11 |
Enhancing Attack Resilience in Cognitive Radio NetworksChen, Ruiliang 07 March 2008 (has links)
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques.
In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks. / Ph. D.
|
12 |
Wi-Fi tracking : Fingerprinting attacks and counter-measures / Traçage Wi-Fi : Attaques par prise d'empreinte et contre-mesuresMatte, Célestin 07 December 2017 (has links)
Le récent développement des appareils portatifs possédant une interface Wi-Fi (smartphones, tablettes et « wearables ») s'accompagne d'une menace sur la vie privée de leurs utilisateurs, et sur la société toute entière. Ces appareils émettent en continu des signaux pouvant être capturés par un attaquant passif, à l'aide de matériel peu coûteux et de connaissances basiques. Ces signaux contiennent un identifiant unique appelé l'adresse MAC. Pour faire face à cette menace, les acteurs du secteur déploient actuellement une contre-mesure sur les appareils récents: le changement aléatoire de l'adresse MAC. Malheureusement, nous montrons que cette mesure, dans son état actuel, n'est pas suffisante pour empêcher le traçage des appareils. Pour cela, nous introduisons plusieurs attaques basées sur le contenu et la répartition temporelle des signaux. En complément, nous étudions les implémentations du changement aléatoire de l'adresse MAC sur des appareils récents, et trouvons un certain nombre de manquements limitant l'efficacité de ces implémentations à prévenir le traçage. En parallèle, nous effectuons deux études de terrain. La première s'attaque au développement des acteurs exploitant les problèmes cités plus haut afin d'installer des systèmes de traçage basés sur le Wi-Fi. Nous listons certaines de ces installations et examinons plusieurs aspects de ces systèmes : leur régulation, les implications en terme de vie privée, les questions de consentement et leur acceptation par le public. La seconde étude concerne la progression du changement aléatoire d'adresse MAC dans la population des appareils. Finalement, nous présentons deux outils : le premier est un système de traçage expérimental développé pour effectuer des tests et sensibiliser le public aux problèmes de vie privée liés à de tels systèmes. Le second estime l'unicité d'un appareil en se basant sur le contenu des signaux qu'il émet, même si leur identifiant est modifié. / The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using cheap hardware and basic knowledge. These signals contain a unique identifier, called the MAC address. To mitigate the threat, device vendors are currently deploying a countermeasure on new devices: MAC address randomization. Unfortunately, we show that this mitigation, in its current state, is insufficient to prevent tracking. To do so, we introduce several attacks, based on the content and the timing of emitted signals. In complement, we study implementations of MAC address randomization in some recent devices, and find a number of shortcomings limiting the efficiency of these implementations at preventing device tracking. At the same time, we perform two real-world studies. The first one considers the development of actors exploiting this issue to install Wi-Fi tracking systems. We list some real-world installations and discuss their various aspects, including regulation, privacy implications, consent and public acceptance. The second one deals with the spread of MAC address randomization in the devices population. Finally, we present two tools: an experimental Wi-Fi tracking system for testing and public awareness raising purpose, and a tool estimating the uniqueness of a device based on the content of its emitted signals even if the identifier is randomized.
|
13 |
Protocolo assíncrono de acesso ao meio iniciado pelo receptor para redes de sensores sem fio / Asynchronous receiver-initiated media access protocol for wireless sensor networksFernandes Junior, Renato Ferreira 29 June 2018 (has links)
A internet das coisas é considerada um novo sistema de comunicação que promete otimizar e melhorar diferentes áreas de aplicação com base em módulos sensores e objetos unicamente interligados através da internet. Em aplicações de redes de sensores sem fio em larga escala, as redes possuem características peculiares, como grande quantidade de módulos sensores de baixa potência, consumo limitado e perdas de comunicação intermitentes. Estas redes precisam operar com protocolos escaláveis e eficientes em termos de consumo de energia. Desta forma, esta tese propõe um protocolo multicanal assíncrono iniciado pelo receptor de acesso ao meio para redes de sensores sem fio de baixa potência para aplicações de internet das coisas. Através de uma comparação com soluções já existentes, o protocolo apresentado procura mitigar a colisão de mensagens e as perdas de energia com ociosidade na espera pela comunicação de um transmissor, através de um mecanismo de reconhecimento inicial eficiente. Adicionalmente, é proposto um diagnóstico efetivo de detecção de falha na comunicação ainda no ciclo de comunicação, de forma a auxiliar a economia de energia. Complementarmente, é proposto um mecanismo multicanal baseado no conhecimento do canal da vizinhança, além de serviços de inicialização e manutenção da rede. Para validação da proposta, o protocolo proposto foi comparado tanto com protocolos assíncronos multicanais iniciado pelo receptor quanto com protocolo síncrono relevantes na literatura científica. Os critérios de avaliação utilizados foram medição do consumo, latência e taxa de entrega da rede em diferentes cenários. Os resultados mostraram que o protocolo proposto minimiza o consumo de energia em relação aos protocolos assíncronos, além de melhorar a comunicação quando comparado aos protocolos analisados. Na comparação com o protocolo síncrono, demonstrou desempenho e consumo compatíveis, quando em período de trabalho menor, e consumo reduzido com períodos de trabalho maiores. / The Internet of Things is considered a new communication system that promises to optimize and improve different application areas. It is based on sensor modules and intelligent objects only interconnected through the internet. In large-scale wireless sensor network applications, networks have own specific characteristics such as many low-power, limited-power sensor modules with intermittent communication losses. These networks need to operate with scalable, energy-efficient protocols. Thus, this thesis proposes an asynchronous multichannel receiver-initiated MAC protocol for low power wireless sensor networks and internet of things applications. Through a comparison with already existing solutions, the proposed protocol tries to mitigate message containment and the effect of idle listening through an efficient initial recognition mechanism. It is also proposed an effective diagnosis of communication failure detection in the communication cycle, which also helps to save energy. In addition, a multichannel mechanism is proposed based on the knowledge of the neighborhood channel in addition to services of initialization and maintenance of the network. To validate the proposed protocol, evaluations were made for the consumption of each node sensor, the network traffic for each link, the latency and the network delivery rate in a web application. Tests were performed using asynchronous multichannel receiver-initiated and synchronous protocols based on literature scientific. The results show that the proposed protocol minimizes the energy consumption in relation to the asynchronous protocols, besides improving the communication when compared to the analyzed protocols. In the comparison with the synchronous protocol the proposed protocol showed performance and consumption compatible, when in a smaller duty cycles, and reduced consumption with longer duty cycles.
|
14 |
Techniques d’amélioration des performances des méthodes d’accès aléatoire synchrones pour les communications par satellite / Improving Synchronous Random Access Schemes for Satellite CommunicationsZidane, Karine 25 November 2016 (has links)
L’optimisation des communications par satellite devient un enjeu crucial pour fournir un accèsInternet aux zones blanches et/ou défavorisées et pour supporter des réseaux à grande échelle.Dans ce contexte, l’utilisation des techniques d’accès aléatoires sur le lien retour permetd’améliorer les performances de ces systèmes. Cependant, les techniques d’accès aléatoireclassiques comme ‘Aloha’ et ‘Slotted Aloha’ ne sont pas optimales pour la transmission dedonnées sur le lien retour. En effet, ces techniques présentent un taux élevé de pertes depaquets suite aux collisions. Par conséquent, des études récentes ont proposé de nouvellesméthodes d’accès aléatoire pour résoudre les collisions entre les paquets et ainsi, améliorerles performances. En particulier, ces méthodes se basent sur la redondance de l’informationet l’annulation successive des interférences. Dans ces systèmes, l’estimation de canal sur le lien retour est un problème difficile en raison du haut niveau de collisions de paquets. Dans une première contribution dans cette thèse, nous décrivons une technique améliorée d’estimation de canal pour les paquets en collision. Par ailleurs, nous analysons l’impact des erreurs résiduelles d’estimation de canal sur la performance des annulations successives des interférences. Même si les résultats obtenus sont encore légèrement inférieurs au cas de connaissance parfaite du canal, on observe une amélioration significative des performances par rapport aux algorithmes d’estimation de canal existants. Une autre contribution de cette thèse présente une méthode appelée ‘Multi-Replica Decoding using Correlation based Localisation’ (MARSALA). Celle-ci est une nouvelle technique de décodage pour la méthode d’accès aléatoire synchrone ‘Contention Résolution diversité Slotted Aloha’ (CRDSA), qui est basée sur les principe de réplication de paquets et d’annulation successive des interférences. Comparée aux méthodes d’accès aléatoire traditionnelles, CRDSA permet d’améliorer considérablement les performances. Toutefois, le débit offert par CRDSA peut être limité à cause des fortes collisions de paquets. L’utilisation deMARSALA par le récepteur permet d’améliorer les résultats en appliquant des techniques de corrélation temporelles pour localiser et combiner les répliques d’un paquet donné. Cette procédure aboutit à des gains en termes de débit et de taux d’erreurs paquets. Néanmoins, le gain offert par MARSALAest fortement dépendant de la synchronisation en temps et en phase des répliques d’un mêmepaquet. Dans cette thèse, nous détaillons le fonctionnement de MARSALA afin de corriger ladésynchronisation en temps et en phase entre les répliques. De plus, nous évaluons l’impactde la combinaison imparfaite des répliques sur les performances, en fournissant un modèle analytique ainsi que des résultats de simulation. En outre, plusieurs schémas d’optimisationde MARSALA sont proposés tels que le principe du ‘MaximumRatio Combining’, ou la transmissiondes paquets à des puissances différentes. Utilisées conjointement, ces différentespropositions permettent d’obtenir une amélioration très significative des performances. Enfin,nous montrons qu’en choisissant la configuration optimale pour MARSALA, le gain deperformance est considérablement amélioré. / With the need to provide the Internet access to deprived areas and to cope with constantlyenlarging satellite networks, enhancing satellite communications becomes a crucial challenge.In this context, the use of Random Access (RA) techniques combined with dedicated accesson the satellite return link, can improve the system performance. However conventionalRA techniques like Aloha and Slotted Aloha suffer from a high packet loss rate caused bydestructive packet collisions. For this reason, those techniques are not well-suited for datatransmission in satellite communications. Therefore, researchers have been studying andproposing new RA techniques that can cope with packet collisions and decrease the packet lossratio. In particular, recent RA techniques involving information redundancy and successiveinterference cancellation, have shown some promising performance gains.With such methods that can function in high load regimes and resolve packets with high collisions,channel estimation is not an evident task. As a first contribution in this dissertation, wedescribe an improved channel estimation scheme for packets in collision in new RAmethodsin satellite communications. And we analyse the impact of residual channel estimation errorson the performance of interference cancellation. The results obtained show a performancedegradation compared to the perfect channel knowledge case, but provide a performanceenhancement compared to existing channel estimation algorithms. Another contribution of this thesis is presenting a method called Multi-Replica Decoding using Correlation based Localisation (MARSALA). MARSALA is a new decoding technique for a recent synchronous RAmethod called Contention Resolution Diversity Slotted Aloha (CRDSA). Based on packets replication and successive interference cancellation, CRDSA enables to significantly enhance the performance of legacy RA techniques. However, if CRDSA is unable to resolve additional packets due to high levels of collision, MARSALA is applied. At the receiver side, MARSALA takes advantage of correlation procedures to localise the replicas of a given packet, then combines the replicas in order to obtain a better Signal to Noise plus Interference Ratio. Nevertheless, the performance ofMARSALA is highly dependent on replicas synchronisation in timing and phase, otherwise replicas combination would not be constructive. In this dissertation, we describe an overall framework ofMARSALA including replicas timing and phase estimation and compensation, then channel estimation for theresulting signal. This dissertation also provides an analytical model for the performancedegradation of MARSALA due to imperfect replicas combination and channel estimation.In addition, several enhancement schemes forMARSALA are proposed likeMaximum RatioCombining, packets power unbalance, and various coding schemes. Finally, we show thatby choosing the optimal design configuration for MARSALA, the performance gain can besignificantly enhanced.
|
15 |
QoS routing for mobile ad hoc networks using genetic algorithmAbdullah, Jiwa January 2007 (has links)
Mobile Ad Hoc Networks (MANETs) are a class of infrastructure less network architecture which are formed by a collection of mobile nodes that communicate with each other using multi-hop wireless links. They eliminate the need for central management, hence each node must operate cooperatively to successfully maintain the network. Each node performs as a source, a sink and a router. Future applications of MANETs are expected to be based on all-IP architecture, carrying a multitude of real-time multimedia applications such as voice, video and data. It would be necessary for MANETs to have an efficient routing and quality of service (QoS) mechanism to support diverse applications. This thesis proposes a set of cooperative protocols that provide support for QoS routing. The first is the on-demand, Non-Disjoint Multiple Routes Discovery protocol (NDMRD). NDMRD allows the establishment of multiple paths with node non-disjoint between source and destination node. It returns to the source a collection of routes with the QoS parameters. The second part of the protocol is the Node State Monitoring protocol for the purpose of monitoring, acquisition, dissemination and accumulation of QoS route information. The third part of the protocol implements the QoS route selection based on a Genetic Algorithm. The GA is implemented online with predetermined initial population and weighted-sum fitness function which operates simultaneously on the node bandwidth, media access delay, end to end delay and the node connectivity index (NCI). The term node connectivity index is a numerical value designed to predict comparatively the longest time a node-pair might be connected wirelessly.
|
16 |
Protocolo assíncrono de acesso ao meio iniciado pelo receptor para redes de sensores sem fio / Asynchronous receiver-initiated media access protocol for wireless sensor networksRenato Ferreira Fernandes Junior 29 June 2018 (has links)
A internet das coisas é considerada um novo sistema de comunicação que promete otimizar e melhorar diferentes áreas de aplicação com base em módulos sensores e objetos unicamente interligados através da internet. Em aplicações de redes de sensores sem fio em larga escala, as redes possuem características peculiares, como grande quantidade de módulos sensores de baixa potência, consumo limitado e perdas de comunicação intermitentes. Estas redes precisam operar com protocolos escaláveis e eficientes em termos de consumo de energia. Desta forma, esta tese propõe um protocolo multicanal assíncrono iniciado pelo receptor de acesso ao meio para redes de sensores sem fio de baixa potência para aplicações de internet das coisas. Através de uma comparação com soluções já existentes, o protocolo apresentado procura mitigar a colisão de mensagens e as perdas de energia com ociosidade na espera pela comunicação de um transmissor, através de um mecanismo de reconhecimento inicial eficiente. Adicionalmente, é proposto um diagnóstico efetivo de detecção de falha na comunicação ainda no ciclo de comunicação, de forma a auxiliar a economia de energia. Complementarmente, é proposto um mecanismo multicanal baseado no conhecimento do canal da vizinhança, além de serviços de inicialização e manutenção da rede. Para validação da proposta, o protocolo proposto foi comparado tanto com protocolos assíncronos multicanais iniciado pelo receptor quanto com protocolo síncrono relevantes na literatura científica. Os critérios de avaliação utilizados foram medição do consumo, latência e taxa de entrega da rede em diferentes cenários. Os resultados mostraram que o protocolo proposto minimiza o consumo de energia em relação aos protocolos assíncronos, além de melhorar a comunicação quando comparado aos protocolos analisados. Na comparação com o protocolo síncrono, demonstrou desempenho e consumo compatíveis, quando em período de trabalho menor, e consumo reduzido com períodos de trabalho maiores. / The Internet of Things is considered a new communication system that promises to optimize and improve different application areas. It is based on sensor modules and intelligent objects only interconnected through the internet. In large-scale wireless sensor network applications, networks have own specific characteristics such as many low-power, limited-power sensor modules with intermittent communication losses. These networks need to operate with scalable, energy-efficient protocols. Thus, this thesis proposes an asynchronous multichannel receiver-initiated MAC protocol for low power wireless sensor networks and internet of things applications. Through a comparison with already existing solutions, the proposed protocol tries to mitigate message containment and the effect of idle listening through an efficient initial recognition mechanism. It is also proposed an effective diagnosis of communication failure detection in the communication cycle, which also helps to save energy. In addition, a multichannel mechanism is proposed based on the knowledge of the neighborhood channel in addition to services of initialization and maintenance of the network. To validate the proposed protocol, evaluations were made for the consumption of each node sensor, the network traffic for each link, the latency and the network delivery rate in a web application. Tests were performed using asynchronous multichannel receiver-initiated and synchronous protocols based on literature scientific. The results show that the proposed protocol minimizes the energy consumption in relation to the asynchronous protocols, besides improving the communication when compared to the analyzed protocols. In the comparison with the synchronous protocol the proposed protocol showed performance and consumption compatible, when in a smaller duty cycles, and reduced consumption with longer duty cycles.
|
17 |
Efficient Schemes for Improving the Performance of Clock Synchronization Protocols in Wireless Sensor Networks Using TDMA- based MAC ProtocolsWatwe, Siddharth P January 2015 (has links) (PDF)
Clock synchronization in a wireless sensor network (WSN) is essential as it provides
a consistent and a coherent time frame for all the nodes across the network. Typically,
clock synchronization is achieved by message passing using carrier sense multiple
access (CSMA) for media access. The nodes try to synchronize with each other, by
sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions which results in message losses and affects the synchronization accuracy. Since the nodes in a WSN have limited energy, it is required that the energy consumed by the clock synchronization protocols is as minimum as possible. This can be achieved by reducing the duration for which the clock synchronization protocols execute. Synchronous clock synchronization
protocols in WSNs execute the clock synchronization process at each node, roughly
during the same real-time interval, called synchronization phase. The duration when
there is no synchronization activity is called the synchronization interval. Synchronization phases are divided into synchronization rounds. The energy consumed by these protocols depends on the duration of the synchronization phase and how frequently the synchronization phase is executed. Hence, to minimize the energy consumption by each
node, the duration of synchronization phase should be as small as possible. Due to different drift rates of the clocks, the synchronization phases at different nodes drift apart and special techniques are required to keep them in sync. An existing protocol, called improved weighted-average based clock synchronization (IWICS) uses a pullback technique to achieve this. If a message from (i + 1)th synchronization round is received by a node still executing the ith synchronization round, the receiving node reduces its next synchronization interval to ensure greater overlap in the synchronization rounds. The reduction in overlap is a gradual and continuous phenomenon, and so, it can be detected and dealt with continuously.
In this thesis, first, we make use of TDMA-based MAC protocols, instead of CSMA, to
deal with the problem of message losses. We discuss the challenges of using TDMA-based
MAC protocols for clock synchronization and how to overcome these challenges. Second,
The IWICS protocol calculates the virtual drift rate which we use to modify the duration of the synchronization interval so that there is more overlap between the synchronization phases of neighbouring nodes. We refer to this technique as drift rate correction. Finally, we propose a different pullback technique where the pullback detection is carried out in each of the synchronization phase as opposed to the old pullback mechanism where it would be detected only when an out-of-round synchronization message is received.
The proposed pullback technique when applied to the current synchronization interval
ensures that the synchronization phases, that follow the current synchronization interval,
are better synchronized with each other. As a result of this, we are able to reduce
the duration of synchronization phases further. The IWICS protocol with all these
modifications incorporated is termed as the TIWICS (TDMA-based IWICS) protocol.
Simulation and experimental results confirm that the TIWICS protocol performs better
in comparison to the existing protocols.
|
18 |
Providing QoS in Autonomous and Neighbor-aware multi-hop Wireless Body Area NetworksIyengar, Navneet 15 October 2015 (has links)
No description available.
|
19 |
數位電視平台與弱勢團體媒體近用:以公共電視台服務聽障社群為例 / Digital TV platform and the right of media access of underprivileged group: Take PTS service for hearing impaired community as example陳慧汶 Unknown Date (has links)
邁入數位電視紀元乃是全球之趨,而其對於增進身障者獲取各類資訊的「媒介近用權」具有莫大助益,其中針對聽障社群接取內容最重要的近用需求──「字幕」和「手語」服務,在數位科技匯流發展下,皆可以「隱藏式」之方式供應,同時造福聽障和非聽障之傳播權益,以及減輕廣電業者相關技術的支付成本。因此,近用服務的提供從過去的消極被動轉向現今的積極樂觀。而外國先進國家大多皆以公共廣電媒體之設立價值與目標,作為該國近用服務推動的核心主體,希望藉由數位電視的技術研發,達成更多聽障輔助應用之需求和供應滿足,協助其順利進入數位包容社會。故本研究以探詢國外落實近用服務情形,以做為我國公共廣電服務借力使力之參考,期許對我國聽障社群在傳播權益上產生影響。
研究發現,英國、歐盟針對聽障社群的媒體近用落實,無論在法規的制定、實務的推行以及技術的研發等各層面皆有所重視,認為數位電視平台的時代,應協助聽障融入數位包容社會,並設法增進其傳播權益,以彰顯聽障與一般大眾之平權的公民地位;而在我國公視部份,其營運目標始終視英國BBC為效法對象,希冀在內、外資源充份下能達至同BBC供應近用服務之標準水平。然而在多種因素交織下,現階段公視對於聽障媒體近用服務的提供,則依舊保持類比電視時代之作為,不過,經本研究與其互動後了解,公視未來可能朝向增加其他近用服務項目發展,期望數位電視真正來臨時,其能化過往被動態度轉向積極進取:公視目前在電視平台持續兩個「手語專門」節目的製播,並預計規劃將手語服務擴大至「運動」類型節目,以符合聽障收視的期待;至於字幕服務,在已完備的基礎上,試圖朝向「表情字幕」與「即時字幕」發展;另外,於2011年HiHD數位頻道將推出「隱藏式字幕」功能。在網路平台方面,公視服務仍然延伸至電視頻道的節目宣傳與相關資訊供給為主,對於加強聽障的網路近用權益,例如「無障礙網頁空間」以及「近用小組」,認為必然有公共義務介入加以落實,但礙於目前並無相關資源規劃與投入,因此要實際推行仍有很大的進步空間。 / The main purpose of this study is to discover the practice of the right of media access in foreign countries, in order to provide reference to Taiwan’s Public Service Broadcasting (PSB) and to make progress on communication interests for hearing impaired community. “Caption” and “Sign Language” are the most important tools for hearing impaired people to gather all kinds of information and fulfill the necessity of access service. Under the digital convergence, these tools can be provided in special ways, which makes the hearing impaired people and the hearing people share the benefits simultaneously and the cost-down effect of broadcasting industry. We know that most developed countries positioned their access service project by referring to nation’s PSB. They believed the new era of digital TV is a solution to attend the balance between demand and supply of hearing impaired aid applications. While the provision of access services is getting more active and optimistic, the digital inclusion is much close to us.
The study shows, British and Europe Union think they should assist hearing impaired people to be involved in e-Inclusion society and highlight equally citizen status by enhancing the rights of hearing impaired people. All the aspects such as regulation enactments, practical implementations and technique developments has been considering all the time on the stage of digital TV platform. Just like the BBC in British area, Public Television Service (PTS) in Taiwan is taking BBC as a benchmark to achieve the access services standard in condition of sufficient resources. However, changing the status quo is not so easy for inextricably interwoven reasons. PTS still works in an analog status. In spite of the circumstances haven't changed much till now, there are much more possibilities in the future. The study discovered some new progressive plans are possible for PTS’s access services in digital journey: PTS will continue to provide two programs which are sign-presented, and moreover, sign language service is going to show up in sports genre; As to caption services, PTS is working on facial expression caption and real-time caption provision; HiHD would have closed caption function in 2011. In the case of Internet platform, PTS is focused on propaganda and related information of TV programs. Barrier-free web space and access group are considered necessary for strengthening hearing impaired people’s Internet access rights and interests, but with insufficient resources planning and investment to put into realization. We can see there is still so much to do if we believe we have the affirmative obligations.
|
20 |
Determination of Real-Time Network Configuration for Self-Adaptive Automotive SystemsZhang, Ziming 19 May 2015 (has links) (PDF)
The Electric/Electronic architecture of vehicle becomes more complex and costly, self-adaption can reduce the system, enhance the adaptive meanwhile reduce energy consumption and costs. The self-adaption needs the cooperation of both hardware and software reconfigurations, such that after the software is reconfigured the automotive network continues to fulfill the time constraints for time-critical applications. The thesis focuses on the real-time network reconfiguration. It uses EAST-ADL to model a real-time automotive system with timing events and constraints, which conforms to AUTOSAR timing extensions. The network media access is analyzed based on the model and a scheduling algorithm is developed. Then the concept is implemented by a use case, which is transformed from an EAST-ADL model to an executable simulation.
|
Page generated in 0.0684 seconds