Wireless Sensor Networks consists of sensor nodes which are placed in harsh and hostile surrounding where an adversary may capture the nodes, replicate them and use it for its own purpose. If the clone nodes remain undetected, it can disrupt the network functions making it vulnerable to attacks. Hence false data can be injected or…

We present an algorithm for controlling and scheduling multiple linear time-invariant processes on a shared bandwidth-limited communication network using adaptive sampling intervals. The controller is centralized and not only computes at every sampling instant the new control command for a process but also decides the time interval to wait until taking the next sample.The approach…

Real-time Ethernet (RTE) technologies are becoming increasingly popular, as they provide high bandwidth and are able to meet the requirements of industrial real-time communications. Among RTE protocols, the EtherCAT standard is suitable for motion control and closed-loop control applications, which require very short cycle times. As EtherCAT was specifically devised for periodic traffic, aperiodic real-time…

Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. On the one hand, long distance proactive information retrieval incurs huge transmission overhead; On the other hand, due to the coupling effect between diagnosis…

In this paper, we consider bidirectional relay networks in which two users exchange information only via a relay node, i.e., a direct link between both users is not present. We assume that channel state information at the transmitter is not available and/or only one coding and modulation scheme is used due to complexity constraints. Thus,…

With increasing core counts ushering in power-constrained 3-D multiprocessor system-on-chips (MPSoCs), optimizing communication power dissipated by the 3-D network-on-chip (NoC) fabric is critical. At the same time, with increased power densities in 3-D ICs, problems of IR drops in the power delivery network (PDN) as well as thermal hot spots on the 3-D die are…

We investigate energy-efficient cooperation for se- crecy in cognitive radio networks. In particular, we consider a four-node cognitive scenario where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The cognitive transmitter should ensure that the primary message is not leaked to the secondary user by using cooperative jamming.…

Distance-based network localization is known to have solution, in general, if the network is globally rigid. In this paper we relax this condition with reference to unit disk graphs. To this end, shadow edges are introduced to model the fact that selected nodes are not able to sense each other. We provide a localization algorithm…

Service restoration is important in distribution networks following an outage. During the restoration process, the system operating conditions will fluctuate, including variation of the load demand and the output from distributed generators (DGs). These variations are hard to be predicted and the load demands are roughly estimated because of absence of real-time measurements, which can…

We consider the problem of synthesizing multiple valued logic (MVL) functions by neural networks. A differential evolution algorithm is proposed to train the learnable multiple valued logic network. The optimum window and biasing parameters to be chosen for convergence are derived. Experiments performed on benchmark problems demonstrate the convergence and robustness of the network. Preliminary…