Academic literature on the topic 'Dynamic adaptive threshold transmission (DATT)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dynamic adaptive threshold transmission (DATT).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dynamic adaptive threshold transmission (DATT)"

1

Cen, Yi, Mingliu Liu, Deshi Li, Kaitao Meng, and Huihui Xu. "Double-Scale Adaptive Transmission in Time-Varying Channel for Underwater Acoustic Sensor Networks." Sensors 21, no. 6 (March 23, 2021): 2252. http://dx.doi.org/10.3390/s21062252.

Full text
Abstract:
The communication channel in underwater acoustic sensor networks (UASNs) is time-varying due to the dynamic environmental factors, such as ocean current, wind speed, and temperature profile. Generally, these phenomena occur with a certain regularity, resulting in a similar variation pattern inherited in the communication channels. Based on these observations, the energy efficiency of data transmission can be improved by controlling the modulation method, coding rate, and transmission power according to the channel dynamics. Given the limited computational capacity and energy in underwater nodes, we propose a double-scale adaptive transmission mechanism for the UASNs, where the transmission configuration will be determined by the predicted channel states adaptively. In particular, the historical channel state series will first be decomposed into large-scale and small-scale series and then be predicted by a novel k-nearest neighbor search algorithm with sliding window. Next, an energy-efficient transmission algorithm is designed to solve the problem of long-term modulation and coding optimization. In particular, a quantitative model is constructed to describe the relationship between data transmission and the buffer threshold used in this mechanism, which can then analyze the influence of buffer threshold under different channel states or data arrival rates theoretically. Finally, numerical simulations are conducted to verify the proposed schemes, and results show that they can achieve good performance in terms of channel prediction and energy consumption with moderate buffer length.
APA, Harvard, Vancouver, ISO, and other styles
2

Mjidi, Mostafa, Debasish Chakraborty, Naoki Nakamura, and Norio Shiratori. "The Impact of Dynamic RTS Threshold Adjustment for IEEE 802.11 MAC Protocol." Mobile Information Systems 5, no. 1 (2009): 5–20. http://dx.doi.org/10.1155/2009/736242.

Full text
Abstract:
In recent years, wireless technologies and application received great attention. The Medium Access Control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs). IEEE 802.11 introduced the optional RTS/CTS handshaking mechanism to address the hidden terminal problem as well as to reduces the chance of collision in case of higher node density and traffic. RTS Threshold (RT) determines when RTS/CTS mechanism should be used and proved to be an important parameter for performance characteristics in data transmission. We first investigate to find a meaningful threshold value according to the network situation and determine the impact of using or disengaging the RTS/CTS optional mechanism and dynamically adjust the RTS Threshold to maximize data transmission. The results show a significant improvement over existing CSMA/CA and RTS/CTS schemes. Our adaptive scheme performed even better when data rate increases. We verify our proposed scheme both analytically and with extensive network simulation using ns-2.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Fengzeng, and Li Peng. "Distributed adaptive event-triggered iterative learning controller based on a filtering network." Transactions of the Institute of Measurement and Control 43, no. 14 (June 27, 2021): 3220–32. http://dx.doi.org/10.1177/01423312211021062.

Full text
Abstract:
This paper develops a distributed adaptive event-triggered iterative learning controller over a filtering network for a class of tracking control systems. The proposed distributed control method is more robust than centralized control in terms of node failure and transmission constraints. In view of the limited network bandwidth, adaptive event-triggered mechanisms (AETMs) have been considered in the network communication process. The proposed AETM is characterized by introducing the dynamic threshold parameter, which provides benefits in data scheduling. The existence of filters and controllers is analyzed by Lyapunov stability theory and linear matrix inequality techniques, and their parameters are finally obtained. Moreover, some simulation results on a numerical example and a irrigation canal are presented to show the applicability of the obtained results.
APA, Harvard, Vancouver, ISO, and other styles
4

S, Mustafa. "Capture Aware Channel Access Protocol in Wireless Network." Journal of Engineering Research [TJER] 13, no. 1 (January 31, 2018): 73. http://dx.doi.org/10.24200/tjer.vol15iss1pp73-87.

Full text
Abstract:
Spatial reuse in wireless networks is limited by the SINR threshold and it might be feasible to capture a packet in the presence of ongoing foreign transmission. This work considers a new capture aware channel access protocol by incorporating global channel state information in the decision making process for the channel access jointly with adaptive power framework. The protocol employs power heterogeneous ad-hoc networks; it assigns different transmission power level to individual nodes based on dynamic observation of the network traffic. It exploits spatial heterogeneity of flows at a given channel allocation and sets up either symmetric or asymmetric carrier sensing which in turn schedules the data packets transmission to maintain adequate service quality and fairness enjoyed by a user. It stands atop capture capable PHY to leverage the channel reuse which is of paramount importance in the design of high capacity ad-hoc networks. Through extensive simulations, the paper demonstrates the efficacy of the new protocol. It delivers high network utilization and also provides fair access to the media.
APA, Harvard, Vancouver, ISO, and other styles
5

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Full text
Abstract:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jiacheng, and Jinkun Liu. "Event-triggered boundary quantization control for flexible manipulator based on partial differential equations dynamic model." Transactions of the Institute of Measurement and Control 43, no. 9 (February 22, 2021): 2111–23. http://dx.doi.org/10.1177/0142331221990522.

Full text
Abstract:
In this paper, we consider boundary control for a single-link flexible manipulator system described by partial differential equations (PDEs). Existing researches on controller design rarely consider the problem of communication capacity constrains during signal transmission. To deal with this problem, an adaptive control is designed to achieve the input quantization by using the random quantizer. Besides, a triggering event is addressed on the basis of relative threshold strategy for relieving communication load between controller and actuator. The proposed scheme is able to ensure that all closed-loop signals are globally uniformly bounded, and the angular tracking error and vibration converge to a residual set. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
7

Pananos, A. Demetri, Thomas M. Bury, Clara Wang, Justin Schonfeld, Sharada P. Mohanty, Brendan Nyhan, Marcel Salathé, and Chris T. Bauch. "Critical dynamics in population vaccinating behavior." Proceedings of the National Academy of Sciences 114, no. 52 (December 11, 2017): 13762–67. http://dx.doi.org/10.1073/pnas.1704093114.

Full text
Abstract:
Vaccine refusal can lead to renewed outbreaks of previously eliminated diseases and even delay global eradication. Vaccinating decisions exemplify a complex, coupled system where vaccinating behavior and disease dynamics influence one another. Such systems often exhibit critical phenomena—special dynamics close to a tipping point leading to a new dynamical regime. For instance, critical slowing down (declining rate of recovery from small perturbations) may emerge as a tipping point is approached. Here, we collected and geocoded tweets about measles–mumps–rubella vaccine and classified their sentiment using machine-learning algorithms. We also extracted data on measles-related Google searches. We find critical slowing down in the data at the level of California and the United States in the years before and after the 2014–2015 Disneyland, California measles outbreak. Critical slowing down starts growing appreciably several years before the Disneyland outbreak as vaccine uptake declines and the population approaches the tipping point. However, due to the adaptive nature of coupled behavior–disease systems, the population responds to the outbreak by moving away from the tipping point, causing “critical speeding up” whereby resilience to perturbations increases. A mathematical model of measles transmission and vaccine sentiment predicts the same qualitative patterns in the neighborhood of a tipping point to greatly reduced vaccine uptake and large epidemics. These results support the hypothesis that population vaccinating behavior near the disease elimination threshold is a critical phenomenon. Developing new analytical tools to detect these patterns in digital social data might help us identify populations at heightened risk of widespread vaccine refusal.
APA, Harvard, Vancouver, ISO, and other styles
8

Arunachalam, Vanathi, and Nagamalleswara Nallamothu. "Load Balancing in RPL to Avoid Hotspot Problem for Improving Data Aggregation in IoT." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 528–40. http://dx.doi.org/10.22266/ijies2021.0228.49.

Full text
Abstract:
Data aggregation plays a vital role in the Internet of Things (IoT), and it aggregates the collected sensor data from devices to suppress redundant data transmissions. Many-to-one traffic pattern in the IoT induces hotspot problem and inefficient data aggregation. The Routing protocol for low-power and lossy networks (RPL) in the network layer impacts the hotspot problem due to the frequent usage of forwarding nodes and load imbalance. The processes of network layer protocol, such as trickle algorithm and Objective Functions (OF) for Destination Oriented Directed Acyclic Graph (DODAG) construction, need more attention to avoid hotspot for efficient data aggregation. This work proposes a Load Balanced RPL (LoB-RPL) protocol to avoid hotspot creation using a composite metric based parent selection, DODAG construction, and local topology adaptive decision on trickle parameters. The LoBRPL improves the Minimum Hop with Hysteresis Objective Function(MRHOF) using the composite metric based parent selection and tunes the parameters of the Trickle algorithm. It ensures efficient maintenance of DODAG structure, hotspot avoidance, and unnecessary DIO transmissions. Beyond the advantages of composite metric based parent selection, consideration of dynamic parameters may induce frequent parent switching in RPL. To avoid frequent changes in the DODAG structure, the LoB-RPL optimally decides the parent switching threshold. Thus, the proposed work ensures a load-balanced and an energy-efficient RPL routing as well as data aggregation in the IoT environment. The LoB-RPL delivers outperforming results compared to the base RPL under various inter-packet interval time over 50 node topologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Lorincz, Josip, Ivana Ramljak, and Dinko Begušić. "A Survey on the Energy Detection of OFDM Signals with Dynamic Threshold Adaptation: Open Issues and Future Challenges." Sensors 21, no. 9 (April 28, 2021): 3080. http://dx.doi.org/10.3390/s21093080.

Full text
Abstract:
Cognitive radio (CR), as a concept based on the ability to detect and share the unutilised spectrum, has been envisioned as a promising candidate to improve the efficiency of frequency spectrum assignments. For the realisation of the CR concept, energy detection (ED), as one of the available spectrum sensing methods, is broadly considered because of its low computational complexity and implementation costs. Due to the vast usage of the orthogonal frequency division multiplexing (OFDM) technique in contemporary communication systems, the ED of OFDM signals in the CR networks has become important for practical realisation. Since the ED accuracy of the OFDM signals can be improved by the sensing threshold adaptation, this paper surveys the impact of noise variations and dynamic threshold (DT) adaptation on the ED performance of OFDM signals. Analyses were performed by the simulation of the ED related to OFDM signals transmitted in the margin or rate adaptive and combined margin and rate adaptive OFDM systems. The results obtained through extensive simulations provide fundamental insights into how different factors, including the transmission power, the signal to noise ratio, the false alarm probability and the sample quantity, affect the ED efficiency. Comprehensive analyses of the obtained results indicate the main ED weaknesses and how the appropriate selection of analysed factors can enhance the ED processes for different OFDM systems. The observed ED weaknesses were further thoroughly surveyed, and the open issues and challenges related to the enhancement of the main ED limitations have been elaborated. The presented survey results can serve as a basis for the improvement of a broadly accepted ED method in CR networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in MANETs. Basically, by adding adapted LEACH routing protocol to MANET, enhancement of the preserved nodes vitality will be achieved, moreover, the load balancing with data loss reduction provides MANET ability to tracks along with shortest and limited paths. This paper proposes a newly developed detection scheme for both active and passive black-hole attacks in MANETs. Moreover, the scheme deals with assessing a group of selected features for each node-based AdaBoost-SVM algorithm. These features are collected from cluster members nodes based on Ad hoc On-demand Multipath Distance Vector (OMDV) with LEACH routing protocol clustering approaches. Although SVM is considered a more stable classifier, there are great influences of the AdaBoost weight adaption algorithm to enhance the classification process in terms of strengthening the weights of extracted features. This hybrid algorithm is essential for active black-hole attacks as well as for identifying passive black-hole attacks in MANET. The proposed scheme is tested against the effect of mobility variation to determine the accuracy of the detection process including the routing overhead protocol. The experimental results investigated that the accuracy of detecting both active and passive black-holes attacks in MANET reached 97% with a promising time complexity for different mobility conditions. Moreover, the proposed scheme provides an accurate decision about malicious vs benign node dropping behavior using an adjustable threshold value.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Dynamic adaptive threshold transmission (DATT)"

1

Ridgewell, Alexander Graham, and n/a. "A Method for Efficient Transmission of XML Data across a Network." University of Canberra. School of Information Sciences & Engineering, 2007. http://erl.canberra.edu.au./public/adt-AUC20070801.151913.

Full text
Abstract:
Extensible Markup Language (XML) is a simple, very flexible text format derived from SGML (ISO 8879), which is a well defined, public standard. It uses plain text to encode a hierarchical set of information using verbose tags to allow the XML document to be understood without any special reader. The use of schemas in XML also allows a well defined contract describing what a single XML document means. The self-contained nature of XML and the strong contract provided by its schemas makes it useful as an archival storage format and as a means of communicating across system or organizational boundaries. As such XML is being increasingly used by businesses throughout the world. These businesses use XML as a means of storing, transmitting and (with the use of style sheets) displaying information. The simple, well defined structure of XML does present some problems when it is used by businesses and similar organizations. As it is an open, plain text based standard care must be taken when looking at security. The use of plain text with verbose tags also results in XML documents that are far larger than other means of storing the same information. This thesis focuses on the affect of the large size of XML when it is used to communicate across a network. This large size can often increase the time taken to transmit the document and we were interested to see how it could be minimized. we investigated the ways that are used to control the size of XML documents and how they are transmitted. We carefully investigated by implementing solutions on how to transmit the XML document. We then first presented a new method, called dynamic adaptive threshold transmission (DATT), in comparisons with other existing similar methods, which, under the discussed conditions, offers significant improvements in transmission times and network transmission efficiencies.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dynamic adaptive threshold transmission (DATT)"

1

Huang, Xu, Alexander Ridgewell, and Dharmendra Sharma. "A Dynamic Adaptive Threshold Transmission for XML Data on Networks." In 2007 4th IEEE Consumer Communications and Networking Conference. IEEE, 2007. http://dx.doi.org/10.1109/ccnc.2007.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harihara, Parasuram P., and Alexander G. Parlos. "Sensorless Detection of Cavitation in Centrifugal Pumps." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14655.

Full text
Abstract:
Analysis of electrical signatures has been in use for some time for estimating the condition of induction motors, by extracting spectral indicators from motor current waveforms. In most applications, motors are used to drive dynamic loads, such as pumps, fans, and blowers, by means of power transmission devices, such as belts, couplers, gear-boxes. Failure of either the electric motors or the driven loads is associated with operational disruption. The large costs associated with the resulting idle equipment and personnel can often be avoided if the degradation is detected in its early stages prior to reaching failure conditions. Hence the need arises for cost-effective detection schemes not only for assessing the condition of the motor but also of the driven load. This prompts one to consider approaches that use no add-on sensors, in order to avoid any reduction in overall system reliability and increased costs. This paper presents an experimentally demonstrated sensorless approach to detecting varying levels of cavitation in centrifugal pumps. The proposed approach is sensorless in the sense that no mechanical sensors are required on either the pump or the motor driving the pump. Rather, onset of pump cavitation is detected using only the line voltages and phase currents of the electric motor driving the pump. Moreover, most industrial motor switchgear are equipped with potential transformers and current transformers which can be used to measure the motor voltages and currents. The developed fault detection scheme is insensitive to electric power supply and mechanical load variations. Furthermore, it does not require a priori knowledge of a motor or pump model or any detailed motor or pump design parameters; a model of the system is adaptively estimated on-line. The developed detection algorithm has been tested on data collected from a centrifugal pump connected to a 3 φ, 3 hp induction motor. Several cavitation levels are staged with increased severity. In addition to these staged pump faults, extensive experiments are also conducted to test the false alarm performance of the algorithm. Results from these experiments allow us to offer the conclusion that for the cases under consideration, the proposed model-based detection scheme reveals cavitation detection times that are comparable to those obtained from vibration analysis with a detection threshold that is significantly lower than used in industrial practice.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography