The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
The Internet of Things (IoT) is an extension and expansion of the Internet which is extensively deployed in the healthcare field. With the proliferation of Personal Health Devices (PHDs), there is a significant incompatibility issue where devices use special data transfer protocols and can only communicate with special healthcare providers from the same manufacturer, thus interoperability and network...
The spry maturation of Internet of Things (IoT) has paved way to the rapid development of numerous sectors and these have been envisioned in; connected transport, smart cities, connected homes, connected healthcare, etc. IoT is a technology that connects "things" that are embedded with sensors, actuators and network connectivity to collect and exchange the data to the internet. The ability...
The current IPsec gateway integrates many functions of IPsec operation, tunnel management and forwarding decision, which makes the IPsec gateway complicated in maintenance and deployment. The problem of maintaining such devices prevents IPsec VPN from applying widely. The emergence of SDN provides an innovative way to decouple the control plane and data plane. In this paper, a Software-Defined IPsec...
Advances in wireless technology have resulted in pervasive deployment of devices of a high variability in form factors, memory and computational ability. The need for maintaining continuous connections that deliver data with high reliability necessitate re-thinking of conventional design of the transport layer protocol. This paper investigates the use of Q-learning in TCP cwnd adaptation during the...
An optimal relay transmission policy by exploiting a stochastic energy harvesting (EH) model is proposed for EH two-way relay (TWR) networks, wherein a solar-powered relay with a finite-sized battery adopts an amplify-and-forward protocol for helping relaying signals. The relay transmission power is optimized to minimize the long-term outage probability by considering the causal EH information, battery...
This paper argues that the decentralization feature of Peer-to-Peer (P2P) overlay is more suitable for Volunteer Computing (VC), compared to the centralized master/worker structure in terms of performance bottleneck and single point of failure. Based on the P2P overlay Chord, this paper focused on the design of a workload balancing protocol to coordinate VC. The goal of the protocol was to maximize...
This paper focuses on the problem of throughput maximization in a self-powered point-to-point Multi-Input Multi-Output (MIMO) wireless communication system, the transmitter of which is powered only by energy harvested from ambient radio signals. The transmitter follows a save-then-transmit protocol in transmission frames. The protocol requires the system first carry out the energy harvesting process...
Software defined infrastructure greatly reduces the deployment cost of distributed applications. Many distributed applications employ message oriented middleware (MOM) for the integration of heterogeneous components and to achieve scalability and fault tolerance. The structure of a distributed application can be very complex. In addition, the asynchronous message delivery model of MOM further complicates...
Recently, two Modular Multilevel Converter (MMC) projects are under construction in China. Since these are the first two multi-terminal MMC projects in the world and the controllers are sophisticated, a real time simulation platform becomes critical to enable hardware-in-the-loop (HIL) test and validation of the MMC controllers in various scenarios, before applying them in the field. This paper presents...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
We report on a quantum key distribution (QKD) experiment where a client with an on-chip polarisation rotator can access a server through a telecom-fibre link. Large resources such as photon source and detectors are situated at server-side. We employ a reference frame independent QKD protocol for polarisation qubits and show that it overcomes detrimental effects of drifting fibre birefringence in a...
This paper introduces based on 51 MCU Ethernet interface hardware circuit design and software implementation. Describes how to transplanting ZLIP protocol into the C8051F120 micro controller to debug and run, Experimental results show that the Ethernet system operated normally, better real-time data transmission and stability. This design provides a easy and low cost method of network interface design,...
Smart grid (SG) is the next generation electrical power grid which will provide reliable, efficient and secure energy generation and distribution. To achieve these goals, data such as smart meter (SM) information will be sent to the control center for analysis and decision-making. However, the existing data backhaul network has limited coverage and data rates, is inflexible, and has low reliability...
Modern firewalls are becoming complex and anomalies may exist in their rule sets. Security log data, such as firewall logs and logs generated by intrusion detection systems, could provide useful information for the update and addition of existing firewall rule sets. In this paper, we focus on the development of an effective mechanism for firewall rule generation, and proposed an algorithm called Domain-Specific...
Multi-hop over-the-air reprogramming is essential for the remote installation of software patches and upgrades in wireless sensor networks (WSNs). Recently, coding-based reprogramming protocols are proposed to address efficient code dissemination in environments with high packet loss rate. The problem of analyzing the performance of these protocols, however, has not been explored in the literature...
In this paper, a novel wireless cooperation scheme with complex-field network coding (CFNC), CFNC-amplify-and-forward (CFNC-AF), is developed for multi-way relay (MWR) communications. In this scheme, orthogonal CFNC vectors and joint signal detection are employed to accomplish information exchange among N(N > 2) user nodes via a helping relay node, and a multi-phase transmission protocol is designed...
In this paper, we investigate the connectivity of random cognitive radio networks with different routing schemes. Two coexisting ad hoc networks are considered with m primary users (PUs) and n secondary users (SUs) randomly distributed in a unit area. The relation between n and m is assumed to be n = mβ. We show that with the HDP-VDP routing scheme, which is widely employed in the analysis of throughput...
SSL protocol realize identity authentication through verifying both sides' certificate, but there are still some drawbacks. Through applying attribute certificate and improving SSL handshake process, we can improve the function of the SSL identity authentication, let SSL apply more widely.
This paper describes a vision based on dedicated CDMA 1X wireless data terminal, applies the embedded development technologies, designs of the hardware interfaces and software and implements a wireless data terminal based on CDMA 1X, according to the functional requirements for wireless broadband communication systems.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.