Tag Archive: 'Omnet Manual'
We investigate the repair problem for wireless caching networks when parts of stored packets in cashing nodes are lost. We first develop theoretical lower bounds on the number of necessary transmission packets over error-free broadcast channels for repair. Then we discuss the impact of the distribution of the lost packets among caching nodes. Finally, we […]
This paper suggests a supervisory control for storage units to provide load leveling in distribution networks. This approach coordinates storage units to charge during high generation and discharge during peak load times, while utilized to improve the network voltage profile indirectly. The aim of this control strategy is to establish power sharing on a pro […]
Since smart phones are always equipped with both cellular and Wi-Fi interfaces, this paper exploits the feasibility of the Wi-Fi based Device-to-Device (D2D) offloading mechanism to reduce cellular traffic. In our group LBS scenario, a group of users travel outdoors together and utilize their smart phones to form a mobile converged network, which is composed […]
Online social networks (OSNs) suffer from the creation of fake accounts that introduce fake product reviews, malware and spam. Existing defenses focus on using the social graph structure to isolate fakes. However, our work shows that Sybils could befriend a large number of real users, invalidating the assumption behind social-graph-based detection. In this paper, we […]
Recent studies show that WiFi interference has been a major problem for low power urban sensing technology ZigBee networks. Existing approaches for dealing with such interferences often modify either the ZigBee nodes or WiFi nodes. However, massive deployment of ZigBee nodes and uncooperative WiFi users call for innovative cross-technology coexistence without intervening legacy systems. In […]
Four nodes optical add-drop network with high frequency granular optical channel defragmentation has been demonstrated. All channels presents error-free operation and power penalties are less than 4 dB even after multi-hop transmission.
We consider the problem of deriving an explicit approximate solution of the nonlinear power equations that describe a balanced power distribution network. We give sufficient conditions for the existence of a practical solution to the power flow equations, and we propose an approximation that is linear in the active and reactive power demands of the […]
In the recent years, inexact computing has been increasingly regarded as one of the most promising approaches for slashing energy consumption in many applications that can tolerate a certain degree of inaccuracy. Driven by the principle of trading tolerable amounts of application accuracy in return for significant resource savings–the energy consumed, the (critical path) delay […]
Modern control systems rely heavily on their sensors for reliable operation. Failure of a sensor could destabilize the system, which could have serious consequences to the system’s operations. Therefore, there is a need to detect and accommodate such failures, particularly if the system in question is of a safety critical application. In this paper, a […]
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure […]