The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clustering algorithms in wireless sensor network are used to save energy consumption. Existing clustering algorithms did not consider the energy optimization inside the clusters and they created new clusters once the cluster head of a cluster becomes dead. The removal and creation of new clusters create communication overhead. Here we propose a clustering algorithm for specific area of deployment...
Wireless ad hoc networks consist of nodes which can communicate with each other in a peer-to-peer fashion over single hop or multi hops without any fixed infrastructure such as access point or base station. In flat topology there is no topology management concept and all the nodes participate in routing. In this paper the task of topology management for ad hoc networks is implemented using routing...
Modern networks provide QoS model to go beyond best-effort services, but current QoS models are oriented towards low level network parameters (e.g. bandwidth, latency, jitter) application developers on the other hand are interested in quality models that are meaningful to the end-user and therefore struggle to bridge the gap between networks and application QoS models. Network-aware applications are...
Ethernet has grown since its inception by Metcalfe in 1976. Its growth as a wide-area networking technology has led to a need for operations, administration and maintenance (OAM) requirements. The expansion of this technology into the domain of service providers, where networks are substantially larger and more complex and the user-base is wider, makes the idea of robust and reliable connectivity,...
It is de facto that merging two different streams of vehicles into one single stream poses some degree of inconvenience. As human lives are at stake, a lot of care has to be taken in this area of traffic management. In this paper a proactive merging strategy is proposed, keeping the intersection of ramp and a highway as the main focus. In our algorithm, it is assumed that the vehicles are sensor-enabled,...
Wireless sensor networks are used in many applications like battlefield, patient monitoring, emergence response information and environmental monitoring. To achieve security in WSN, it is important to be able to encrypt the messages sent between sensor nodes. It is required to agree upon a common key before encrypting the messages. The key management task is challenging due to resource constrained...
The IEEE 802.16 standard, also known as WiMAX, has emerged as an exciting technology for broadband wireless communications with potentials to offer high throughput and support high bandwidth demanding applications. WiMAX, however, has yet to prove its effectiveness when the end terminals are not fixed and have the capacity to move from one place to another at different speeds. Recent studies suggest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.