-
3381
Optimal Dispatch of Reactive Power Using Modified Stochastic Fractal Search Algorithm
Published 2019-01-01“…Furthermore, the proposed method also sees its effectiveness and robustness over SSFS by testing on IEEE 30-bus system and IEEE 118-bus system with three different single objectives for each system. …”
Get full text
Article -
3382
Optimal µPMU Placement Considering Node Importance and Multiple Deployed Monitoring Devices in Distribution Networks
Published 2025-01-01“…The superiority of the proposed μPMU method is verified in standard systems such as IEEE-33, IEEE-34, and P&G69, in which the number of required μPMUs is reduced by 20%, and the observation performance of the system is improved by 30% in special cases.…”
Get full text
Article -
3383
Using idle TDMA slots for retransmitting packets cooperatively in VANET
Published 2015-07-01“…The distributed TDMA approach for VANET dose not take advantage of idle slots,failing to effectively utilize radio resources.A retransmission method for medium access control was proposed for utilizing idle slots.In the method,neighboring nodes utilized idle slots for retransmitting a packet which failed to reach the target receiver.Theoretical analysis and simulation results show that the proposed method significantly increases the probability of successful packet transmission and the network throughput.In addition,a comparison between the proposed method and IEEE 802.11p was presented via extensive simulation,and the results prove that,due to its ability to access channel determinately,the method can disseminate real-time safety information timely and stably.…”
Get full text
Article -
3384
-
3385
Comparative Performance Evaluation of TCP Variants in WiMAX (and WLANs) Network Configurations
Published 2012-01-01“…An important application for the IEEE 802.16 technology (also called WiMAX) is to provide high-speed access to the Internet where the transmission control protocol (TCP) is the core transport protocol. …”
Get full text
Article -
3386
60 GHz Modular Antenna Array Link Budget Estimation with WiGig Baseband and Millimeter-Wave Specific Attenuation
Published 2017-01-01“…This paper provides practical 60 GHz link budget estimation results with IEEE 802.11ad standard-defined parameters and 60 GHz specific attenuation factors. …”
Get full text
Article -
3387
Design and Study of Cognitive Network Physical Layer Simulation Platform
Published 2014-01-01“…Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. …”
Get full text
Article -
3388
Research on localization scheme of UWB in NLOS environment
Published 2008-01-01“…According to three NLOS channel model simulations in IEEE.802.15.4a,the relationship between channel impulse response and SP search region was analyzed,localization per-formance impacted by various parameters was also discussed. …”
Get full text
Article -
3389
A Trust Value-Based Spectrum Allocation Algorithm in CWSNs
Published 2013-05-01“…CWSN devotes itself to the solution of spectrum sharing in forms of networks, such as IEEE 802.11 and Bluetooth. A new algorithm is proposed for allocating the idle spectrum to secondary users (SUs). …”
Get full text
Article -
3390
Study of performance of UWB transmitted-reference receivers
Published 2005-01-01“…The principle and advantage were analyzed about UWB transmitted-reference (TR) receiver.Moreover,considering many UWB communications had little channel variance in the course of transmitting a few bits data,an improved TR receiver was presented by extending TR signal set to the sum of several reference signals and many data signals.The performance of this improved TR receiver and basic TR receiver were detailed analyzed in theory and simulated in the IEEE UWB multipath channel models CM1 and CM2.The results show that bit error rate and data transmission efficiency of this improved TR receiver are better than basic TR receiver,at the cost of a little rise of structure complexity.…”
Get full text
Article -
3391
Algorithm of grid reliability assessment and reconstruction optimization system
Published 2017-12-01“…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
Get full text
Article -
3392
Architecture and verification of enhanced deterministic networking oriented large-scale
Published 2024-01-01“…Comparison to the traditional “best-effort” QoS of IP-based network, deterministic networking had provided guaranteed QoS capabilities catering the requirements of differentiated increasing IP-based services.In the local Ethernet network and limited domain IP network, IEEE and IETF had approved the time-sensitive networking and deterministic working groups, which had published series standards.At present, the large-scale deterministic networking research has been carried out in the industry.There has being a consensus that the deterministic networking technology needs to be enhanced, and a new enhanced deterministic networking architecture needs to be developed.A three-dimension enhanced networking architecture was proposed, and the prototype devices verification based the architecture were provided.The results of verification show that it can meet the large-scale deterministic requirements with the well compatibilites for existed IP network.…”
Get full text
Article -
3393
Support vector machine based fast Monte Carlo reliability evaluation method for composite power system
Published 2019-06-01“…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
Get full text
Article -
3394
Modeling the distance error and performance analysis in IR-UWB positioning system
Published 2011-01-01“…The multipath and NLOS distance errors in indoor positioning due to the propagation characteristics of IR-UWB were analyzed,based on the coherent TOA ranging algorithm.Utilized the statistical information of IEEE 802.15.4a channel model,the multipath error was modeled in terms of system bandwidth in both LOS and NLOS envi-ronment.And the NLOS extra distance error was derived in terms of obstacle thickness,transceiver distance and the in-cidence angle as the IR-UWB signal propagated through walls.The positioning performance via triangulation was ana-lyzed as given the prior information of the NLOS distance error in completely NLOS environment.…”
Get full text
Article -
3395
Survey of IoT security research: threats, detection and defense
Published 2021-08-01“…Based on the IoT security literatures published in the international conferences on network security (ACM CCS, USENIX Security, NDSS, IEEE S&P) in recent five years, and other prominent researches, the works from the perspective of "threat, detection, defense" were systematically summarized and analyzed.Firstly the basic architecture of the IoT system was introduced.Then the main threats proposed in these works were classified into eight categories, and the causes and hazards of the threats were analyzed.After that, six detection and five defense schemes against these threats were introduced, and their technical principles, advantages and disadvantages were compared.At last, on the basis of the above analysis, the main challenges that the current research still faces were put forward, and the research directions of future works were point out.…”
Get full text
Article -
3396
MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation
Published 2012-01-01“…Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). …”
Get full text
Article -
3397
Enhanced zebra optimization algorithm and applications of power allocation in SDWN
Published 2025-01-01“…Experimental results demonstrate that EZOA exhibits superior competitiveness compared to six other well-established algorithms on the IEEE CEC 2014 benchmark function set. In the SDWN power allocation problem, EZOA achieves an average improvement of 5.46% in user secrecy rate and the fastest convergence speed compared to five other algorithms.…”
Get full text
Article -
3398
A Zone-Based Self-Organized Handover Scheme for Heterogeneous Mobile and Ad Hoc Networks
Published 2014-06-01“…Furthermore, a new event is proposed and added to the IEEE 802.21: media independent handover (MIH) standard to integrate the functionality of multithreshold. …”
Get full text
Article -
3399
م التأهيل الذاتي للشبكة الكهربائية باستخدام الحماية التفاضلية
Published 2024-12-01“…فكان التوجه لشبكة أكثر ذكاء وقدرة على معالجة المعطيات و البيانات واتخاذ القرار كما سنرى في بحثنا حول التأهيل الذاتي باستخدام الحماية التفاضلية وسنقوم باستخدام برنامج حاسوبي متقدم (ETAP) وسيتم تحليل النتائج لشبكة IEEE-9bus. …”
Get full text
Article -
3400