Full-ISL clock offset estimation and prediction algorithm for BDS3

GPS Solutions ◽  
2021 ◽  
Vol 25 (4) ◽  
Author(s):  
Junyang Pan ◽  
Xiaogong Hu ◽  
Shanshi Zhou ◽  
Chengpan Tang ◽  
Dongxia Wang ◽  
...  
2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Hongwei Yang ◽  
Long Wang ◽  
Jing Zhang ◽  
Li Li

As a result of the influence of clock drift and uncertainty delay in synchronous message transmission, the clock synchronization model based on statistical distribution cannot accurately describe clock deviation. This model also requires a large number of timestamp samples that cause a storage occupation issue for wireless sensor nodes with limited resources. The modeling method based on grey prediction has advantages of low sample demand and simple modeling process. However, the accuracy of the existing clock synchronization models needs to be improved. Based on the grey prediction theory, this paper proposes an adaptive fractional-order operator clock synchronization algorithm considering uncertainty delay. First, based on the clock model and clock offset model, the frequency offset between nodes is optimized by taking the mean on the clock frequencies. Second, a grey prediction algorithm based on a fractional-order operator is proposed by estimating the uncertainty delay in message transmission to obtain the clock offset. Finally, the order of the fractional-order accumulation is adjusted adaptively in the grey prediction model according to the collected timestamp sample values so that the estimation of the uncertainty delay is more accurate, thereby improving the accuracy of the clock offset. Compared with the first-order accumulative grey prediction clock synchronization algorithms and timing-sync protocol for sensor networks, the proposed scheme improved the synchronization accuracy by 29.18% and 44.01%, respectively, and reduced the variance of the clock offset by 48.66% and 64.89%. Thus, the proposed algorithm is characterized by improved stability.


2021 ◽  
Vol 15 ◽  
pp. 103-110
Author(s):  
Mohamadreza Mohamadzadeh

To migrate to cloud computing or other new generation of computational and communicational network we should making some laws about limitations on such networks. We should clarify clearly the level of accessions to resources and/or the ability to sending or receiving files through such network. We can avoid unpredicted and undesired works by using of law makings. Furthermore, besides of law making we can use evolutionary and/or intelligence techniques for estimation and prediction about parameters that deal with controlling of our network – for example in this paper we introduce one type of such intelligence algorithms which named as unscented Kalman filter. By giving some raw inputs about treatments and resources of such networks we’re able to estimate and predict about lots of different conditions of these networks. For example, we should have an estimation and prediction algorithm to be able to track and trace the hackers or crackers, if they’re permeating to our network. Or we should estimate the amount of users that will use particular software or application on a specific hour through such network. Also, if we study users treatment on a specific network, like cloud computing, we’re able to estimate and predict their keen and eagerness about new released software or application; because if we know how people treat and face and react with new emerging software we’re able to construct and program our applications more precisely. In this paper, at first we tell about cloud computing – we define it completely and discuss about all aspects of this new generation of internet – also in the first section we discuss about efficiency of cloud computing in saving of energy and tell differences between the amount of energy that cloud resources use and the amount of energy that other computerized frames were use. We proof our suggestions and ideas by the means of analytical and mathematical analysis; after that when we understand about all of its concepts, a brief review about Microsoft decisions on cloud computing were present, we review new systems and software’s of Microsoft that equipped with cloud computing and study the advantages and disadvantages of these new services which are equipped with cloud computing. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce fixedinterval smoothers; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities we’re able to eliminate malicious and spyware treatments from the beginning points of our network. Also by the means of mathematical analysis in this paper, we demonstrate all of our suggestions and according to these proofs we conclude about workability and liability of such network.


Sign in / Sign up

Export Citation Format

Share Document