The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the future Energy Internet, one of the challenging problems faced by microgrids will be the multiple energy management including outer energy exchange and inner energy schedule. This paper proposes a game theory based dual energy scheduling method for microgrids in Energy Internet. The dual energy scheduling problem is formulated as a non-cooperative game, where household users within a microgrid...
IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication...
These days we are witnessing a tremendous increase in the popularity of wireless devices, e.g. smartphones and tablets. These devices are typically connected to the Internet through cellular connections, such as LTE/4G. Because of the popularity of the wireless devices, a large portion of the traffic on the Internet goes through the cellular base stations. Caching the contents at the base stations...
Ubiquitous and resilient Internet connection access is becoming a necessity of life. Moreover, the amount of data requested by mobile users is increasing rapidly. Cooperative mobile Internet access is a promising approach to addressing these demands, by giving the mobile devices the opportunity to use the help of other devices to access the Internet. The helpers can download the data requested by...
Visible light communications (VLC) is emerging as a new alternative to the use of the existing and increasingly crowded radio frequency (RF) spectrum. VLC is unlicensed, has wide bandwidth, supports new levels of security due to the opacity of walls, and can be combined to provide both lighting and data communications for little net increase in energy cost. As part of a lighting system, VLC is ideal...
Network virtualization has emerged as a powerful way to fend off the current ossification of the Internet. A major challenge is virtual network mapping, which is to assign substrate resources to virtual networks (VNs) such that some predefined constraints are satisfied and substrate resources are utilized in an effective and efficient manner. Due to the NP-completeness of this problem, a variety of...
Peer-to-peer file sharing techniques are efficient and popular ways to distribute network media contents. Aiming to improve the accessibility of media contents from mobile devices, we introduce peer-to-peer file sharing technique into delay tolerant networks (DTNs), which are formed solely by highly mobile devices and which distribute files utilizing the mobility of humans and vehicles. We first investigate...
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile ad hoc networks has been studied extensively, efficient multicasting in...
Deploying city-wide 802.11 access points has made possible Internet access in a vehicle, nevertheless it is challenging to maintain client performance at vehicular speed especially when multiple mobile users exist. This paper considers the association control problem for vehicular networks in drive-thru Internet scenarios. In particular, we aim to improve the overall throughput and fairness for all...
The primary goal of the secure socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA decryption, it is introduced that the proposed secret exchange algorithm can be used to speedup SSL session initialization. The optimization strategy, which is...
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a user should store his personal files in an encrypted form in a cloud, and then sends queries in the form of encrypted keywords. However, a simple encryption scheme may not work well when a user wants to retrieve only files...
Providing scalable streaming media service over the internet is a demanding task nowadays, CDN(Content Delivery Network) and P2P are the main approaches while both have pros and cons. We propose a novel hybrid architecture - PeerCDN to combine the two approaches seamlessly with their inherited excellent features. PeerCDN is a two-layer streaming architecture. Upper layer is a server layer which is...
Providing video on demand (VoD) service over the Internet is a challenging problem. In this paper, we present a novel Kademlia P2P network-based VoD streaming scheme: KadStreaming. In this infrastructure, we emphasize on the main mechanism of node initiation, node joining, media publishing, media searching, node departure. Based on that, a developed prototype system of this scheme is given. As part...
From the analysis of some hard drawbacks faced server-centric VOD system today, a novel P2P-based VOD system using media file segments selecting algorithm (P2P-VOD- FSS), is introduced in this paper. In this infrastructure, we emphasize on how to real-timely and orderly download and consume file segments from multiple peer nodes to guarantee streaming service, we firstly give a system model of selecting...
Publish/subscribe (pub/sub) systems are very suitable for the dissemination of dynamic information over the Internet. As dynamic information is usually characterized by a short lifetime, both publishers and subscribers may specify the delay requirement on message delivery. Although existing pub/sub systems can easily be extended so that publishers and subscribers can specify their delay requirements,...
Peer-to-peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. P2P systems can be categorized by the degrees of centralization. For fully centralized systems, the lookup service will not be available when the...
Radio frequency identification (RFID) is expected to be widely used in the future, as it can be embedded into everyday items as RFID tags. Using RFID technology, enterprises can share real-time data about products with trade partners over the Internet. Application service provider (ASP) provides services for clients in a central managing way by Internet. Users who subscribe the ASP service do not...
On analysis of the drawbacks of the current content delivery system, such as heterogeneous, isolated content service systems and difficult integration, a novel Web services-based content alliance broker scheme - WS-CABroker, is introduced in this paper. Firstly, we propose the architecture of WS-CABroker for integrating heterogeneous content service systems based on Web services standard. Then we...
The link structure of the Web graph is used in algorithms such as Kleinberg's HITS and Google's PageRank to assign authoritative weights to Web pages and thus rank them. Both require a centralized computation of the ranking if used to rank the complete Web graph. In this paper, we propose a new approach based on a Layered Markov Model to distinguish transitions among Web sites and Web documents. Based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.