To cope with the constraint problem of power consumption and transmission delay in the virtual backbone of wireless sensor network, a distributed connected dominating set (CDS) algorithm with (α,β)-constraints i...To cope with the constraint problem of power consumption and transmission delay in the virtual backbone of wireless sensor network, a distributed connected dominating set (CDS) algorithm with (α,β)-constraints is proposed. Based on the (α, β)-tree concept, a new connected dominating tree with bounded transmission delay problem(CDTT) is defined and a corresponding algorithm is designed to construct a CDT-tree which can trade off limited total power and bounded transmission delay from source to destination nodes. The CDT algorithm consists of two phases: The first phase constructs a maximum independent set(MIS)in a unit disk graph model. The second phase estimates the distance and calculates the transmission power to construct a spanning tree in an undirected graph with different weights for MST and SPF, respectively. The theoretical analysis and simulation results show that the CDT algorithm gives a correct solution to the CDTF problem and forms a virtual backbone with( α,β)-constraints balancing the requirements of power consumption and transmission delay.展开更多
In this paper, we develop a decentralized algorithm to coord inate a group of mobile robots to search for unknown and transient radio sources. In addition to limited mobility and ranges of communication and sensing, t...In this paper, we develop a decentralized algorithm to coord inate a group of mobile robots to search for unknown and transient radio sources. In addition to limited mobility and ranges of communication and sensing, the robot team has to deal with challenges from signal source anonymity, short transmission duration, and variable transmission power. We propose a two-step approach: First, we decentralize belief functions that robots use to track source locations using checkpoint-based synchronization, and second, we propose a decentralized planning strategy to coordinate robots to ensure the existence of checkpoints. We analyze memory usage, data amount in communication, and searching time for the proposed algorithm. We have implemented the proposed algorithm and compared it with two heuristics. The experimental results show that our algorithm successfully trades a modest amount of memory for the fastest searching time among the three methods.展开更多
A new power divider, composed of a novel composite right/left-handed (CRLH) transmission line (TL) unit, is proposed. The properties of the power divider based on four CRLH TL unit cells are investigated theoretically...A new power divider, composed of a novel composite right/left-handed (CRLH) transmission line (TL) unit, is proposed. The properties of the power divider based on four CRLH TL unit cells are investigated theoretically. By adjusting the parameters of the capacitors and the inductors, the power divider shows perfectly symmetric power division at 5.13 GHz, return loss up to ?24 dB, with the transmitted power being close to ?3.1 dB. The phenomena are demonstrated by simulation results. Being compact in size and low-cost, the proposed power divider is very suitable for microwave and millimeter wave integrated circuits.展开更多
In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payme...In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world.展开更多
Transient electromagnetic method (TEM),as a non-seismic geophysical exploration mainstream electromagnetic method,is widely used in oil,gas,mineral and other underground resources exploration areas. The coil sensor is...Transient electromagnetic method (TEM),as a non-seismic geophysical exploration mainstream electromagnetic method,is widely used in oil,gas,mineral and other underground resources exploration areas. The coil sensor is generally used to collect data. In view of the problems of incomplete information of the abnormal body and the data loss in the existing TEM single-component coil sensor,a three-component TEM coil sensor is designed. By analyzing the relationship between sensor sensitivity and coil structure parameters,the coil structure and turns are designed. By analyzing the frequency response characteristics of the TEM magnetic field sensor,the signal distortion is reduced by using the under-damped matching mode. By analyzing the distribution of various noise sources of the magnetic sensor,the appropriate amplifier is selected to reduce the background noise. Finally,a three-component TEM induction magnetic field sensor is designed. The weight of the sensor is controlled at 3.2 kg and the working frequency is 10 mHz-10 kHz. The background noises of X and Y components probably keep in 1.5×10^-8 V/ Hz and sensitivities are 8.4 and 9.8 nT/s,respectively,the background noise of vertical component is 2.1× 10^-7 V/ Hz and sensitivity is 18.5 nT/s. Compared with the existing single-component TEM receiving magnetic field sensor,the designed sensor realizes the signal acquisition of three components. Without too much increase in volume and total weight,it improves the sensitivity of the sensor and reduces the background noise,thus the signal-to-noise ratio (SNR) of the signal is improved.展开更多
Many efforts have been made to develop time division multiple access (TDMA) slots allocation in a multi-hop converge-cast wireless sensor network (WSN), however, most of them either use complex algorithm or concer...Many efforts have been made to develop time division multiple access (TDMA) slots allocation in a multi-hop converge-cast wireless sensor network (WSN), however, most of them either use complex algorithm or concern frames only without simultaneous transmission in a single slot. In this paper, we present a timeslot assignment scheme for cluster-tree-based TDMA WSN, co:'ering three frequently used working modes in practical applications. The shortest frame formed can guarantee real-time conununication and is also facilitated for message and slot integration, since timeslots allocated to a single node are continuous. During allocation processes, the algorithms are distributed and light-weighted. The experiment resulted from a WSN prototype system shows that our scheme can achieve a good reliability.展开更多
Different schemes, which performed channel, power and time allocation to enhance the network performance of overall end-to-end throughput for cooperative cognitive radio network, were investigated. Interference temper...Different schemes, which performed channel, power and time allocation to enhance the network performance of overall end-to-end throughput for cooperative cognitive radio network, were investigated. Interference temperature limit of corresponding primary users was considered. Due to the constraints caused by multiple dual channels, the power allocation problem is non-convex and NP-hard. Based on geometric programming (GP), a novel and general algorithm, which turned the problem into a series of GP problems by logarithm approximation (LASGP), was proposed to efficiently solve it. Numerical results verify the efficiency and availability of the LASGP algorithm. Solutions of LASGP are provably convergent and globally optimal point can be observed as well as the channel allocation always outperforms power or timeslot allocation from simulations. Compared with schemes without any allocation, the scheme with joint channel, power and timeslot allocation significantly increases the overall end-to-end throughput by no less than 70% under same simulation conditions. This scheme can not only maximize the throughput by increasing total maximum power of relay node, but also outperform other resource allocation schemes when lower total maximum power of source and relay nodes is restricted. As the total maximum power of source node increases, the scheme with joint channel and timeslot allocation performs best in all schemes.展开更多
This paper presents a wavelet-based technique for detection and classification of normal and abnormal conditions that occur on power distribution lines. The proposed technique depends on a sensitive fault detection pa...This paper presents a wavelet-based technique for detection and classification of normal and abnormal conditions that occur on power distribution lines. The proposed technique depends on a sensitive fault detection parameter (denoted DET) calculated from the wavelet multi-resolution decomposition of the three phase currents only. This parameter is fast and sensitive to any small changes in the current signal since it uses the square of the first and second details of the decomposed signals. The simulation results of this study clearly show that the proposed technique can be successfully used to detect and classify not only low-current faults that could not be detected by conventional overcurrent relays but also normal transients like load switching and inrush currents.展开更多
Wireless local area network(WLAN) is an indivisible part of the next generation wireless system. In this paper, an open Wi-Fi platform is designed and developed with special consideration of real-time signal processin...Wireless local area network(WLAN) is an indivisible part of the next generation wireless system. In this paper, an open Wi-Fi platform is designed and developed with special consideration of real-time signal processing. Such system can help accelerate research and development of future wireless network, especially in the case of cellular/Wi-Fi co-existing networks. This platform is based on the Intel general-purpose processor and the universal software radio peripheral(USRP) radio front end. The design including the physical layer implementations is purely software and is optimized for real-time signal processing on the general purpose processor. In the lab experiment, this platform supports baseband rate up to 700 Mbps with 2 transmitters in 80 MHz bandwidth. A cellular-Wi-Fi signaling interface between the Wi-Fi access point(AP) and the 5G core network is also developed and validated as an example for wireless resource allocation.展开更多
Three differential equations based on different definitions of current density are compared. Formulation I is based on an incomplete equation for total current density (TCD). Formulations II and {I1 are based on inc...Three differential equations based on different definitions of current density are compared. Formulation I is based on an incomplete equation for total current density (TCD). Formulations II and {I1 are based on incomplete and complete equations for source current density (SCD), respectively. Using the weak form of finite element method (FEM), three formulations were applied in a spiral coil electromagnetic acoustic transducer (EMAT) example to solve magnetic vector potential (MVP). The input impedances calculated by Formulation III are in excellent agreement with the experimental measurements. Results show that the errors for Formulations I & II vary with coil diameter, coil spacing, lift-off distance and external excitation frequency, for the existence of eddy-current and skin & proximity effects. And the current distribution across the coil conductor also follows the same trend. It is better to choose Formulation I instead of Formulation Ili to solve MVP when the coil diameter is less than twice the skin depth for Formulation I is a low cost and high efficiency calculation method.展开更多
This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used...This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate.展开更多
Quality control is an important part of the capacitors automatic assembly process. Traditionally this control is being realized through a series of electrical measurements including capacity, tension, and tgct. In mos...Quality control is an important part of the capacitors automatic assembly process. Traditionally this control is being realized through a series of electrical measurements including capacity, tension, and tgct. In most cases, these measurements are not suitable for detecting defects that appear as a result of failures of certain elements of the assembly lines. These so called self-recovering failures very often remain unnoticed, because they do not cause a suspension of the assembly process and if not taken into consideration, they can seriously menace the final product quality. In this paper, the authors use PFMEA to identify and evaluate the risk of the self-recovering failures. They also propose a simple Simulink model, which could be useful when trying to estimate the effect of installing new control devices at an existing assembly line upon its overall reliability and productivity.展开更多
The bits and power allocation model of adaptive power-rate mixture for multi-user multi-server power-line communication systems was analyzed with the restrictions of maximal total power,fixed rate for each real time (...The bits and power allocation model of adaptive power-rate mixture for multi-user multi-server power-line communication systems was analyzed with the restrictions of maximal total power,fixed rate for each real time (RT) user,minimal rate for each non-real time (NRT) user,maximal bits and power for each subcarrier in each orthogonal frequency division multiplexing (OFDM) symbol. An algorithm of resource dynamic allocation in the first OFDM symbol of each frame and resource optimal adjustment in the latter OFDM symbol of each frame was proposed. In the first OFDM symbol of every frame,resource is firstly assigned for RT users so as to minimize their total used power until satisfying their fixed rates; secondly the remainder resource of power and subcarriers are assigned for NRT users so as to minimize their total used power until satisfying their minimal rates also; lastly the remainder resource is again assigned for NRT users according to the proportional fairness strategy so as to maximize their total assigning rate. In the latter OFDM symbol of each frame,bits are swapped and power is adjusted for every user based on the resource allocation results of anterior OFDM symbol. The algorithm is tested in the typical power-line channel scenarios and the simulation results indicate that the proposed algorithm has better performances than the classical multi-user resource allocation algorithms and it realizes the multiple aims of multi-user multi-server resource allocation for power-line communication systems.展开更多
An extension of L_1 adaptive control is proposed for the unmatched uncertain nonlinear system with the nonlinear reference system that defines the performance specifications. The control law adapts fast and tracks the...An extension of L_1 adaptive control is proposed for the unmatched uncertain nonlinear system with the nonlinear reference system that defines the performance specifications. The control law adapts fast and tracks the reference system with the guaranteed robustness and transient performance in the presence of unmatched uncertainties. The interval analysis is used to build the quasi-linear parameter-varying model of unmatched nonlinear system, and the robust stability of the proposed controller is addressed by sum of squares programming. The transient performance analysis shows that within the limit of hardware a large adaption gain can improve the asymptotic tracking performance. Simulation results are provided to demonstrate the theoretical findings of the proposed controller.展开更多
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processi...In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.展开更多
基金Major Program of the National Natural Science Foundation of China (No.70533050)High Technology Research Program ofJiangsu Province(No.BG2007012)+1 种基金China Postdoctoral Science Foundation(No.20070411065)Science Foundation of China University of Mining andTechnology(No.OC080303)
文摘To cope with the constraint problem of power consumption and transmission delay in the virtual backbone of wireless sensor network, a distributed connected dominating set (CDS) algorithm with (α,β)-constraints is proposed. Based on the (α, β)-tree concept, a new connected dominating tree with bounded transmission delay problem(CDTT) is defined and a corresponding algorithm is designed to construct a CDT-tree which can trade off limited total power and bounded transmission delay from source to destination nodes. The CDT algorithm consists of two phases: The first phase constructs a maximum independent set(MIS)in a unit disk graph model. The second phase estimates the distance and calculates the transmission power to construct a spanning tree in an undirected graph with different weights for MST and SPF, respectively. The theoretical analysis and simulation results show that the CDT algorithm gives a correct solution to the CDTF problem and forms a virtual backbone with( α,β)-constraints balancing the requirements of power consumption and transmission delay.
基金supported in part by the National Science Foundation (IIS1318638 and IIS1426752)the Shenzhen Science and Technology Project (ZDS Y20120617113312191)
文摘In this paper, we develop a decentralized algorithm to coord inate a group of mobile robots to search for unknown and transient radio sources. In addition to limited mobility and ranges of communication and sensing, the robot team has to deal with challenges from signal source anonymity, short transmission duration, and variable transmission power. We propose a two-step approach: First, we decentralize belief functions that robots use to track source locations using checkpoint-based synchronization, and second, we propose a decentralized planning strategy to coordinate robots to ensure the existence of checkpoints. We analyze memory usage, data amount in communication, and searching time for the proposed algorithm. We have implemented the proposed algorithm and compared it with two heuristics. The experimental results show that our algorithm successfully trades a modest amount of memory for the fastest searching time among the three methods.
基金Project supported by the National Natural Science Foundation of China (Nos. 60577023 and 60378037), the National Basic Research Program (973) of China (No. 2004CB719802), China Postdoctoral Science Foundation, and Education Ministry Key Laboratory of Photoelectric Information Technology Science Foundation (No. 2005-20), China
文摘A new power divider, composed of a novel composite right/left-handed (CRLH) transmission line (TL) unit, is proposed. The properties of the power divider based on four CRLH TL unit cells are investigated theoretically. By adjusting the parameters of the capacitors and the inductors, the power divider shows perfectly symmetric power division at 5.13 GHz, return loss up to ?24 dB, with the transmitted power being close to ?3.1 dB. The phenomena are demonstrated by simulation results. Being compact in size and low-cost, the proposed power divider is very suitable for microwave and millimeter wave integrated circuits.
基金the National Natural Science Foundation of China (No.60473027).
文摘In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world.
文摘Transient electromagnetic method (TEM),as a non-seismic geophysical exploration mainstream electromagnetic method,is widely used in oil,gas,mineral and other underground resources exploration areas. The coil sensor is generally used to collect data. In view of the problems of incomplete information of the abnormal body and the data loss in the existing TEM single-component coil sensor,a three-component TEM coil sensor is designed. By analyzing the relationship between sensor sensitivity and coil structure parameters,the coil structure and turns are designed. By analyzing the frequency response characteristics of the TEM magnetic field sensor,the signal distortion is reduced by using the under-damped matching mode. By analyzing the distribution of various noise sources of the magnetic sensor,the appropriate amplifier is selected to reduce the background noise. Finally,a three-component TEM induction magnetic field sensor is designed. The weight of the sensor is controlled at 3.2 kg and the working frequency is 10 mHz-10 kHz. The background noises of X and Y components probably keep in 1.5×10^-8 V/ Hz and sensitivities are 8.4 and 9.8 nT/s,respectively,the background noise of vertical component is 2.1× 10^-7 V/ Hz and sensitivity is 18.5 nT/s. Compared with the existing single-component TEM receiving magnetic field sensor,the designed sensor realizes the signal acquisition of three components. Without too much increase in volume and total weight,it improves the sensitivity of the sensor and reduces the background noise,thus the signal-to-noise ratio (SNR) of the signal is improved.
基金Supported by the National High Technology Research and Development Programme of China ( No. 2006AA040302 2007AA041201 +1 种基金 2007AA041301 )the National Creative Research Groups Science Foundation of China (No. 60721062)
文摘Many efforts have been made to develop time division multiple access (TDMA) slots allocation in a multi-hop converge-cast wireless sensor network (WSN), however, most of them either use complex algorithm or concern frames only without simultaneous transmission in a single slot. In this paper, we present a timeslot assignment scheme for cluster-tree-based TDMA WSN, co:'ering three frequently used working modes in practical applications. The shortest frame formed can guarantee real-time conununication and is also facilitated for message and slot integration, since timeslots allocated to a single node are continuous. During allocation processes, the algorithms are distributed and light-weighted. The experiment resulted from a WSN prototype system shows that our scheme can achieve a good reliability.
基金Project(60902092) supported by the National Natural Science Foundation of China
文摘Different schemes, which performed channel, power and time allocation to enhance the network performance of overall end-to-end throughput for cooperative cognitive radio network, were investigated. Interference temperature limit of corresponding primary users was considered. Due to the constraints caused by multiple dual channels, the power allocation problem is non-convex and NP-hard. Based on geometric programming (GP), a novel and general algorithm, which turned the problem into a series of GP problems by logarithm approximation (LASGP), was proposed to efficiently solve it. Numerical results verify the efficiency and availability of the LASGP algorithm. Solutions of LASGP are provably convergent and globally optimal point can be observed as well as the channel allocation always outperforms power or timeslot allocation from simulations. Compared with schemes without any allocation, the scheme with joint channel, power and timeslot allocation significantly increases the overall end-to-end throughput by no less than 70% under same simulation conditions. This scheme can not only maximize the throughput by increasing total maximum power of relay node, but also outperform other resource allocation schemes when lower total maximum power of source and relay nodes is restricted. As the total maximum power of source node increases, the scheme with joint channel and timeslot allocation performs best in all schemes.
文摘This paper presents a wavelet-based technique for detection and classification of normal and abnormal conditions that occur on power distribution lines. The proposed technique depends on a sensitive fault detection parameter (denoted DET) calculated from the wavelet multi-resolution decomposition of the three phase currents only. This parameter is fast and sensitive to any small changes in the current signal since it uses the square of the first and second details of the decomposed signals. The simulation results of this study clearly show that the proposed technique can be successfully used to detect and classify not only low-current faults that could not be detected by conventional overcurrent relays but also normal transients like load switching and inrush currents.
基金supported in part by the National Natural Science Foundation of China under Grant No. 61671436the Science and Technology Commission Foundation of Shanghai under Grant No. 15511102602, 16511104204
文摘Wireless local area network(WLAN) is an indivisible part of the next generation wireless system. In this paper, an open Wi-Fi platform is designed and developed with special consideration of real-time signal processing. Such system can help accelerate research and development of future wireless network, especially in the case of cellular/Wi-Fi co-existing networks. This platform is based on the Intel general-purpose processor and the universal software radio peripheral(USRP) radio front end. The design including the physical layer implementations is purely software and is optimized for real-time signal processing on the general purpose processor. In the lab experiment, this platform supports baseband rate up to 700 Mbps with 2 transmitters in 80 MHz bandwidth. A cellular-Wi-Fi signaling interface between the Wi-Fi access point(AP) and the 5G core network is also developed and validated as an example for wireless resource allocation.
基金Project(2014BAF12B01)supported by the Key Projects in the National Science&Technology Pillar Program during the Twelfth Five-year Plan Period,ChinaProject(51405520)supported by the National Natural Science Foundation of ChinaProject(2012CB619505)supported by National Basic Research Program of China
文摘Three differential equations based on different definitions of current density are compared. Formulation I is based on an incomplete equation for total current density (TCD). Formulations II and {I1 are based on incomplete and complete equations for source current density (SCD), respectively. Using the weak form of finite element method (FEM), three formulations were applied in a spiral coil electromagnetic acoustic transducer (EMAT) example to solve magnetic vector potential (MVP). The input impedances calculated by Formulation III are in excellent agreement with the experimental measurements. Results show that the errors for Formulations I & II vary with coil diameter, coil spacing, lift-off distance and external excitation frequency, for the existence of eddy-current and skin & proximity effects. And the current distribution across the coil conductor also follows the same trend. It is better to choose Formulation I instead of Formulation Ili to solve MVP when the coil diameter is less than twice the skin depth for Formulation I is a low cost and high efficiency calculation method.
基金supported by the National Natural Science Foundation of China(Grant no. 61202399,61571063)
文摘This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate.
文摘Quality control is an important part of the capacitors automatic assembly process. Traditionally this control is being realized through a series of electrical measurements including capacity, tension, and tgct. In most cases, these measurements are not suitable for detecting defects that appear as a result of failures of certain elements of the assembly lines. These so called self-recovering failures very often remain unnoticed, because they do not cause a suspension of the assembly process and if not taken into consideration, they can seriously menace the final product quality. In this paper, the authors use PFMEA to identify and evaluate the risk of the self-recovering failures. They also propose a simple Simulink model, which could be useful when trying to estimate the effect of installing new control devices at an existing assembly line upon its overall reliability and productivity.
基金Projects(51007021, 60402004) supported by the National Natural Science Foundation of China
文摘The bits and power allocation model of adaptive power-rate mixture for multi-user multi-server power-line communication systems was analyzed with the restrictions of maximal total power,fixed rate for each real time (RT) user,minimal rate for each non-real time (NRT) user,maximal bits and power for each subcarrier in each orthogonal frequency division multiplexing (OFDM) symbol. An algorithm of resource dynamic allocation in the first OFDM symbol of each frame and resource optimal adjustment in the latter OFDM symbol of each frame was proposed. In the first OFDM symbol of every frame,resource is firstly assigned for RT users so as to minimize their total used power until satisfying their fixed rates; secondly the remainder resource of power and subcarriers are assigned for NRT users so as to minimize their total used power until satisfying their minimal rates also; lastly the remainder resource is again assigned for NRT users according to the proportional fairness strategy so as to maximize their total assigning rate. In the latter OFDM symbol of each frame,bits are swapped and power is adjusted for every user based on the resource allocation results of anterior OFDM symbol. The algorithm is tested in the typical power-line channel scenarios and the simulation results indicate that the proposed algorithm has better performances than the classical multi-user resource allocation algorithms and it realizes the multiple aims of multi-user multi-server resource allocation for power-line communication systems.
文摘An extension of L_1 adaptive control is proposed for the unmatched uncertain nonlinear system with the nonlinear reference system that defines the performance specifications. The control law adapts fast and tracks the reference system with the guaranteed robustness and transient performance in the presence of unmatched uncertainties. The interval analysis is used to build the quasi-linear parameter-varying model of unmatched nonlinear system, and the robust stability of the proposed controller is addressed by sum of squares programming. The transient performance analysis shows that within the limit of hardware a large adaption gain can improve the asymptotic tracking performance. Simulation results are provided to demonstrate the theoretical findings of the proposed controller.
基金the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z455, and2007AA01Z473)
文摘In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.