The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Survivability is the primary problem in wireless visual sensor networks (WVSNs) when they are utilized for sewage monitoring with limited resources. In this paper, we propose a low-cost data prioritization framework for sewage microorganism microscopic images to overcome this frangibility of WVSNs. Firstly, an improved fast visual background extraction (Vibe) algorithm is proposed to rapidly detect...
DTN (Delay Tolerant Network) is a new type of mobile Ad Hoc network. Due to its characteristics such as long communication delay, high dynamic topology, it is difficult to maintain the stability of end to end paths. Therefore, design of effective and reliable routing algorithms has become the key issue in DTN. To avoid random and blindfold forwarding in Spray and Wait routing, a DTN routing algorithm...
Mobile Ad Hoc networks, which are becoming the research hotspot, have wide application in battlefield, disaster area, extraordinary session and other special environments due to their independence on any network infrastructure. In this paper, a scheme of node behavior classification was proposed based on the analysis of mobile Ad Hoc networks' own laws in practical application. Analytic hierarchy...
This paper analyzes a routing protocol for Mobile Ad hoc Network (MANET), which is called Hierarchical Optimized Link State Routing (HOLSR) protocol. According to the structure of the routing system under the Linux OS, we focus on the design of system architecture and the implementation of functional modules. This gives a reliable scenario to test the real performance of HOLSR protocol and hence help...
Mobile Ad Hoc networks, which are becoming the research hotspot, have wide application in battlefield, disaster area, extraordinary session and other special environments due to their independence on any network infrastructure. In this paper, a scheme of node behavior classification was proposed based on the analysis of mobile Ad Hoc networks' own laws in practical application. Analytic hierarchy...
The study of the multicast routing protocol of multi-constrained is important for the development of the high performance network. The aims are the multi-constrained network model and the definition of the formula of every constrained characteristic measurement. However, it is a NP-complete problem. In order to gain the approximative solution, many heuristic algorithms have been designed by filling...
The paper design a new three-rings Redundancy Industrial Ethernet system for the settlement of Industrial Intelligent based on rapid spanning tree protocol, according to the requirements of as reliability and real-time performance in the control data transmission of the three layers Frame Industrial Ethernet, analyse the method of solving the loop, apply the rapid spanning tree protocol and the multi-spanning...
To indicate exactly the reliability of large-scale high-speed broadband communication network with domain partition and interconnection, a novel reliability index weighed by normalized capacity is defined, which organically combines connection performance with capacity. The correctness and rationality of the index are demonstrated on the aspects of objective factor of network and subjective factor...
This paper focuses on an implementation named OLSRS (OLSR scheduling implementation). OLSRS provides a concrete scheme and several key techniques on the implementation of OLSR protocol. This paper first considers the general framework of OLSRS according to the routing architecture of Linux OS. Besides overall framework, this paper discusses the difficulties encountered in OLSRS and provides proper...
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and Internet services. Geographic forwarding becomes a lightweight routing protocol in favor of the scenarios. Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities...
This paper introduces an online load balanced energy-aware routing protocol for large-scale wireless sensor networks. The protocol designed, namely traffic-aware energy efficient (TAEE) routing protocol, exploits traffic load information in addition to power residue levels to optimize the load distribution of the entire sensor network, and thus accomplish longer network lifetime. An algorithm for...
In the research area of mobile ad hoc network, ZRP which integrates advantages of proactive routing protocols and on-demand routing protocols has been the crucial research now. In this paper, the principle and the cache mechanism of ZRP are analyzed. In allusion to the problems of late-deletion and early-deletion in ZRP, the optimized A-ZRP which associates the routing information priority with the...
Privacy and anonymity are critical security issues to many large-scale MANET applications such as military communication networks. These applications are more likely deploying the networks heterogeneously and hierarchically due to administrative needs or routing efficiency. When the size of the network scales up, the routing overhead incurred by existing flat anonymous routing protocols increases...
Mobile ad hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new assets of information such as nodes' locations, motion patterns, network topology and traffic patterns in addition to conventional identity and message privacy. In particular, in wireless ad hoc networks mobile nodes must rely on ad hoc routing to keep network functional for...
As location-based routing becomes useful in some particular scenarios, locations of mobile hosts become as important as their identifiers in ad hoc routing in mobile wireless networks. Location lookup services are henceforth needed to aid location-based routing. In this paper, we present a source routing based location lookup service that can be used as the location discovery component in a location-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.