Learn More
We describe a symbolic computer algebra sys-tem(CAS) toolbox for nonlinear and adaptive control law synthesis and simulation. This Mathemat-ica program provides functions for basic mathematical operations frequently encountered in analysis of nonlinear systems, implements algorithms for adap-tive and approximate nonlinear control as well as provides speedy(More)
In this paper we investigate how trust, with its various notions and forms, impacts the gathering and fusing of raw data, and its subsequent conversion to knowledge in sensor network. In particular, we study how the presence of compromised or faulty sensors affects the performance of the decision fusion, by using metrics of quality of information (QoI). We(More)
— There has been a tremendous increase in demand for real-time video applications over military networks. Multicast provides an efficient solution for simultaneous content delivery to a group of users. It is especially valuable for military applications, as it saves network resources by sharing the data streams across receivers. Even with ever increasing(More)
In this paper, we provide a parametric model for analyzing the control overhead usage In mobile ad-hoc networks (MANET). In particular, we focus on evaluating the Impact of the hierarchy of both topology formation and routing on the scalability of overhead usage. Via an analytical approach, we quantitatively characterize the amount of overhead under(More)
We design an nonlinear adaptive control for a conical magnetic bearing system using the structure algorithm of Hirschorn and Singh and its adaptive version due to Ghanadan and Blankenship. Simulation results are presented and compared with the optimal linear controller of Mohamed and Emad. The nonlinear controller improves transient and forced response. The(More)
Autonomous systems can substantially enhance a human's efficiency and effectiveness in complex environments. Machines, however, are often unable to observe the preferences of the humans that they serve. Despite the fact that the human's and machine's objectives are aligned, asymmetric information, along with heterogeneous sensitivities to risk by the human(More)
The challenges of optimal flooding of network control messages in Mobile Ad-Hoc Network (MANET) have been well studied in the literature [2]-[10] and [12]-[19]. A particular case of this problem is encountered in MANET routing protocols, which need to distribute routing control information to all member nodes as efficiently as possible. While both proactive(More)
  • 1