On efficient message passing in energy harvesting based distributed system

Author(s):  
Ye Tian ◽  
Qiang Xu ◽  
Jason Xue
2014 ◽  
Vol 13 (6) ◽  
pp. 4537-4542
Author(s):  
Mr. Anurag Singh ◽  
Dr. Amod Tiwari

In this paper, a new approach is being proposed to achieve mutual exclusion in distributed system using computer network and topology of nth nodes. In this executive approach nodes communicate among themselves using message passing technique. In this executive approach, distributed system with n nodes is logically partitioned into number of sub distributed system having only m½ nodes, where m is obtained by adding a minimum number in n to make it next perfect square number only if n is not a perfect square. Proposed algorithm is a Token based approach and achieves token optimally in 2 messages only for the best case and in worst case a node achieves token in n messages only.


2014 ◽  
pp. 92-99
Author(s):  
N. P. Gopalan ◽  
K. Nagarajan

Checkpointing mechanism is the one of the best attractive approach for providing software fault tolerance in distributed message passing systems. This paper aims to implement a distributed checkpointing technique, which eliminates the drawbacks of the centralized approach like “domino effect”, “useless checkpoint” (checkpoints that do not contribute to global consistency), and “hidden and zigzag” dependencies. The proposed checkpointing protocol has a checkpoint initiator, but, coordination among the local checkpoints is done in a distributed fashion. This guaranty that no message would be lost in case of failure occurs, has been maintained in this work by exchange of information among the processes. However, there is no central checkpoint initiator, but each of the processes takes turn to act as an initiator. Processes take local checkpoints only after being notified by the initiator. The processes synchronize their activities of the current checkpointing interval before finally committing their checkpoints. Thus, the checkpointing pattern described in this paper takes only those checkpoints that will contribute to the consistent global snapshot thereby eliminating the number of useless checkpoints.


2004 ◽  
Vol 13 (3) ◽  
pp. 279-295 ◽  
Author(s):  
Alexander Goldin ◽  
Craig Gotsman

Message filtering is important for distributed multiagent systems, where a large number of dynamic agents participate in the system activity, but a typical agent is interested in only a very small dynamic subset of the other agents. The agent must be constantly informed on the status of this subset, and this is achieved by message passing between relevant agents. Message filtering is required to reduce the communications load on the system, which could be prohibitive if each agent must communicate with all others in order to obtain the information it needs. This paper deals with the case of a multiagent virtual environment, where each agent has a location in 2D space, and is interested in a small subset of the other agents, either those within a fixed range—as treated by previous authors, or the k other agents nearest to it—treated here for the first time. Furthermore, we treat the case of a fully distributed system, where no central server(s) are available to coordinate between the agents. The main challenge is then to design protocols that perform significant message filtering, yet enable each agent to maintain a consistent image of the other agents it is interested in. These protocols are useful in multi-agent games, simulations, and other virtual environments in which the geometric relationships between agents are important. They could also be useful for mobile-commerce and cellphone-based gaming applications.


Author(s):  
Yeyun Cai ◽  
Fang Deng ◽  
Jiachen Zhao ◽  
Huangbin Qiu ◽  
Xinyu Fan ◽  
...  

2020 ◽  
Vol 64 (1-4) ◽  
pp. 439-446
Author(s):  
Gildas Diguet ◽  
Gael Sebald ◽  
Masami Nakano ◽  
Mickaël Lallart ◽  
Jean-Yves Cavaillé

Magneto Rheological Elastomers (MREs) are composite materials based on an elastomer filled by magnetic particles. Anisotropic MRE can be easily manufactured by curing the material under homogeneous magnetic field which creates column of particles. The magnetic and elastic properties are actually coupled making these MREs suitable for energy conversion. From these remarkable properties, an energy harvesting device is considered through the application of a DC bias magnetic induction on two MREs as a metal piece is applying an AC shear strain on them. Such strain therefore changes the permeabilities of the elastomers, hence generating an AC magnetic induction which can be converted into AC electrical signal with the help of a coil. The device is simulated with a Finite Element Method software to examine the effect of the MRE parameters, the DC bias magnetic induction and applied shear strain (amplitude and frequency) on the resulting electrical signal.


2020 ◽  
Vol 64 (1-4) ◽  
pp. 201-210
Author(s):  
Yoshikazu Tanaka ◽  
Satoru Odake ◽  
Jun Miyake ◽  
Hidemi Mutsuda ◽  
Atanas A. Popov ◽  
...  

Energy harvesting methods that use functional materials have attracted interest because they can take advantage of an abundant but underutilized energy source. Most vibration energy harvester designs operate most effectively around their resonant frequency. However, in practice, the frequency band for ambient vibrational energy is typically broad. The development of technologies for broadband energy harvesting is therefore desirable. The authors previously proposed an energy harvester, called a flexible piezoelectric device (FPED), that consists of a piezoelectric film (polyvinylidene difluoride) and a soft material, such as silicon rubber or polyethylene terephthalate. The authors also proposed a system based on FPEDs for broadband energy harvesting. The system consisted of cantilevered FPEDs, with each FPED connected via a spring. Simply supported FPEDs also have potential for broadband energy harvesting, and here, a theoretical evaluation method is proposed for such a system. Experiments are conducted to validate the derived model.


2011 ◽  
Vol 1 (10) ◽  
pp. 81-82
Author(s):  
Chhaya Nayak ◽  
◽  
Deepak Tomar

2012 ◽  
Vol 2 (5) ◽  
pp. 252-255
Author(s):  
Rudresha K J Rudresha K J ◽  
◽  
Girisha G K Girisha G K

Sign in / Sign up

Export Citation Format

Share Document