The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An optimal design method for generating a flight path passing through specified waypoints while satisfying the task points sent by the ground operators is proposed in this paper. Each specified waypoint is reached exactly at the specified location and time while intermediate waypoints are generated in such a way that they satisfy the task points, with highest benefit measure, i.e., satisfying tasks...
In this demo, an optimal design method for generating a flight path passing through specified waypoints while satisfying the task points sent by the ground base station is proposed. Each specified waypoint is reached exactly at the specified location and time while intermediate waypoints are generated in such a way that they satisfy the task points with high task priority and high QoS priority. Generated...
Service Oriented Architecture (SOA) is an architectural style that provides agility to align technical solutions to a modular business Web Services (WS) that are well decoupled from their consumers. This agility is extended to the Cloud model. To achieve a high level of security and a degree of decoupling, SOA encourages the use of standardized transport schemes such as SOAP/HTTP(s) with WS family...
In a Mobile P2P (M-P2P) network, selfish nodes can drop packets to affect the efficiency of the whole network. Therefore, we propose a simple and efficient mechanism using virtual currency to identify selfish nodes in the network. Each node issues a receipt to its broker to prove that it has provided a forwarding service. Based on receipts received each broker provides well-behaved nodes some virtual...
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The interactions of independent service domains...
Messaging systems where a user maintains a set of contacts and broadcasts messages to them is very common. We address the problem of a contact obtaining a message that it missed, from other contacts of the user while maintaining anonymity of all parties involved. We identify a set of requirements in addressing this problem and propose a modification to the hierarchical identity based encryption scheme...
Battlefield monitoring involves collecting streaming data from different sources, transmitting the data over a heterogeneous network, and processing queries in real-time in order to respond to events in a timely manner. Nodes in these networks differ with respect to their processing, storage and communication capabilities. Links in the network differ with respect to their communication bandwidth....
Caching is a common technique to improve efficiency of data access in MANETs (Mobile Ad hoc Networks), where users communicate using small portable devices connected by resource constraint wireless networks. In some MANET applications, controlling/reducing the cache locations are desirable due to security issues, restricted shared memory and maintenance cost. However, reducing the number of caches...
Wireless networks possess significant limitations in bandwidth. Additionally, real-time networks cannot tolerate high latency. While some good XML compression algorithms exist, there remains a need for methods that reduce latency and bandwidth usage further in real time wireless applications. This paper presents a new compression scheme which reduces bandwidth while minimizing latency of XML data...
This paper proposes a middleware architecture to enable seamless content sharing in highly dynamic networks, such as those involving a number of aerial unmanned autonomous vehicles (UAVs), which are characterized by constantly changing connectivity and network topology. The proposed middleware maintains up-to-date network status as well as metadata information about data objects in the network nodes,...
Most of the routing and replication algorithms for Mobile Peer to Peer (M-P2P) networks assume the network to be large and therefore, the architecture and algorithms are designed to be scalable. These algorithms however may not perform well with limited number of nodes in a network such as of UAVs. Thus, it is better to design algorithms to increase the efficiency of a small network if scalability...
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may...
In this paper we provide an architecture for Tactical Information Middleware for bandwidth constrained information management. We propose the ideas of rank-based data dissemination, and the use of a tactical information management query language. These ideas will deal with dynamic changes in bandwidth and explore opportunistic data dissemination. Thus, will lead to a cross layer design of a system...
Most of the routing and replication algorithms assume the network to be large and therefore, the architecture and algorithms are designed to be scalable. These algorithms however may not perform well with limited number of nodes in a network of UAVs. It is better to design and simulate such algorithms to increase the efficiency in a small network as scalability is no longer an issue. For such networks,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.