Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Engineering and Information Sciences - Papers: Part A

Networks

2014

Articles 1 - 12 of 12

Full-Text Articles in Social and Behavioral Sciences

Error Exponent Of Amplify And Forward Relay Networks In Presence Of I.I.D. Interferers, Bappi Barua, Farzad Safaei, Mehran Abolhasan Jan 2014

Error Exponent Of Amplify And Forward Relay Networks In Presence Of I.I.D. Interferers, Bappi Barua, Farzad Safaei, Mehran Abolhasan

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we derive the random coding error exponent of amplify-and-forward (AF) relay networks in presence of arbitrary number of independent and identically distributed (i.i.d.) interferers both at the relay and the destination. Multiuser networks are common examples of interference limited networks. We derive the ergodic capacity of the network and present simulation results on the performance of the network where we compare the capacity and error exponent performance of interference limited networks with noise limited networks. Numerical results show that noise limited networks outperform interference limited networks even when only a very few interferers exist in the network.


A Structure Optimization Algorithm Of Neural Networks For Large-Scale Data Sets, Jie Yang, Jun Ma, Matthew J. Berryman, Pascal Perez Jan 2014

A Structure Optimization Algorithm Of Neural Networks For Large-Scale Data Sets, Jie Yang, Jun Ma, Matthew J. Berryman, Pascal Perez

Faculty of Engineering and Information Sciences - Papers: Part A

Over the past several decades, neural networks have evolved into powerful computation systems, which are able to learn complex nonlinear input-output relationship from data. However, the structure optimization problem of neural network is a big challenge for processing huge-volumed, diversified and uncertain data. This paper focuses on this problem and introduces a network pruning algorithm based on sparse representation, termed SRP. The proposed approach starts with a large network, then selects important hidden neurons from the original structure using a forward selection criterion that minimizes the residual output error. Furthermore, the presented algorithm has no constraints on the network type. …


Optimal Adaptive Wireless Body Area Networks For High Speed In Health Services, Miftadi Sudjai, Le Chung Tran, Farzad Safaei, Son Lam Phung Jan 2014

Optimal Adaptive Wireless Body Area Networks For High Speed In Health Services, Miftadi Sudjai, Le Chung Tran, Farzad Safaei, Son Lam Phung

Faculty of Engineering and Information Sciences - Papers: Part A

Adaptive ultra-wideband wireless body area networks have been proposed as one of feasible mHealth platforms offering a high-speed, robust mobile health service. The error performance of such sytems outperforms non-adaptive systems by up to 4 dB. To further improve the error performance, the optimization of adaptive parameters is investigated in this paper. Simulation results show that the proposed optimal adaptive systems achieves a 2 dB gain with respect to bit error rate (BER). This improvement is equivalent to extra reduction of the power consumption up to 37% in these networks, thus increasing the longevity and reliability of mHealth services.


Novel Algorithms For Complete Targets Coverage In Energy Harvesting Wireless Sensor Networks, Changlin Yang, Kwan-Wu Chin Jan 2014

Novel Algorithms For Complete Targets Coverage In Energy Harvesting Wireless Sensor Networks, Changlin Yang, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

This paper addresses the problem of maximizing the network lifetime of rechargeable Wireless Sensor Networks (WSNs) whilst ensuring all targets are monitored continuously by at least one sensor node. The objective is to determine a group of sensor nodes, and their wake-up schedule such that within a time interval, one subset of nodes are active whilst others enter the sleep state to conserve energy as well as recharge their battery. We propose a Linear Programming (LP) based solution to determine the activation schedule of sensor nodes whilst affording them recharging opportunities and at the same time ensures complete target coverage. …


Global Optimization Method For Robust Pricing Of Transportation Networks Under Uncertain Demand, Shuaian Wang, Lauren Gardner, S.Travis Waller Jan 2014

Global Optimization Method For Robust Pricing Of Transportation Networks Under Uncertain Demand, Shuaian Wang, Lauren Gardner, S.Travis Waller

Faculty of Engineering and Information Sciences - Papers: Part A

We extend the existing toll pricing studies with fixed demand to stochastic demand. A new and practical second-best pricing problem with uncertain demand is proposed and formulated as a stochastic mathematical program with equilibrium constraints. In view of the problem structure, we develop a tailored global optimization algorithm. This algorithm incorporates a sample average approximation scheme, a relaxation-strengthening method, and a linearization approach. The proposed global optimization algorithm is applied to three networks: a two-link network, a seven-eleven network and the Sioux-Falls network. The results demonstrate that using a single fixed estimation of future demand may overestimate the future system …


Over-Voltage Mitigation Within Distribution Networks With A High Renewable Distributed Generation Penetration, Joel Kennedy, Philip Ciufo, Ashish Agalgaonkar Jan 2014

Over-Voltage Mitigation Within Distribution Networks With A High Renewable Distributed Generation Penetration, Joel Kennedy, Philip Ciufo, Ashish Agalgaonkar

Faculty of Engineering and Information Sciences - Papers: Part A

The rapid growth of grid-connected distributed generation has increased the likelihood of over-voltage occurrences in distribution networks. In recent times, much research has taken place in order to develop a control strategy to mitigate the voltage rise problem. However, most of the published strategies require re-tuning when additional resources are connected, or have a strong dependence on network parameters, such as fault level. This paper proposes a novel over-voltage mitigation scheme that has many advantages not observed in literature. Firstly, the control scheme can integrate with an existing feeder in a plug-and-play fashion. No prior analysis is necessary to configure …


Voltage Unbalance Emission Allocation Using Constrained Bus Voltage Method In Radial Distribution Networks, Devinda Perera, Philip Ciufo, Sarath Perera, Lasantha Meegahapola Jan 2014

Voltage Unbalance Emission Allocation Using Constrained Bus Voltage Method In Radial Distribution Networks, Devinda Perera, Philip Ciufo, Sarath Perera, Lasantha Meegahapola

Faculty of Engineering and Information Sciences - Papers: Part A

The International Electrotechnical Committee Technical Report IEC 61000-3-13 is focused on the coordination of voltage unbalance (VU) in power systems by prescribing a methodology to determine individual VU emission allocation limits to installations. This paper provides an alternative VU emission allocation process to that of the IEC Technical Report, which is based on the concept of constrained bus voltage (CBV) method. The proposed methodology can be used in relation to radial distribution networks with symmetrical distribution lines. Several application examples of the proposed methodology are presented. It is shown that the proposed methodology is superior in comparison to the VU …


An Algebraic Approach For Determination Of Dg Parameters To Support Voltage Profiles In Radial Distribution Networks, Kashem M. Muttaqi, An D. T Le, Michael Negnevitsky, Gerard Ledwich Jan 2014

An Algebraic Approach For Determination Of Dg Parameters To Support Voltage Profiles In Radial Distribution Networks, Kashem M. Muttaqi, An D. T Le, Michael Negnevitsky, Gerard Ledwich

Faculty of Engineering and Information Sciences - Papers: Part A

Rapidly increasing electricity demands and capacity shortage of transmission and distribution facilities are the main driving forces for the growth of Distributed Generation (DG) integration in power grids. One of the reasons for choosing a DG is its ability to support voltage in a distribution system. Selection of effective DG characteristics and DG parameters is a significant concern of distribution system planners to obtain maximum potential benefits from the DG unit. This paper addresses the issue of improving the network voltage profile in distribution systems by installing a DG of the most suitable size, at a suitable location. An analytical …


Characterisation Of Flicker Emission And Propagation In Distribution Networks With Bi-Directional Power Flows, D Perera, L Meegahapola, S Perera, P Ciufo Jan 2014

Characterisation Of Flicker Emission And Propagation In Distribution Networks With Bi-Directional Power Flows, D Perera, L Meegahapola, S Perera, P Ciufo

Faculty of Engineering and Information Sciences - Papers: Part A

With the increasing penetration levels of intermittent and fluctuating energy sources such as wind generating systems in the electricity grid, resulting voltage fluctuations and flicker can be expected to become an important power quality considerations. Due to significant bidirectional power flows resulting from large renewable power generation systems connected to downstream, voltage fluctuations may propagate from downstream to upstream. The work presented in this paper investigates and characterises flicker emission and propagation resulting from fluctuating generating sources connected to a distribution network. Mathematical models are developed for flicker emission under different generator control strategies and flicker propagation to upstream network. …


Improvements On An Authentication Scheme For Vehicular Sensor Networks, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo Jan 2014

Improvements On An Authentication Scheme For Vehicular Sensor Networks, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

In a recent paper, Shim (2012) presented a very interesting authentication scheme for vehicular sensor networks. Shim claimed that the scheme is secure against the highest adopted level of attack, namely the chosen-message attack (CID-CMA). Nevertheless, we find that the proof in Shim's paper does not actually prove that the scheme is secure in this level. Instead, it can only ensure that the scheme is secure in a strictly weaker level of attack, the adaptive chosen-identity and no-message attack (CID-NMA). In this paper, first we show that there exist some security risks in vehicular networks if a scheme, which is …


An Approach For Online Assessment Of Rooftop Solar Pv Impacts On Low-Voltage Distribution Networks, Md Jan-E- Alam, Kashem Muttaqi, Darmawan Sutanto Jan 2014

An Approach For Online Assessment Of Rooftop Solar Pv Impacts On Low-Voltage Distribution Networks, Md Jan-E- Alam, Kashem Muttaqi, Darmawan Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

Assumption-based offline analysis tools may not be able to provide sufficient and accurate information for the corrective decision making to mitigate solar photovoltaic (PV) impacts in the future distribution grids. This is mainly due to the increasing penetration level of intermittent power generation resources and also the fluctuating behavior of consumer demand. Online assessment tools can assist to manage PV impacts and aid to mitigate those on a real-time basis. This paper proposes an approach for online assessment of rooftop PV impacts on low-voltage (LV) networks using real-time network data. A variable-width sliding window will be used to provide the …


A Secure Ipv6 Address Configuration Protocol For Vehicular Networks, Xiaonan Wang, Yi Mu, Guangjie Han, Deguang Le Jan 2014

A Secure Ipv6 Address Configuration Protocol For Vehicular Networks, Xiaonan Wang, Yi Mu, Guangjie Han, Deguang Le

Faculty of Engineering and Information Sciences - Papers: Part A

This paper proposes a secure address configuration protocol for IPv6-based vehicular networks. In this protocol, the network architecture is proposed. In this architecture, a vehicle obtains a unique address from a neighbor vehicle or an access point without DAD, and a leaving vehicle's address space can be automatically reclaimed for reassignment. Based on this architecture, the address configuration algorithm is presented. In this algorithm, an access point or a vehicle owns the unique address space and assigns a unique address to a neighbor vehicle without DAD, so the address configuration cost and delay are lowered. The identification of a vehicle …