Search results for "Modeling and simulation"
showing 10 items of 1561 documents
Power allocation for two-cell two-user joint transmission
2012
In this paper, we develop a power allocation scheme for the downlink of a two-cell two-user joint transmission system. The objective is to maximize the sum rate under per-cell power constraints. We study a worst case scenario where the carrier phases between the two base stations are un-synchronized, so that joint transmission must be performed without precoding. The derived power allocation scheme is remarkably simple, i.e., each cell transmits with full power to only one user. Note that joint transmission is still possible, when two cells select the same user for data transmission. Moreover, we prove that, in this scenario, the joint transmission case happens with higher probability when …
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Efficient anomaly detection on sampled data streams with contaminated phase I data
2020
International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…
Corrigendum to “Intelligent agents for feature modelling in computer aided design” [J. Comput. Des. Eng. (2018) 19–40]
2018
Advances in vehicle routing and logistics optimization
2019
nessuno
A multiblock PLS-based algorithm applied to a causal model in marketing
2012
A new autonomous data transmission reduction method for wireless sensors networks
2018
International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…
Hidden attractors on one path : Glukhovsky-Dolzhansky, Lorenz, and Rabinovich systems
2017
In this report, by the numerical continuation method we visualize and connect hidden chaotic sets in the Glukhovsky-Dolzhansky, Lorenz and Rabinovich systems using a certain path in the parameter space of a Lorenz-like system.
Review on Modeling and Control of Flexible Link Manipulators
2020
This paper presents a review of dynamic modeling techniques and various control schemes to control flexible link manipulators (FLMs) that were studied in recent literature. The advantages and complexities associated with the FLMs are discussed briefly. A survey of the reported studies is carried out based on the method used for modeling link flexibility and obtaining equations of motion of the FLMs. The control techniques are reviewed by classifying them into two main categories: model-based and model-free control schemes. The merits and limitations of different modeling and control methods are highlighted.
Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks
2018
International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …