Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "relay" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
Two-Way Relaying Cooperative Wireless Networks : Resource Allocation and Performance Analysis
Autorzy:
Abrar, M.
Gui, X.
Punchihewa, A.
Powiązania:
https://bibliotekanauki.pl/articles/226891.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
relay network
relay protocol
resource allocation
two-way relaying
bidirectional relaying
Analog Network Coding
Time Division Broadcast
Opis:
Relay-based cooperative wireless networks have been widely considered one of the cost-effective solutions to meet the demands in future wireless networks. In order to maximize the overall sum-rate while maintaining proportional fairness among users, we investigate different resource allocation algorithms in two-way relay networks with analog network coding (ANC) protocol and time division broadcast (TDBC) protocol. The algorithms investigated are different from traditional proportional fairness schemes in terms of fairness and computational complexity as we have applied Access Proportional Fairness (APF) and Minimum Rate Proportional Fairness (MRPF) along with load balancing at the relays. A MATLAB simulation has been performed and simulation results show the effectiveness of these algorithms.
Źródło:
International Journal of Electronics and Telecommunications; 2013, 59, 3; 229-235
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Efficient relay node management method for BLE MESH networks
Autorzy:
Bęben, Andrzej
Bąk, Andrzej
Sosnowski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/226000.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Bluetooth Low Energy
BLE MESH
relay management
optimisation
IoT
Opis:
The Bluetooth Low Energy (BLE) MESH network technology gains popularity in low duty IoT systems. Its advantage is a low energy consumption that enables long lifetime of IoT systems. The paper proposes and evaluates new MRT management methods, i.e. exact and heuristic, that improves energy efficiency of BLEMESH network by minimizing the number of active relay nodes. The performed experiments confirm efficiency of the MRT methods resulting in significantly lower energy consumption of BLE MESH network.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 1; 29-35
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Power supply risk assessment method for relay protection system faults
Autorzy:
Tuyou, S.
Jiekang, W.
Weideng, Y.
Anan, D.
Powiązania:
https://bibliotekanauki.pl/articles/141134.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
reduced power supply load power
relay protection systems
risk value
power supply risk assessment
Opis:
The influence and the potential risk due to hidden faults of a relay protection system on power supply in distribution systems are paid more and more attention to. A probability analysis method is used to analyse fault characteristics and action mechanism of dominant faults, hidden misoperation and non-operation of the relay protection systems, and failure probability model of relay protection system is constructed and simplified. The effects of dominant faults, hidden misoperation and non-operation of the relay protection systems on the reduced power supply load power are analysed, and a probabilistic model for reduced power supply load power is constructed by three parts corresponding to dominant faults, hidden misoperation and non-operation. A probability calculation method of power supply risk occurrence due to hidden faults of relay protecttion system is proposed considering the fault probability of the relay protection systems, the frequency of the hidden faults occurring in operation period, the reduced power supply load power or load power outage, and the connection mode of the in-lines, out-lines and transformers in a substation. The feasibility and applicability of the proposed method for estimation of risk value probability of the relay protection systems is verified by two studied examples.
Źródło:
Archives of Electrical Engineering; 2016, 65, 4; 803-814
1427-4221
2300-2506
Pojawia się w:
Archives of Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementation of IEC 61850 power protection tester in Linux environment
Autorzy:
Kurek, K.
Nogal, Ł.
Kowalik, R.
Januszewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/202357.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
implementation in real time
power systems
protective relay testing
digital control systems
IEC 61850
Opis:
Software power protection tester implemented in a real-time operating system (RTOS) might replace the conventional testing setups in IEC 61850 protection systems. This paper describes an open power protection testing platform. Linux RT capabilities related to runtime environment for such a tester are examined and OS latency sources are identified and evaluated. An algorithm for a multithreaded tester operation is proposed, including Sampled Values (SV) publisher, GOOSE input/output and time synchronization. SV and GOOSE services implemented in RT Linux environment are evaluated in accordance with IEC 61850‒5 transfer time requirements. Linux PTP time synchronization service of two similar systems controlling its electrical ports is evaluated in different synchronization scenarios. The developed tester is compared to an equivalent conventional setup during the test of IED over-current function. The conducted tests show that the Linux implementation of power protection tester in the case of scheduler latency, time synchronization accuracy and transfer time all meet the requirements of IEC 61850.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 4; 689-696
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem
Autorzy:
Thomas, Sanu
Mathew, Thomaskutty
Powiązania:
https://bibliotekanauki.pl/articles/2074141.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Chinese remainder theorem
authenticated aggregation
augmented Chinese remainder rystem
TDMA schedule
uplink path
relay node
Opis:
A new method of lossless Secure Data Aggregation for Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the popular Chinese Remainder theorem. Here, an ‘Augmented Chinese Remainder System’ is introduced that incorporates additional features to enforce a higher level of security to the aggregated data. The scheme provides inbuilt signature verification and eliminates the need for separate data validation algorithms. The method achieves data integrity and authentication simultaneously in addition to lossless data aggregation for the data forwarded from the Cluster Head to the Base Station. The aggregate contains the entire individual data from sensors in the encrypted form and the receiver deaggregates it to get the original data in full without any loss. The Augmented Chinese Remainder System can be extended to secure Multi-level Data Aggregation for WSN.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 2; 329--336
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance Analysis of Relay-Assisted Device-to-Device Communication
Autorzy:
Hussain, Zakir
Mehdi, Haider
Saleem, Syed Muhammad Atif
Mahboob, Aashir
Powiązania:
https://bibliotekanauki.pl/articles/2134046.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
CCI signals
D2D communication
k-m shadowed fading
kappa-my shadowed fading
outage probability
relay
Opis:
Outage and Success performances of an amplify-and-forward relay-assisted D2D communication system over a κ-μ shadowed fading wireless link are presented here. Co-channel interference (CCI) is assumed to affect the D2D signals at relay and destination nodes. The system is analyzed with two scenarios, namely, with diversity combining and without diversity combining. Selection combining (SC) based diversity scheme is incorporated at the D2D receiver to combat fading conditions. The expressions for success and outage probabilities are presented by using the characteristic function approach. The expressions are functions of path-loss exponents, wireless link length between relay and D2D source node, wireless link length between the receiver node and relay, distances between interferers and the relay node, CCI distances from various devices of the system, fading channel. The numerical analysis for various scenarios is presented and analyzed.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 3; 587--593
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies