The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Previous studies have shown that external corrective feedback provided to individuals undergoing physical therapy sessions increases the efficacy of their intervention protocols, thus allowing for the individual to rapidly improve on their performance. However, direct feedback is typically provided by an expert therapist during weekly or monthly visits, which limits improvement on a daily basis. As...
In this paper, we propose a two-level quality-of-service (QoS) scheduler based on the Ripple medium access control (MAC) protocol to deal with the unfairness problem for a chain-based wireless backhaul network (WBN). A queueing model was first presented to analyze the end-to-end throughput, aggregated throughput, and mean delay of a WBN accommodating single-class traffic. The model was then extended...
This paper presents an analytical method to evaluate the hop-distance relationship for quasi-UDG (Unit Disk Graph) model in wireless sensor network, where sensor nodes are randomly and independently deployed in a circular region by a Poisson process. Different from the UDG model, quasi-UDG model has the non-uniformity property for connectivity. We derive an approximate recursive expression of the...
A novel MAC protocol is named beforehand bandwidth reservation (BBR) based on reserve the empty slots in the next big-slot cycle is proposed for OBS ring networks by control channel. To evaluate optimal utilization of channel bandwidth under unbalance traffic scenario, this paper studies packet scheduling based on statistic TDM scheme to allocate the idle slots. For achieving best performance, the...
Due to Internet??s explosive and rapid popularity, e-commerce is recognized as a new growth point with the most potential in the future IT industry. E-commerce??s core issue is the payment. How to make e-commerce operate in a safe and efficient environment is the key of the study. In the paper, a payment model based on the improved SET protocol, and all its software-modules are designed, and its practicality...
Recently, the number of multimedia applications in the Internet has grown enormously, and massive IP packets of variable-length are being made. There is a vast bandwidth requirement at the backbone network, such as wavelength division multiplexing (WDM) metro ring networks, to satisfy the demand; however, most of the current WDM metro ring networks are ineffective or complex. We propose a simple and...
To indicate exactly the reliability of large-scale high-speed broadband communication network with domain partition and interconnection, a novel reliability index weighed by normalized capacity is defined, which organically combines connection performance with capacity. The correctness and rationality of the index are demonstrated on the aspects of objective factor of network and subjective factor...
The lack of synchronous communication channel is a major obstacle for the application Ethernet to the motion control systems. Based on the IEEE-1588 precision clock synchronization protocol, in this paper, a new distributed interpolator have been studied. The PVT-based distributed interpolation scheme that only relies on a clock synchronization of Ethernet can achieve accurate synchronization between...
The integrity of mobile agent means that its state and partial results can not be modified by a malicious host or such modifications could be found. The paper proposes an integrity protocol. It provides strong identity authentication and strong integrity protection. It can detect most attacks.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.