The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we suggest a neural network signal detector using radial basis function network for detecting a known signal in presence of Gaussian and non-Gaussian noise. We employ this RBF neural detector to detect the presence or absence of a known signal corrupted by different Gaussian and non-Gaussian noise components. In case of non-Gaussian noise, computer simulation results show that RBF network...
Context information is one of the most important data coming from, mobile devices to add a value for the application execution. This paper introduces a context dissemination middleware based on a mobile Web services framework. In a P2P environment, each context source/provider offers services to other devices. A monitor service is proposed which reduces the communication amount between devices and...
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary to provide a proper error control scheme to reduce the bit error rate (BER). Due to the stringent energy constraint in sensor networks, it is vital to use energy efficient error control scheme. In this paper, we focus our...
This paper describes a localized performance-guided reconfiguration (PGR) algorithm for reconfiguring a distributed sensor network in a target localization scenario using binary sensor data. PGR works by activating redundant sensors available to replace failed sensors based on the improvement in target localization performance offered. Localized application of PGR helps to achieve globally optimal...
Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the short messaging service (SMS). However, in spite of its advantages, m-banking is facing some challenges...
The mobile-Internet specific methodology to capture the user behavior characteristics is still on the hot research agenda. Based on an ad hoc assumption that the user loyalty relates to Web visit regularity, the author explores regularity measures to track user behaviors. The author performed a 3-month transition pattern using regular users that visits a Web every month for three months. The author...
Managing personal meetings and events is a complicated task. It becomes more problematic when a person has numerous meetings or events in their schedule. One of the challenges of managing meetings is to find a proper meeting time when a conflict occurs. This paper presents negotiation strategies for an agent-based meeting scheduling system to automatically solve meeting conflicts. These relieve the...
As interactions between agents become more common, it will become very important to be able to characterize and perhaps even guarantee an agent's level of autonomy. We will both want agents to perform tasks on their own while at the same time both remaining controllable by ourselves and secure from control and manipulation by others. Most intuitions of autonomy seem to involve the notion that it is...
A novel hierarchical multi-agent framework for the design of home automation is proposed in this paper. The proposed framework consists of several space agents and a governor agent. The governor agent, situated in the home gateway with network interfaces, can communicate with space agents through UPnP-SCP Bridge. Each space agent was linked through power line communication used SCP control protocol...
Message aggregation can be used to reduce the communication overhead in a network where many messages have the "same" content. However, it may make the network less secure because, once the aggregator is compromised, the data correctness cannot be ensured. In this paper, we present a new scheme THIS that allows a base station to accept the aggregated data only if a majority of sensor nodes...
Wireless sensor networks are characterized by their low data rates, autonomous functioning and longevity. Low power consumption in such energy-constrained networks is a central issue and we target this design parameter by proposing and implementing a novel cell-based distributed addressing technique (C-DAT) over a k-power level sensor network. This paper introduces a clustered backbone approach for...
In this paper, we propose an ID-based secure routing framework (IdSRF) for the secure routing in wireless ad-hoc networks. It uses an ID-based signature scheme without certificates, which has two advantages compared with previous solutions. First, it has a low overhead in communication, computation and storage. Second, it can protect changeable fields in the packet headers. Any misbehavior at an intermediate...
We use a genetic algorithm (GA) to create energy efficient clusters for routing in wireless sensor networks. The simulation results show that the proposed intelligent hierarchical clustering technique is more energy efficient than a few existing cluster-based routing protocols. Further, the gradual energy depletion in sensor nodes is also investigated
This paper describes the design and implementation of an IPv6 multicast forwarder as the preliminary step for developing a high-speed IPv6 multicast-enabled router for use in an environment where multicast packets occupy some portion of the total network traffic using the programmable IXP2400 network processor. We validate our implementation and evaluate its performance with hardware experiments....
Fuzzy logic was adopted in formulating computed programmable logic based upon logical and mathematical algorithms. The adopted standards were employed in evaluating performance and specifying the competitive priorities which affects the decision making process. The results of the defuzzification process from the logical standardization results has shown the existence of connection between the performance...
As the demands for the secure communication grow, cryptographic processing may become a must done situation, in secured message transmission. Random numbers are widely used, especially in cryptography. Any pseudo-random bit stream along with Ex-OR provides a cryptosystem and any good cipher text should look like a pseudo-random bit stream. The proposal of implementing randomization in crypto graphical...
For a given digraph G = (V, E) and a positive integer k, the super line digraph of index k of G is the digraph Sk{G) which has for vertices all the k-subsets of E(G), and two vertices S and T are adjacent whenever there exist edges in the form (u, v) isin S and (u, w) isin T for some u, v, w isin V. The super line digraph is a generalization of the super line graph. Indeed, if the digraph G is symmetric,...
Two processors jointly provide a real-time service which can be completed by exactly one processor. Assuming each processor is allowed to announce only a one-bit information in a distributed way to decide which one should process the job, inevitably some of the jobs will get lost if only classical resources are used. An example of this distributed system problems in real life can be found in baseball...
Success in the embedded world revolves around two key concepts: cost effectiveness and performance. The ability for an operating system to boot quickly combined with speedy application usage at runtime is important with regards to consumer unit adoption. The most common memory sub-system setup in cellular phone architectures today is what is called an eXecute-In-Place architecture. This type of memory...
In 1994, Horster et al. first proposed an authenticated encryption scheme that can have the signature only be verified by the specified recipient while keeping the message secret from the public. Since then, several researchers proposed authenticated encryption schemes in which the recipient can convert the signature into an ordinary one for public verifiability. However, all of these schemes do not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.