The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper develops a hierarchical packet pre-dropping (HPPD) approach that exploits different methods to process I (intra-coded)/P (predictive-coded) /B (bidirectionally predictive-coded) video frame packets to improve the video transmission quality over IEEE 802.11e Wireless Local Area Networks (WLANs). HPPD refers to the dropping of arriving packets if the preceding video frame packets in the same...
In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication...
The number of vehicles in cities has increased dramatically due to rapid economic development. However, the infrastructure for accommodating these vehicles has grown relatively slow. Alleviating the pressure on the urban transport system and solving the ‘parking difficulty’ problem have thus become hot topics recently. In this paper, an intelligent parking system based on geomagnetic field variations...
Software Defined Networks (SDN) emerged as a new network paradigm to address the customization and flexibility problems in traditional computer networks. In SDNs, a logical centralized programmable controller manages the whole networks by installing rules onto switches. It is widely regarded that one controller is restricted on both performance and scalability. To address these limitations, pioneering...
IEEE 802.11 wireless local area network (WLAN) has been increasingly developed over several decades. It requires four times throughput improvement in the next generation WLAN. Thus, researchers focus on the co-frequency co-time full duplex technology, which makes the devices transmit and receive packets simultaneously and theoretically doubles the throughput. Some existing works proposed several media...
In order to meet the proliferating demands in wireless local area networks (WLANs), the multi-channel media access control (MMAC) technology has attracted a considerable attention to exploit the increasingly scarce spectrum resources more efficiently. This paper proposes a novel multi-channel MAC to resolve the congestion on the control channel, named as Mi-MMAC, by multiplexing the control-radio...
The Ipv6 neighbor discovery protocol is unable to meet the networking and address configuration requirements of the nodes in the wireless sensor network (WSN). To address this problem, the 6lowpan network architecture is presented in this paper, and based on the architecture, a method for configuring addresses of the 6lowpan nodes and a basic process for interaction during neighbor discovery are proposed...
Recently, several Quantum Key Distribution (QKD) networks, such as Tokyo QKD, SECOQC, have been built to evaluate the quantum based OTP(One Time Pad) secure communication. As an ideal unconditional secure technique, OTP requires the key rate the same as the information rate. However, comparing with high speed information traffic (Gbps), the key generation rate of QKD is very poor(Kbps). Therefore,...
The rapid increase of using cloud computing encourages service vendors to supply services with different features and provide them in a service pool. Service composition (SC) problem in cloud computing environment becomes a key issue because of the increase of service quantity and user requirements of the quality of service experience. To satisfy the demands on quality of service experience and realize...
This paper presents a joint radio resource allocation scheme in LTE/LTE-A systems. In order to maximize system throughput while satisfying the minimum user rate requirement, the resource allocation is modeled as a convex optimization with constraints in this paper, which is proved to be NP-hard. Hence, a heuristic approach based on joint Particle Swarm Optimization (PSO) and Genetic Algorithm (GA)...
Clustering algorithms have been used in many real world applications including recommendation systems. This paper proposes PCNP-AHC, which is a hybrid approach of Primitive Cognitive Network Process (PCNP) and Agglomerative Hierarchical Clustering (AHC) to cluster music pieces on the basis of user's preferences and similarities between music pieces. PCNP is an ideal alternative of Analytic Hierarchy...
An Opportunistic Network is an extreme network where the communication mainly depends on the mobility of the participating nodes to address the intermittent connectivity. This opportunistic routing utilizes a store-carry-forward paradigm exploiting node mobility and local forwarding to transfer the messages. The mobile nodes are normally low-power portable wireless communication devices employing...
In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is...
Most of researches about the design of the topology and the operation of a wireless sensor network are focusing on how to take advantage of all sensor nodes to collect information that covering the whole sense area. A criticism been ignored that the goal of lengthening lifespan is conflict with the complete coverage strategy due to the overlapping of sensor area among nodes result in unnecessary waste...
In the deployment of heterogeneous Long Term Evolution (LTE), due to the unmanaged power range of femtocells, inter-cell interference problems cause severe degradation in network performance, particularly in Closed Subscriber Group (CSG) mode. In the paper, we proposed an effective approach termed Adaptive Smart Power Control Algorithm (ASPCA), which can be applied to cluster users in coverage hole...
Following the constant improvements in technology and rapid developments in the computers, communications, and consumer electronics (3C) industry, mobile devices have become assistive tools for everyday life. They are lightweight, thin, and convenient for carry and their functionality is akin to a portable computer. However, these devices are normally equipped with small displays. At times when a...
Current TCP/IP based network is suffering from the usage of IP especially in the era of Internet of things (IoT). Recently Content Centric Network (CCN) is proposed as an alternative of the future network architecture. In CCN, data itself, which is authenticated and secured, is a name and can be directly requested at the network level instead of using IP and Domain Name System (DNS). Another difference...
In order to run a successful website, it is significantly crucial for website owners to understand users' intentions and desires. By capturing these information, they can provide better service and enhance marketing strategy to achieve this goal. Web usage mining (WUM) is an application that can help people to explore the useful patterns of users' browsing usages. Traditionally, it discovers knowledge...
To meet the demand of effective control of production in packaging and printing industry, this paper proposes a manufacturing-assist system based on Internet of Things (IOT) techniques. The system is composed of reliable network connection with wireless mesh networks and widely deployed sensor nodes. With smart sensing, transmission and processing for the states of manufacturing facilities, products...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.