Abstract: Two consensus problems are considered in this
paper. One is the consensus of linear multi-agent systems with
weakly connected directed communication topology. The other
is the consensus of nonlinear multi-agent systems with strongly
connected directed communication topology. For the first problem,
a simplified consensus protocol is designed: Each child agent can
only communicate with one of its neighbors. That is, the real
communication topology is a directed spanning tree of the original
communication topology and without any cycles. Then, the necessary
and sufficient condition is put forward to the multi-agent systems can
be reached consensus. It is worth noting that the given conditions do
not need any eigenvalue of the corresponding Laplacian matrix of the
original directed communication network. For the second problem,
the feedback gain is designed in the nonlinear consensus protocol.
Then, the sufficient condition is proposed such that the systems can
be achieved consensus. Besides, the consensus interval is introduced
and analyzed to solve the consensus problem. Finally, two numerical
simulations are included to verify the theoretical analysis.
Abstract: The paper presents a PD controller for the Networked Control Systems (NCS) with delay. The major challenges in this networked control system (NCS) are the delay of the data transmission throughout the communication network. The comparative performance analysis is carried out for different delays network medium. In this paper, simulation is carried out on Ac servo motor control system using CAN Bus as communication network medium. The True Time toolbox of MATLAB is used for simulation to analyze the effect of different delays.
Abstract: In this paper, we have compared and analyzed the
electroabsorption properties between with and without excitonic
effect bulk in high purity GaAs spatial light modulator for optical
fiber communication network. The eletroabsorption properties such
as absorption spectra, change in absorption spectra, change in
refractive index and extinction ration has been calculated. We have
also compared the result of absorption spectra and change in
absorption spectra with the experimental results and found close
agreement with experimental results.
Abstract: The performance of any cooperative communication system depends largely on the selection of a proper partner. Another important factor to consider is an efficient allocation of resource like power by the source node to help it in forwarding information to the destination. In this paper, we look at the concepts of partner selection and resource (power) allocation for a distributed communication network. A type of non-cooperative game referred to as Trade-Off game is employed so as to jointly consider the utilities of the source and relay nodes, where in this case, the source is the node that requires help with forwarding of its information while the partner is the node that is willing to help in forwarding the source node’s information, but at a price. The approach enables the source node to maximize its utility by selecting a partner node based on (i) the proximity of the partner node to the source and destination nodes, and (ii) the price the partner node will charge for the help being rendered. Our proposed scheme helps the source locate and select the relay nodes at ‘better’ locations and purchase power optimally from them. It also aids the contending relay nodes maximize their own utilities as well by asking proper prices. Our game scheme is seen to converge to unique equilibrium.
Abstract: This paper addresses the design of predictive
networked controller with adaptation of a communication delay. The
networked control system contains random delays from sensor to
controller and from controller to actuator. The proposed predictive
controller includes an adaptation loop which decreases the influence
of communication delay on the control performance. Also, the
predictive controller contains a filter which improves the robustness
of the control system. The performance of the proposed adaptive
predictive controller is demonstrated by simulation results in
comparison with PI controller and predictive controller with constant
delay.
Abstract: The analysis of electromagnetic environment using
deterministic mathematical models is characterized by the
impossibility of analyzing a large number of interacting network
stations with a priori unknown parameters, and this is characteristic,
for example, of mobile wireless communication networks. One of the
tasks of the tools used in designing, planning and optimization of
mobile wireless network is to carry out simulation of electromagnetic
environment based on mathematical modelling methods, including
computer experiment, and to estimate its effect on radio
communication devices. This paper proposes the development of a
statistical model of electromagnetic environment of a mobile
wireless communication network by describing the parameters and
factors affecting it including the propagation channel and their
statistical models.
Abstract: As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.