The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traffic engineering (TE) problem is a central component of the next generation cloud-based wireless networks. In this paper, we study a new resource allocation scheme for effective traffic engineering under practical constraints such as the finite buffer size at each node. To reduce the computational effort required in the existing single-slot TE approaches and to deal with practical hardware limitations...
In This paper we proposed an improved routing metrics for wireless sensor networks (WSNs) based on Hybrid Energy Storage System (HESS) which merges Super capacitor (SC) and a Rechargeable Battery (RB). The proposed routing scheme assigns different metrics considering not only residual energy, harvesting rates and expected path length of next hop, but also the potential of the future hops. Simulations...
Big-Data applications need to shuffle their data over a network in a very large amount. The ability to efficiently allocate network resources to quickly finish the shuffle greatly affects the overall processing speed of Big-Data applications. The recent emergence of software-defined networking (SDN) technology makes it easier for the network to integrate with a Big-Data application. The network can...
This paper characterizes the full capacity region of the COPE principle for 2-flow wireless butterfly networks with broadcast packet erasure channels (PECs). The capacity results in this paper allow for random overhearing with arbitrary overhearing probabilities, arbitrary scheduling policies, network-wide channel state information (CSI) feedback after each transmission, and potential use of nonlinear...
In wireless sensor networks (WSNs) deployed in an outdoor environment, obstacles may occur as a result of a non-uniform distribution of the sensor nodes or the presence of barriers. These obstacles result in a degradation of the network performance, so obstacle identification is a major concern in most WSN applications. This paper develops a Decentralized Boundary Detection (DBD) algorithm for identifying...
This paper presents a time delay and integration (TDI) structure for CMOS image sensor (CIS) with adjacent pixel signal transfer (APST). The CCD-like TDI function is achieved in CIS by proposed APST without additional in-pixel device and minimum routing effort. The in-pixel integrated signal is transferred to adjacent pixel and summed up by an off-pixel column-shared unity-gain buffer. A 128×6 pixel...
The decentralized distributed system characteristics of ad hoc networks bring up some security problems. To ensure the safe, efficient and flexible data transmission in ad hoc networks, this paper presents a trust routing framework based on topology control theory. This framework establishes a trust topology layer independent of routing layer, and the routing procedure executes over the trust topology...
3GPP has standardized Multimedia Broadcast Multicast Service (MBMS) to deliver multimedia services with high bandwidth efficiency through IP multicasting technology. In this paper, we present the implementation details of an MBMS test-bed with the standardized Policy and Charging Control (PCC) to realize the dynamic charging plan for multicast services. Specifically, we illustrate the detailed message...
With routing paths being modified after each sink movement, delivering data to a mobile sink in a wireless sensor network (WSN) can be a challenging issue. Updating the sink location with messages to maintain a route frequently could result in great energy consumption in the sensors. Moreover, the number of message collisions is proportional to the control overhead of the sink location update. This...
In this paper, IDS (Intrusion Detection System) nodes are deployed in MANETs in order to mitigate black hole attacks. The IDS nodes must be set in sniff mode in order to perform the so-called ABM (Anti-Blackhole Mechanism) function, which is mainly used to estimate a suspicious value of a node according to the abnormal difference between the routing messages transmitted from the node. When a suspicious...
This paper presented an improved routing algorithm K-CSSP of structured P2P overlay networks based on clustering the nodespsila communication history of the CSSP. This routing algorithm computing the nodespsila stability via storing the nodespsila communication history distributed. The K-CSSP uses the K-means algorithm to cluster the CSSP nodes by the stabilities into K regions which inter-linked...
The routing protocol of structured peer-to-peer overlay networks influences the p2p network performances in route table maintenance, routing hops, and network churning. Current protocols we used usually maintain a O(logN) route table and O(logN) routing hops. To get better routing speed with less scale routing table, using O(1) node finger to get O(N) route path, a new protocol named CSSP was presented...
Performance of structured peer-to-peer overlay networks depends on the routing protocols. To get better routing speed with less scale routing table, using O (1) node finger to get O (N) route path, a new routing protocol named BCPP was presented. Structured by a bidirectional circle topology, this p2p network has a short routing table to record one super node, one successor node, one previous node...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.