978 resultados para IMPROVED PROTOCOL
Resumo:
Clock synchronization in a wireless sensor network (WSN) is quite essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using a contention-based scheme for media access, like carrier sense multiple access (CSMA). The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions. In such a situation, there are chances of collisions, and hence, message losses, which, in turn, affects the convergence of the synchronization algorithms. However, the number of collisions can be reduced with a frame based approach like time division multiple access (TDMA) for message passing. In this paper, we propose a design to utilize TDMA-based media access and control (MAC) protocol for the performance improvement of clock synchronization protocols. The basic idea is to use TDMA-based transmissions when the degree of synchronization improves among the sensor nodes during the execution of the clock synchronization algorithm. The design significantly reduces the collisions among the synchronization protocol messages. We have simulated the proposed protocol in Castalia network simulator. The simulation results show that the proposed protocol significantly reduces the time required for synchronization and also improves the accuracy of the synchronization algorithm.
Resumo:
Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest significant improvements over their proposal in terms of client computation and communication resources by properly recasting it in two-party settings. In contrast to Ohrimenko et al. we are able to make the number of bilinear pairing evaluation, the costliest operation in verification procedure, independent of the result set cardinality for union operation. We also provide an analytical comparison of our scheme with their proposal which is further corroborated through experiments.
Resumo:
The nodes with dynamicity, and management without administrator are key features of mobile ad hoc networks (1VIANETs). Increasing resource requirements of nodes running different applications, scarcity of resources, and node mobility in MANETs are the important issues to be considered in allocation of resources. Moreover, management of limited resources for optimal allocation is a crucial task. In our proposed work we discuss a design of resource allocation protocol and its performance evaluation. The proposed protocol uses both static and mobile agents. The protocol does the distribution and parallelization of message propagation (mobile agent with information) in an efficient way to achieve scalability and speed up message delivery to the nodes in the sectors of the zones of a MANET. The protocol functionality has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. A mobile agent migrates from central resource rich node with message and navigate autonomously in the zone of network until the boundary node. With the performance evaluation, it has been concluded that the proposed protocol consumes much less time to allocate the required resources to the nodes under requirement, utilize less network resources and increase the network scalability. (C) 2015 Elsevier B.V. All rights reserved.
Resumo:
Electromagnetic interference shielding (EMI) materials were designed using PC (polycarbonate)/SAN poly(styrene-co-acrylonitrile)] blends containing few-layered graphene nanosheets decorated with nickel nanoparticles (G-Ni). The graphene nanosheets were decorated with nickel nanoparticles via the uniform nucleation of the metal salt precursor on graphene sheets as the substrate. In order to localize the nanoparticles in the PC phase of the PC/SAN blends, a two-step mixing protocol was adopted. In the first step, graphene sheets were mixed with PC in solution and casted into a film, followed by dilution of these PC master batch films with SAN in the subsequent melt extrusion step. The dynamic mechanical properties, ac electrical conductivity, EMI shielding effectiveness and thermal conductivity of the composites were evaluated. The G-Ni nanoparticles significantly improved the electrical and thermal conductivity in the blends. In addition, a total shielding effectiveness (SET) of -29.4 dB at 18 GHz was achieved with G-Ni nanoparticles. Moreover, the blends with G-Ni exhibited an impressive 276% higher thermal conductivity and 29.2% higher elastic modulus with respect to the neat blends.
Resumo:
Designing and fabricating hybrid systems with a visible light active semiconductor as one of its components is an important research area for the development of highly efficient photocatalysts. Herein, we report visible-light driven photocatalytic activity of graphene oxide (GO) and controllably reduced GO (rGO) modified Ag3PO4 composites fabricated by an in situ method. Concentration of graphene derivatives in GO/rGO-Ag3PO4 composites was in the range of 0.13-0.52 wt% which is very minute compared to those reported previously. The optimal concentration of GO in Ag3PO4 with a kinetics (k = 1.23 +/- 0.04 min(-1)) for the degradation of rhodamine B is 0.26 wt%. GO-Ag3PO4 photocatalysts display an improved catalytic activity compared with pristine and rGOs modified Ag3PO4. In line with this, GO/rGO-Ag3PO4 composites show improved photocatalytic activity for the degradation of 2-chlorophenol compared with Degussa P-25. Our experiments with GO reduced to different extents show that, rGO with more polar functional groups exhibits a higher photocatalytic efficiency. The photocatalytic activity in the presence of different scavengers reveals that holes and O-2(-center dot) reactive species play major roles in the degradation phenomenon. In view of our experimental results and reported theoretical studies, a change in conduction band energy level and variation in the contribution of different charge orbitals (C 2p and O 2p) to the conduction band in the composite favours electron flow from graphene derivatives to the semiconductor, enhancing its photocatalytic response.
Resumo:
Research and field experience have shown that well-path control is important in many cases, not only to reach the desired coordinates, but also to arrive at the well completion target from the preferred trajectory.
Resumo:
We present an improved procedure on the approach to determine the stability of polystyrene spheres at microscopic particle levels by means of artificially induced particle collisions with the aid of optical tweezers [J.Chem.Phys. 119, 2399(2003)]. The basic consideration on this new development is that the major contribution to the sticking probability for a particle pair caught into the optical trap for a short period is from its single collision; therefore, if the trapping duration for the pair is taken to be short, the accumulated sticking probability will be a good approximation for the single collision. The experimental procedure associated with this approximation does not resort to exactly controlling the short trapping duration or request the trapping duration correction as previously reported and therefore it is more practical and applicable for broader range of the stability ratio. The experimental results under different electrolyte concentrations by the new procedure are consistent with those from the turbidity measurements.
Resumo:
The existing Det Norske Veritas DNV Recommended Practice RP E305 for pipeline on-bottom stability is mainly based on the pipe–soil interaction model reported by Wagner et al. in 1987, and the wake model reported by Lambrakos et al. in 1987, to calculate the soil resistance and the hydrodynamic forces upon pipeline, respectively. Unlike the methods in the DNV Practice, in this paper, an improved analysis method is proposed for the on-bottom stability of a submarine pipeline, which is based on the relationships between Um/ gD 0.5 and Ws / D2 for various restraint conditions obtained by the hydrodynamic loading experiments, taking into account the coupling effects between wave, pipeline, and sandy seabed. The analysis procedure is illustrated with a detailed flow chart. A comparison is made between the submerged weights of pipeline predicted with the DNV Practice and those with the new method. The proposed analysis method may provide a helpful tool for the engineering practice of pipeline on-bottom stability design.
Resumo:
An improved two-dimensional space-time conservation element and solution element ( CE/ SE) method with second-order accuracy is proposed, examined and extended to simulate the detonation propagations using detailed chemical reaction models. The numerical results of planar and cellular detonation are compared with corresponding results by the Chapman-Jouguet theory and experiments, and prove that the method is a new reliable way for numerical simulations of detonation propagation.
Resumo:
We previously proposed a method for estimating Young's modulus from instrumented nanoindentation data based on a model assuming that the indenter had a spherical-capped Berkovich geometry to take account of the bluntness effect. The method is now further improved by releasing the constraint on the tip shape, allowing it to have a much broader arbitrariness to range from a conical-tipped shape to a flat-ended shape, whereas the spherical-capped shape is just a special case in between. This method requires two parameters to specify a tip geometry, namely, a volume bluntness ratio V-r and a height bluntness ratio h(r). A set of functional relationships correlating nominal hardness/reduced elastic modulus ratio (H-n/E-r) and elastic work/total work ratio (W-e/W) were established based on dimensional analysis and finite element simulations, with each relationship specified by a set of V-r and h(r). Young's modulus of an indented material can be estimated from these relationships. The method was shown to be valid when applied to S45C carbon steel and 6061 aluminum alloy.