The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Content Centric Networks (CCN) replaces the IP narrow waist of the Internet architecture by a content layer. When a node wants to access a piece of content, it sends an Interest packet to the network. The network then, using the name of the content for routing, forwards the Interest to one or more copies of the content object. In this paper, we present the implementation of a testbed for CCN....
With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In this paper, we implement a simulation system based on Particle Swarm Optimization (PSO) in order to solve the problem of mesh router placement in WMNs. We consider 4 replacement methods...
We have been working for asynchronous control with fine-grain pipeline circuits, namely, self-synchronous circuits. We have demonstrated self-synchronous FPGA and self-synchronous RSA crypt-engine, to show energy consumption reduction at the energy minimum operating point, by gate-level power gating, and tamper resistivity of crypt-engine by dual-rail asynchronous operations. It is, however, realized...
Public key cryptography like RSA becomes essential for security of IoT devices. Faster, lower power and smaller area realization are the typical demands for such crypto engine. This paper presents comprehensive study on higher-order-radix RSA crypto-engine to demonstrate design trades offs. We presents designs of 1024 bit RSA engine with 2 to 1024 radix arithmetics. In 65nm FDSOI process, 1024 bit...
Automatic optimal design of asynchronous system based on gate-level handshake pipelined control is proposed. Gate-level alignment, fan-out and loop optimization are important to maintain throughput of the system. With netlist generated from RTL by a commercially available logic synthesize tool, our method optimizes insertion of buffers to optimally align among gates. Benchmark results show the proposed...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers. Node placement problems have been investigated for a long time in the optimization field due to numerous applications in location science. In our previous work, we evaluated WMN-GA system which is based on Genetic Algorithms (GAs) to find an optimal location assignment for mesh routers. In this paper,...
With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In this paper, we propose and implement a simulation system based on Particle Swarm Optimization (PSO). We use Size of Giant Component (SGC) and Number of Covered Mesh Clients (NCMC) as metrics...
In recent years, Ambient Intelligence (AmI) has attracted increased attention within the advanced technology industry in an effort to modernize and develop a more intelligent and reliable information system. Technologies to detect a specific object in images are expected to further expand to wide range of applications, such as car detection functions for Intelligent Transport System (ITS) and other...
Wireless Sensor and Actuator Networks (WSANs) have emerged as a variation of wireless sensor networks. WSANs are capable of monitoring physical phenomenons, processing sensed data, making decisions based on the sensed data and completing appropriate tasks when needed. In previous work, we proposed and implemented a fuzzy-based simulation system for WSAN. The system select the actuator in order to...
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has trustworthy neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other...
A Wireless Sensor and Actor Network (WSAN) is a group of wireless devices with the ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), based on the sensed data shared by sensors. In order to provide effective sensing and acting, a coordination mechanism is necessary among sensors and actors. This coordination can be distributed-local coordination among...
In our previous work, we proposed a method of Message Suppression Controller (MSC) considering Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications. In this paper, we evaluate the proposed MSC method for Vehicular Delay Tolerant Networking (VDTN). The simulations for two scenarios are conducted considering obstacles (buildings), where MSC embedded in Vehicles (MSCV) are present...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. Considering mobility of the terminals, routing is a key process for operation of WMNs. In this paper, we present the implementation of a testbed for WMNs. We analyze the performance of Optimized Link...
In previous work, we proposed a Message Suppression (MS) method for Vehicular Delay Tolerant Networking (Vehicular-DTN) considering Epidemic routing protocol. In this paper, we evaluate our proposed MS method considering three different DTN routing protocols under highly stressed environment. In order to evaluate the performance of MS method, we use Direct Delivery, Spray and Wait and Epidemic as...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform. In our system, we considered four input parameters: Number of Authentic Files (NAF), Local Score (LS), Number of Interactions (NI) and Security (S) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. Considering mobility of the terminals, routing is a key process for operation of WMNs. In this paper, we present the implementation of a testbed for WMNs. We analyze the performance of Optimized Link...
In this paper, we investigate the performance of HWMP, OLSR and DD protocols in a VANET crossroad scenario. The mobility patterns of vehicles are generated by means of SUMO (Simulation of Urban Mobility) and as communication protocol simulator is used NS3 (Network Simulator 3). For the simulations, we used IEEE 802.11p standard, Two Ray Ground Propagation Loss Model and sent multiple CBR flows over...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform. In our system, we considered four input parameters: Number of Interactions (NI), Security (S), Packet Loss (PL) and Local Score (LS) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown...
In recent years, Ad-hoc Networks have an increased attention on covering rural areas due to the possibility of usage of low-cost and high-performance terminals, without having to depend on the network infrastructure. So routing algorithms are very important for operation of Ad-hoc Networks. In this paper, we present the implementation of a Cent OS-based testbed for Ad-hoc Networks. We analyze the...
In previous work, we proposed a Message Suppression (MS) method for Vehicular Delay Tolerant Networking (Vehicular-DTN) considering Epidemic routing protocol. In this paper, we evaluate our proposed MS method considering two different topologies for different DTN routing protocols. The MS method works together with Direct Delivery, Spray and Wait and Epidemic routing protocols using additional packets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.