Now showing items 31-40 of 233
Adaptive Identification and Control of Hysteresis in Smart Material Actuators
Hysteresis exhibited by smart materials hinders their wider applicability in actuators and sensors. In this paper methods are studied for recursive identification and adaptive inverse control of smart material actuators, ...
Load balancing in multi-beam satellite systems
We propose an approach to optimize resource sharing and in a multi-beam broadband satellite system that supports both unicast and multicast flows. We show that in this architecture, the load on every spot-beam queue could ...
The Systems Research Center: Creating the Design Tools for the Systems of Tomorrow.
ABSTRACT NOT AVAILABLE.
UAV Placement for Enhanced Connectivity in wireless Ad-hoc Networks
In this paper we address the problem of providing full connectivity in large (wide area) ad hoc networks by placing advantaged nodes like UAVs (as relay nodes) in appropriate places. We provide a formulation where we can ...
A Feedback Implosion Suppression Algorithm for Satellite Reliable Multicast
In this paper, we propose a knapsack-based feedback suppressionalgorithm for reliable multicast transport protocols operating over asatellite network. A reliable transport protocol needs to identify thepackets which failed ...
A Robust Control Framework for Smart Actuators
Hysteresis in smart actuators presents a challenge in control of these actuators. A fundamental idea to cope with hysteresis is inverse compensation. But due to the open loop nature of inverse compensation, its performance ...
A Reliable Multicast Transport Protocol for Satellite Communication Systems
In this paper, we propose a reliable multicast transport protocol for satellite communication systems. Many of the emerging applications in the Internet would benefit from reliable multicast services, and broadband satellite ...
Jointly Optimal Quantization, Estimation, and Control of Hidden Markov Chains
It is of interest to understand the tradeoff between the communication resource comsumption and the achievable system performance in networked control systems. In this paper we explore a general framework for trade-off ...
Web access over a multiple access channel: evaluations and improvements
We evaluate web browsing performance over a multiple access satellite channel for three different MAC layer protocols. A web user behavior model is used to generate realistic source traffic. A new transport layer protocol ...
Finite Automata Models for Anomaly Detection
A fundamental problem in intrusion detection is the fusion of dependent information sequences. In this paper, we consider the fusion of twosuch sequences, namely the sequences of system calls and thevalues of the instruction ...