron, is trained to predict, simulate and control a non-linear process....

  15. Simulation of one-dimensional blood flow in networks of human vessels using a novel TVD scheme.

    Science.gov (United States)

    Huang, P G; Muller, L O

    2015-05-01

    An extension of a total variation diminishing (TVD) scheme to solve one-dimensional (1D) blood flow for human circulation is proposed. This method is simple as it involves only a few modifications to existing shock-capturing TVD schemes. We have applied the method to a wide range of test cases including a complete simulation of the human vascular network. Excellent solutions have been demonstrated for problems involving varying and discontinuous mechanical properties of blood vessels. For 1D network simulations, the method has been shown to agree well with the reported computational results. Finally, the method has been demonstrated to compare favorably with in vivo experiments set up to study the impact of circle of Willis anomalies on flow patterns in the cerebral arterial system. Copyright © 2015 John Wiley & Sons, Ltd.

  16. Stress controls the mechanics of collagen networks

    Science.gov (United States)

    Licup, Albert James; Münster, Stefan; Sharma, Abhinav; Sheinman, Michael; Jawerth, Louise M.; Fabry, Ben; Weitz, David A.; MacKintosh, Fred C.

    2015-01-01

    Collagen is the main structural and load-bearing element of various connective tissues, where it forms the extracellular matrix that supports cells. It has long been known that collagenous tissues exhibit a highly nonlinear stress–strain relationship, although the origins of this nonlinearity remain unknown. Here, we show that the nonlinear stiffening of reconstituted type I collagen networks is controlled by the applied stress and that the network stiffness becomes surprisingly insensitive to network concentration. We demonstrate how a simple model for networks of elastic fibers can quantitatively account for the mechanics of reconstituted collagen networks. Our model points to the important role of normal stresses in determining the nonlinear shear elastic response, which can explain the approximate exponential relationship between stress and strain reported for collagenous tissues. This further suggests principles for the design of synthetic fiber networks with collagen-like properties, as well as a mechanism for the control of the mechanics of such networks. PMID:26195769

  17. Evaluation of a Neural-Network-Based adaptive Beamforming Scheme with Magnitude-Only Constraints

    NARCIS (Netherlands)

    Castaldi, G.; Galdi, V.; Gerini, G.

    2009-01-01

    In this paper, we present an adaptive beamforming scheme for smart antenna arrays in the presence of several desired and interfering signals, and additive white Gaussian noise. As compared with standard schemes, the proposed algorithm minimizes the noise and interference contributions, but enforces

  18. Modeling, Optimization & Control of Hydraulic Networks

    DEFF Research Database (Denmark)

    Tahavori, Maryamsadat

    2014-01-01

    in water network is pressure management. By reducing the pressure in the water network, the leakage can be reduced significantly. Also it reduces the amount of energy consumption in water networks. The primary purpose of this work is to develop control algorithms for pressure control in water supply....... The nonlinear network model is derived based on the circuit theory. A suitable projection is used to reduce the state vector and to express the model in standard state-space form. Then, the controllability of nonlinear nonaffine hydraulic networks is studied. The Lie algebra-based controllability matrix is used...... to solve nonlinear optimal control problems. In the water supply system model, the hydraulic resistance of the valve is estimated by real data and it is considered to be a disturbance. The disturbance in our system is updated every 24 hours based on the amount of water usage by consumers every day. Model...

  19. Information spread in networks: Games, optimal control, and stabilization

    Science.gov (United States)

    Khanafer, Ali

    on the network. To this end, we propose a distributed version of the classical logic-based supervisory control scheme. Given a network of agents whose dynamics contain unknown parameters, the distributed supervisory control scheme is used to assist the agents to converge to a certain set-point without requiring them to have explicit knowledge of that set-point. Unlike the classical supervisory control scheme where a centralized supervisor makes switching decisions among the candidate controllers, in our scheme, each agent is equipped with a local supervisor that switches among the available controllers. The switching decisions made at a certain agent depend only on the information from its neighboring agents. We provide sufficient conditions for stabilization and apply our framework to the distributed averaging problem in the presence of large modeling uncertainty. For infected networks, we study the stability properties of a susceptible-infected-susceptible (SIS) diffusion model, so-called the n-intertwined Markov model, over arbitrary network topologies. Similar to the majority of infection spread dynamics, this model exhibits a threshold phenomenon. When the curing rates in the network are high, the all-healthy state is the unique equilibrium over the network. Otherwise, an endemic equilibrium state emerges, where some infection remains within the network. Using notions from positive systems theory, we provide conditions for the global asymptotic stability of the equilibrium points in both cases over strongly and weakly connected directed networks based on the value of the basic reproduction number, a fundamental quantity in the study of epidemics. Furthermore, we demonstrate that the n-intertwined Markov model can be viewed as a best-response dynamical system of a concave game among the nodes. This characterization allows us to cast new infection spread dynamics; additionally, we provide a sufficient condition, for the global convergence to the all-healthy state

  20. A Strategic Bargaining Game for a Spectrum Sharing Scheme in Cognitive Radio-Based Heterogeneous Wireless Sensor Networks.

    Science.gov (United States)

    Mao, Yuxing; Cheng, Tao; Zhao, Huiyuan; Shen, Na

    2017-11-27

    In Wireless Sensor Networks (WSNs), unlicensed users, that is, sensor nodes, have excessively exploited the unlicensed radio spectrum. Through Cognitive Radio (CR), licensed radio spectra, which are owned by licensed users, can be partly or entirely shared with unlicensed users. This paper proposes a strategic bargaining spectrum-sharing scheme, considering a CR-based heterogeneous WSN (HWSN). The sensors of HWSNs are discrepant and exist in different wireless environments, which leads to various signal-to-noise ratios (SNRs) for the same or different licensed users. Unlicensed users bargain with licensed users regarding the spectrum price. In each round of bargaining, licensed users are allowed to adaptively adjust their spectrum price to the best for maximizing their profits. . Then, each unlicensed user makes their best response and informs licensed users of "bargaining" and "warning". Through finite rounds of bargaining, this scheme can obtain a Nash bargaining solution (NBS), which makes all licensed and unlicensed users reach an agreement. The simulation results demonstrate that the proposed scheme can quickly find a NBS and all players in the game prefer to be honest. The proposed scheme outperforms existing schemes, within a certain range, in terms of fairness and trade success probability.

  1. RLAM: A Dynamic and Efficient Reinforcement Learning-Based Adaptive Mapping Scheme in Mobile WiMAX Networks

    OpenAIRE

    M. Louta; Sarigiannidis, P.; Misra, S.; P. Nicopolitidis; Papadimitriou, G.

    2014-01-01

    WiMAX (Worldwide Interoperability for Microwave Access) constitutes a candidate networking technology towards the 4G vision realization. By adopting the Orthogonal Frequency Division Multiple Access (OFDMA) technique, the latest IEEE 802.16x amendments manage to provide QoS-aware access services with full mobility support. A number of interesting scheduling and mapping schemes have been proposed in research literature. However, they neglect a considerable asset of the OFDMA-based wireless sys...

  2. Synchronous digital implementation of the AER communication scheme for emulating large-scale spiking neural networks models

    OpenAIRE

    Moreno Aróstegui, Juan Manuel; Madrenas Boadas, Jordi; Kotynia, L.

    2009-01-01

    In this paper we shall present a fully synchronous digital implementation of the Address Event Representation (AER) communication scheme that has been used in the PERPLEXUS chip in order to permit the emulation of large-scale biologically inspired spiking neural networks models. By introducing specific commands in the AER protocol it is possible to distribute the AER bus among a large number of chips where the functionality of the spiking neurons is being emulated. A c...

  3. Distributed controller clustering in software defined networks.

    Directory of Open Access Journals (Sweden)

    Ahmed Abdelaziz

    Full Text Available Software Defined Networking (SDN is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN SDN and Open Network Operating System (ONOS controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.

  4. Distributed controller clustering in software defined networks.

    Science.gov (United States)

    Abdelaziz, Ahmed; Fong, Ang Tan; Gani, Abdullah; Garba, Usman; Khan, Suleman; Akhunzada, Adnan; Talebian, Hamid; Choo, Kim-Kwang Raymond

    2017-01-01

    Software Defined Networking (SDN) is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs) brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN) SDN and Open Network Operating System (ONOS) controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.

  5. Trust recovery model of Ad Hoc network based on identity authentication scheme

    Science.gov (United States)

    Liu, Jie; Huan, Shuiyuan

    2017-05-01

    Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.

  6. A Reconfiguration Control Scheme for a Quadrotor Helicopter via Combined Multiple Models

    Directory of Open Access Journals (Sweden)

    Fuyang Chen

    2014-08-01

    Full Text Available In this paper, an optimal reconfiguration control scheme is proposed for a quadrotor helicopter with actuator faults via adaptive control and combined multiple models. The combined models set contains several fixed models, an adaptive model and a reinitialized adaptive model. The fixed models and the adaptive model can describe the failure system under different fault conditions. Moreover, the proposed reinitialized adaptive model refers to the closest model of the current system and can improve the speed of convergence effectively. In addition, the reference model is designed in consideration of an optimal control performance index and the principle of the minimum cost to achieve perfect tracking performance. Finally, some simulation results demonstrate the effectiveness of the proposed reconfiguration control scheme for faulty cases.

  7. A Power System Emergency Control Scheme in the Presence of High Wind Power Penetration

    DEFF Research Database (Denmark)

    Hoseinzadeh, Bakhtyar

    . Utilization of all of locally measurable variables, e.g. frequency, its rate of change, voltage drop, power flow direction under an integrated decentralized plan is done in this project, in order to improve the grid reliability. The proposed scheme benefits from a decentralized strategy, which reduces....... The load-frequency control as an ancillary service provided by renewable energy sources and load shedding as an emergency control should be localized. It means that the active power deficit should be compensated locally at vicinity of event location in order to avoid transferring the demanded active power...... from distant units to the incidence place. In this thesis, localization of both load-frequency control an load shedding are fulfilled using locally measured voltage drop data in the decentralized control strategy. The proposed load shedding scheme is coordinated with existing plant protection relays...

  8. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  9. Study on Control Scheme for the Inverters in Low Voltage Microgrid with Nonlinear Loads

    Science.gov (United States)

    Xu, Jiqiang; Lu, Wenzhou; Wu, Lei

    2017-05-01

    There are a lot of nonlinear loads in real low voltage microgrid system. It will cause serious output voltage and grid current harmonic distortions problems in island and grid-connected modes, respectively. To solve this problem, this paper proposes a droop control scheme with quasi-proportion and resonant (quasi-PR) controller based on αβ stationary reference frame to make microgrid smoothly switch between grid-connected and island modes without changing control method. Moreover, in island mode, not only stable output voltage and frequency, but also reduced output voltage harmonics with added nonlinear loads can be achieved; In grid-connected mode, not only constant power, but also reduced grid current harmonics can be achieved. Simulation results verify the effectiveness of the proposed control scheme.

  10. Detecting controlling nodes of boolean regulatory networks.

    Science.gov (United States)

    Schober, Steffen; Kracht, David; Heckel, Reinhard; Bossert, Martin

    2011-10-11

    Boolean models of regulatory networks are assumed to be tolerant to perturbations. That qualitatively implies that each function can only depend on a few nodes. Biologically motivated constraints further show that functions found in Boolean regulatory networks belong to certain classes of functions, for example, the unate functions. It turns out that these classes have specific properties in the Fourier domain. That motivates us to study the problem of detecting controlling nodes in classes of Boolean networks using spectral techniques. We consider networks with unbalanced functions and functions of an average sensitivity less than 23k, where k is the number of controlling variables for a function. Further, we consider the class of 1-low networks which include unate networks, linear threshold networks, and networks with nested canalyzing functions. We show that the application of spectral learning algorithms leads to both better time and sample complexity for the detection of controlling nodes compared with algorithms based on exhaustive search. For a particular algorithm, we state analytical upper bounds on the number of samples needed to find the controlling nodes of the Boolean functions. Further, improved algorithms for detecting controlling nodes in large-scale unate networks are given and numerically studied.

  11. Hierarchical Control Scheme for Improving Transient Voltage Recovery of a DFIG-Based WPP

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jinho; Muljadi, Eduard; Kang, Yong Cheol

    2015-06-05

    Modern grid codes require that wind power plants (WPPs) inject reactive power according to the voltage dip at a point of interconnection (POI). This requirement helps to support a POI voltage during a fault. However, if a fault is cleared, the POI and wind turbine generator (WTG) voltages are likely to exceed acceptable levels unless the WPP reduces the injected reactive power quickly. This might deteriorate the stability of a grid by allowing the disconnection of WTGs to avoid any damage. This paper proposes a hierarchical control scheme of a doubly-fed induction generator (DFIG)-based WPP. The proposed scheme aims to improve the reactive power injecting capability during the fault and suppress the overvoltage after the fault clearance. To achieve the former, an adaptive reactive power-to-voltage scheme is implemented in each DFIG controller so that a DFIG with a larger reactive power capability will inject more reactive power. To achieve the latter, a washout filter is used to capture a high frequency component contained in the WPP voltage, which is used to remove the accumulated values in the proportional-integral controllers. Test results indicate that the scheme successfully supports the grid voltage during the fault, and recovers WPP voltages without exceeding the limit after the fault clearance.

  12. Congestion control algorithms in wireless sensor networks: Trends and opportunities

    Directory of Open Access Journals (Sweden)

    Syed Afsar Shah

    2017-07-01

    Full Text Available Congestion control is an extremely important area within wireless sensor networks (WSN, where traffic becomes greater than the aggregated or individual capacity of the underlying channels. Therefore, special considerations are required to develop more sophisticated techniques to avoid, detect, and resolve congestion. The constrained resources of the WSN must be considered while devising such techniques to achieve the maximum throughput. Various approaches have been introduced in the past few years that include routing protocols aided with congestion detection and control mechanism, and dedicated congestion control protocols. In the former schemes, the congestion avoidance is performed by the sink node that causes topology reset and bulk traffic drop. As a consequence, the latter mentioned congestion control protocols addressing the congestion avoidance, detection, and resolution were introduced at the node level. In this paper, we explore mechanisms for controlling congestion in the WSNs and present a comparative study. The congestion control schemes are categorized as centralized with partial congestion control and distributed with dedicated congestion control.

  13. MPC control of water supply networks

    DEFF Research Database (Denmark)

    Baunsgaard, Kenneth Marx Hoe; Ravn, Ole; Kallesoe, Carsten Skovmose

    2016-01-01

    This paper investigates the modelling and predictive control of a drinking water supply network with the aim of minimising the energy and economic cost. A model predictive controller, MPC, is applied to a nonlinear model of a drinking water network that follows certain constraints to maintain......, controlling the drinking water supply network with the MPC showed reduction of the energy and the economic cost of running the system. This has been achieved by minimising actuator control effort and by shifting the actuator use towards the night time, where energy prices are lower. Along with energy cost...

  14. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  15. Self-Tuning Vibration Control of a Rotational Flexible Timoshenko Arm Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Minoru Sasaki

    2012-01-01

    Full Text Available A self-tuning vibration control of a rotational flexible arm using neural networks is presented. To the self-tuning control system, the control scheme consists of gain tuning neural networks and a variable-gain feedback controller. The neural networks are trained so as to make the root moment zero. In the process, the neural networks learn the optimal gain of the feedback controller. The feedback controller is designed based on Lyapunov's direct method. The feedback control of the vibration of the flexible system is derived by considering the time rate of change of the total energy of the system. This approach has the advantage over the conventional methods in the respect that it allows one to deal directly with the system's partial differential equations without resorting to approximations. Numerical and experimental results for the vibration control of a rotational flexible arm are discussed. It verifies that the proposed control system is effective at controlling flexible dynamical systems.

  16. A fully distributed geo-routing scheme for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2013-12-01

    When marrying randomized distributed space-time coding (RDSTC) to beaconless geo-routing, new performance horizons can be created. In order to reach those horizons, however, beaconless geo-routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geo-routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes. © 2013 IEEE.

  17. Emergence of bimodality in controlling complex networks

    CERN Document Server

    Jia, Tao; Csóka, Endre; Pósfai, Márton; Slotine, Jean-Jacques; Barabási, Albert-László

    2015-01-01

    Our ability to control complex systems is a fundamental challenge of contemporary science. Recently introduced tools to identify the driver nodes, nodes through which we can achieve full control, predict the existence of multiple control configurations, prompting us to classify each node in a network based on their role in control. Accordingly a node is critical, intermittent or redundant if it acts as a driver node in all, some or none of the control configurations. Here we develop an analytical framework to identify the category of each node, leading to the discovery of two distinct control modes in complex systems: centralized vs distributed control. We predict the control mode for an arbitrary network and show that one can alter it through small structural perturbations. The uncovered bimodality has implications from network security to organizational research and offers new insights into the dynamics and control of complex systems.

  18. Output feedback control of a quadrotor UAV using neural networks.

    Science.gov (United States)

    Dierks, Travis; Jagannathan, Sarangapani

    2010-01-01

    In this paper, a new nonlinear controller for a quadrotor unmanned aerial vehicle (UAV) is proposed using neural networks (NNs) and output feedback. The assumption on the availability of UAV dynamics is not always practical, especially in an outdoor environment. Therefore, in this work, an NN is introduced to learn the complete dynamics of the UAV online, including uncertain nonlinear terms like aerodynamic friction and blade flapping. Although a quadrotor UAV is underactuated, a novel NN virtual control input scheme is proposed which allows all six degrees of freedom (DOF) of the UAV to be controlled using only four control inputs. Furthermore, an NN observer is introduced to estimate the translational and angular velocities of the UAV, and an output feedback control law is developed in which only the position and the attitude of the UAV are considered measurable. It is shown using Lyapunov theory that the position, orientation, and velocity tracking errors, the virtual control and observer estimation errors, and the NN weight estimation errors for each NN are all semiglobally uniformly ultimately bounded (SGUUB) in the presence of bounded disturbances and NN functional reconstruction errors while simultaneously relaxing the separation principle. The effectiveness of proposed output feedback control scheme is then demonstrated in the presence of unknown nonlinear dynamics and disturbances, and simulation results are included to demonstrate the theoretical conjecture.

  19. A Novel Rate Control Scheme for Constant Bit Rate Video Streaming

    Directory of Open Access Journals (Sweden)

    Venkata Phani Kumar M

    2015-08-01

    Full Text Available In this paper, a novel rate control mechanism is proposed for constant bit rate video streaming. The initial quantization parameter used for encoding a video sequence is determined using the average spatio-temporal complexity of the sequence, its resolution and the target bit rate. Simple linear estimation models are then used to predict the number of bits that would be necessary to encode a frame for a given complexity and quantization parameter. The experimental results demonstrate that our proposed rate control mechanism significantly outperforms the existing rate control scheme in the Joint Model (JM reference software in terms of Peak Signal to Noise Ratio (PSNR and consistent perceptual visual quality while achieving the target bit rate. Furthermore, the proposed scheme is validated through implementation on a miniature test-bed.

  20. Baseline scheme for polarization preservation and control in the MEIC ion complex

    Energy Technology Data Exchange (ETDEWEB)

    Derbenev, Yaroslav S. [Jefferson Lab, Newport News, VA (United States); Lin, Fanglei [Jefferson Lab, Newport News, VA (United States); Morozov, Vasiliy [Jefferson Lab, Newport News, VA (United States); Zhang, Yuhong [Jefferson Lab, Newport News, VA (United States); Kondratenko, Anatoliy [Science and Technique Laboratory Zaryad, Novosibirsk (Russian Federation); Kondratenko, M. A. [Science and Technique Laboratory Zaryad, Novosibirsk (Russian Federation); Filatov, Yury [MIPT, Dolgoprudny, Moscow (Russian Federation)

    2015-09-01

    The scheme for preservation and control of the ion polarization in the Medium-energy Electron-Ion Collider (MEIC) has been under active development in recent years. The figure-8 configuration of the ion rings provides a unique capability to control the polarization of any ion species including deuterons by means of "weak" solenoids rotating the particle spins by small angles. Insertion of "weak" solenoids into the magnetic lattices of the booster and collider rings solves the problem of polarization preservation during acceleration of the ion beam. Universal 3D spin rotators designed on the basis of "weak" solenoids allow one to obtain any polarization orientation at an interaction point of MEIC. This paper presents the baseline scheme for polarization preservation and control in the MEIC ion complex.