Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we propose a novel network selection algorithm considering power consumption in hybrid wireless networks for vertical handover. CDMA, WiBro, WLAN networks are candidate networks for this selection algorithm. This algorithm is composed of the power consumption prediction algorithm and the final network selection algorithm. The power consumption prediction algorithm estimates the expected...
1xEV-DO is the first wireless standard to support the delivery of broadcast and multicast services (BCMCS). Complementing unicast, which sends content to subscribers individually (e.g. video-on-demand), BCMCS transmits multimedia content from a single source to multiple users simultaneously. In BCMCS, Reed-Solomon coding is applied to the layers above the turbo code, and is particularly effective...
Strict priority queueing and weighted round robin are two common scheduling schemes for differentiation of services in telecommunication networks. A combination of these is the priority weighted round robin (PWRR) scheme, which serves three classes of traffic with distinct quality requirements, namely expedited forwarding (EF), assured forwarding (AF) and best effort forwarding (BF). The response...
The focus of this paper is on wireless mesh networks. In particular, we study the multi-radio case, given the considerable improvement in network throughput that multiple radios allow to achieve and the availability of cost-effective wireless devices. Interesting research problems are still unsolved in this field. Due to the scarcity of non-overlapped frequency channels and available radios per node,...
The static nature of mesh nodes imposes requirements for designing routing metrics that support high throughput and low packet delay. This paper considers the problem of interference-load aware routing in multi channel wireless mesh networks. We propose a new Interference-Load Aware routing metric, ILA, that finds paths with reduced inter-flow and intra-flow interference. The aim of this metric is...
Quality of service (QoS) in Layer 3 is essential for satisfying various types of Internet-application requirements by making the best use of limited bandwidth. A large number of such applications still use TCP/IP in order to connect various types of computer nodes. This paper investigates QoS performance in a network equipment testbed. We examine the major class of service (CoS) functions provided...
Vehicular networks are emerging as an exciting new area of pervasive networking. Roadway congestion amelioration is one of the attractive applications of such a network. The mobility of vehicles on the roadway has been modeled in literature, but the effect of the communication network on the mobility patterns has not been addressed so far. We present such a model of the mobility that integrates the...
In the current Internet, congestion control is performed jointly by the end systems running the TCP protocol and by routers running active queue management (AQM) algorithms. Due to the TCP protocol's AIMD congestion control algorithm and its round trip time delay to react to packet losses, it is very hard to maintain high TCP throughput with a low packet loss rate in routers. In addition, unresponsive...
In this paper, the unique nature of direction finding in an RF environment against an uncooperative emitter is presented. Specifically, the focus is on power management in a wireless antenna array. This paper will present two competing methods of power management. Both methods will use a Least Mean Squares (LMS) adaptive beamforming algorithm to compensate for grating lobes that are present in the...
Honeypots are a useful tool for discovering the distribution of malicious traffic on the Internet and how that traffic evolves over time. In addition, they allow an insight into new attacks appearing. One major problem is analysing the large amounts of data generated by such honeypots and correlating between multiple honeypots. Honey Plotter is a web-based query and visualisation tool to allow investigation...
Correct assessment of image fidelity is fundamental to the development of efficient image compression schemes especially to that of the schemes taking characteristics of the human visual system into account. In this paper, a fidelity metric for assessing the visual quality of color images is presented. The proposed fidelity metric is designed to measure the perceivable distortion in the quasi-uniform...
This paper, a novel feature selection algorithm for object tracking is proposed. This algorithm performs more robust than the previous works by taking the correlation between features into consideration. Pixels of object/background regions are first treated as training samples. The feature selection problem is then modeled as finding a good subset of features and constructing a compound likelihood...
Dynamic admission control is a very important mechanism that aims, not only to check resources availability, but also to verify QoS constraints satisfaction. In this paper, we propose a new admission control mechanism in MPLS-based packet-switched networks. This admission control mechanism satisfies delay constraints for all the network connections. The admission control mechanism is based on solving...
To achieve energy-conservation and prompt responses simultaneously, in this paper we propose a novel energy-saving data placement strategy, called striping-based energy-aware (SEA), which can be applied to RAID-structured storage systems to noticeably save energy while providing quick responses. Further, to illustrate the effectiveness of SEA, we implement two SEA-powered RAID-based data placement...
Customers have complained that malicious nodes are mounting increasingly sophisticated attacking operations in mobile ad hoc networks (MANETs). It is obvious that the IP-based MANETs are vulnerable to attacks and therefore are insecure. In this paper, we design a novel assignment router identity protocol (ARIP) to establish a new layer of network architecture and to take full advantage of Dynamic...
This paper presents a compressed-domain fall incident detection scheme for intelligent homecare applications. First, a compressed-domain object segmentation scheme is performed to extract moving objects based on global motion estimation and local motion clustering. After detecting the moving objects, three compressed-domain features of each object are then extracted for identifying and locating fall...
This paper presents an approach that reuses data stored in the frame memory and in the motion estimation (ME) internal buffer to avoid unnecessary memory accesses and redundant ME computations for MPEG video encoders. This work employs a macroblock bitmap table, which can be easily maintained, to locate the reusable data. The experimental results show that the proposed scheme is particularly efficient...
A new physical layer technique in Hong, Y-W abd Scaglione, A., (2003) for broadcasting in multi-hop wireless ad hoc networks makes broadcast a much more efficient building block than traditional flooding broadcast. This broadcasting technique requires that all nodes that receive a message retransmit it at the same time. Because the messages are identical, interference can be constructive rather than...
Middleware for wireless sensor network (WSN) abstracts a network as an entity and hides programming difficulties from programmers. Many middlewares have been proposed, but they use different programming languages to manipulate functions in WSNs. This inhibits usability when manipulating multiple WSNs managed by different middlewares, because the primitives of each language have different descriptive...
We present two new low-complexity Bayesian-fusion linear receiver structures for synchronous non-orthogonal DS-CDMA wireless sensor networks. The first receiver treats the underlying hypothesis as a system parameter and estimates it to arrive at a global decision. The second receiver is similar to the MMSE multiuser detector, except that it accounts for the covariance between the sensors' transmitted...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.