Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we propose an improved hierarchy based mobility management scheme THMIP (Three-level Hierarchical Mobile IP) using fluid flow model to reduce the signaling overhead for a frequently moving mobile node (MN) within its hierarchical domain. In this scheme, the MN sends the binding update to the Home Agent (HA) only for the first time when the Care of address (CoA) gets changed. From the...
A novel MR image acquisition protocol has been presented in order to obtain high resolution image of the brain at acquisition time. For better delineation of the substructures of the brain we have emphasized enhancing the intensity difference between white and gray matters in the reconstructed MR image of the brain. The mathematical basis of the protocol stems from the T1 weighting combined with an...
Mobility management in the wireless domain is a challenging issue for the next generation networks. Frequent change of network requires a new IP address to route packets from one host to another. It is done by sending the mobile node (MN) binding update to the Home Agent (HA) when the Care of address (CoA) gets changed. This registration requires large number of location updates, excessive signaling...
The increasing popularity of P2P IP Services introduces a new challenge with respect to the identity of users as the lack of incremental tariff on these services removes the incentive to properly identify users before allowing them to register. We analyze multiple scenarios in future networks to demonstrate problems arising out of self assigned user identities in P2P services, and in particular P2P...
We describe here a burst scheduling algorithm to reduce burst overlapping with fiber delay lines (FDLs) in optical burst switching (OBS) network, and hence to improve the quality of service (QoS). We consider TAG (tell-and-go) protocol where many lightpaths pass in a given link and burst overlap may occur. In an intermediate node having two incoming links and one outgoing link at lower traffic loads,...
As a logical extension of today's highly mobile lifestyle comes the need for high-speed wireless broadband network access. This need was quickly recognized and addressed by the research community with the development of several wireless network technologies. Co-existence of such multiple technologies in the market necessitated a signaling scheme for mobile devices to change the point of attachment...
Presence or personal status information is going to be an integral part of human life in the near future. With the possibility of personalizing user preferences in a fine grained way, mobile presence will appeal to most users. Among all the advantages, one of the most annoying problems is to set the presence status manually each time. This paper discusses the development of an intelligent agent based...
This paper proposes a new secure routing protocol, named secure optimal reactive routing protocol (SORRP) for mobile ad-hoc networks. The work is based on ORRP, reported in one of our earlier works. In spite of being a reactive protocol, SORRP does not use flooding and at the same time finds the optimal path in terms of minimal routing distance. The current work improves ORRP in a two-fold approach...
It is well known that a packet loss in 802.11 can happen either due to collision or an insufficiently strong signal. However, discerning the exact cause of a packet loss, once it occurs, is known to be quite difficult. In this paper we take a fresh look at this problem of wireless packet loss diagnosis for 802.11-based communication and propose a promising technique called COLLIE. COLLIE performs...
Embedded smart camera systems comprise computation- and resource-hungry applications implemented on small, complex but resource-hardy platforms. Efficient implementation of such applications can benefit significantly from parallelization. However, communication between different processing units is a nontrivial task. In addition, new and emerging distributed smart cameras require efficient methods...
Although wireless sensor network was a trend of past few years, lots of researchers have been working for its development. As a consequence, they have developed new research works. But within these works, very few works are for disaster managements in hybrid networks of sensor networks and cellular networks. However, among these few works, no works consider that some base stations of cellular networks...
In recent times, there has been a huge increase in Social-networking based activities on the Internet. Users have started using the Internet, not only for collaborating with each other but also taken on a new role of being Information prosumers (producers + consumers). The standardization of the really simple syndication (RSS) platform, which allows for a cross-domain sharing of content (user generated...
WSNDM is a wireless sensor network protocol for disaster management. The authors have proposed this protocol with an updated hybrid network framework. In this paper, we analyze the performance of this protocol and compare it with well known protocol LEACH, though LEACH protocol does not consider a collapsed base station, which our protocol does. In sensor network, performance is measured by average...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.