The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, there have been a large number of proposals for IoT middleware solutions. In addition, a few recent studies have surveyed and qualitatively evaluated these IoT middleware proposals against functional and non-functional features. A quantitative evaluation is also needed to complement these existing qualitative studies and provide a more in-depth perspective of the state of the art. This paper...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should...
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ...
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSNs) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA driven medium access control protocols, contention of the shared medium raises both at the event detection area and near the sink, which in turn increases the packet collisions greatly. In this paper, we exploit the amount of...
Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer nodes, induced by mobility, power drains and damage makes route maintenance difficult and degrade the network's ability to offer services reliably to its peer nodes. In this paper, we present a routing scheme for proactive...
This paper is a contribution to the inception of multiple tokens in solving distributed mutual exclusion problem. The proposed algorithm is based on the token ring approach and allows simultaneous existence of multiple tokens in the logical ring of the network. Each competing process generates a unique token and sends it as request to enter the critical section that travels along the ring. The process...
In this paper, we propose a new aggregate routing model and a distributed aggregate routing algorithm (DARA) that implements the model for achieving load and energy balanced efficient data forwarding. DARA is designed for multi-sink multipath location aware network architecture. It's a fully distributed algorithm, each node takes routing decision based on the aggregated weight of the following three...
Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better solution: allowing interactions between two or more non-adjacent layers in the protocol stack. Cross-layer architectures based on purely local information will not be able to support system-wide cross-layer performance optimization,...
Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer architectures may provide a better solution: allowing interactions between two or more non-adjacent layers in the protocol stack. Architectures based on purely local information will not be able to support autonomic communications like self-behaving systems...
The modified signed-digit (MSD) number system has been a topic of interest as it allows for parallel carry-free addition of two numbers for digital optical computing. In this paper, harmonic wavelet joint transform (HWJT)-based correlation technique is introduced for optical implementation of MSD trinary adder implementation. The realization of the carry-propagation-free addition of MSD trinary numerals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.