Kalman Filtering Based Adaptive Transfer in Energy Harvesting IoT Networks
نویسندگان
چکیده
منابع مشابه
Harvested Energy-adaptive Mac Protocol for Energy Harvesting Iot Networks
In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA) Medium Access Control (MAC) protocol utilizes th...
متن کاملAdaptive Kalman Filtering
The increased power of small computers makes the use of parameter estimation methods attractive. Such methods have a number of uses in analytical chemistry. When valid models are available, many methods work well, but when models used in the estimation are in error, most methods fail. Methods based on the Kalman filter, a linear recursive estimator, may be modified to perform parameter estimati...
متن کاملLearning-Based Computation Offloading for IoT Devices with Energy Harvesting
Internet of Things (IoT) devices can apply mobileedge computing (MEC) and energy harvesting (EH) to provide the satisfactory quality of experiences for computation intensive applications and prolong the battery lifetime. In this article, we investigate the computation offloading for IoT devices with energy harvesting in wireless networks with multiple MEC devices such as base stations and acces...
متن کاملAdaptive Observer and Kalman Filtering
In this paper the problem of the speed estimation of an Unmanned Aerial Vehicle is addressed, when only the standard outputs (acceleration, angles and angular speeds) are available for measurement. We focus our analysis on a prototype drone a 4 rotors helicopter robotwhich is not equipped with GPS related devices and relies on the Inertial Measurement Unit (IMU) only. Two different approaches h...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2995366