The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Robust and accurate traffic prediction is critical in modern intelligent transportation systems (ITS). One widely used method for short-term traffic prediction is k-nearest neighbours (kNN). However, choosing the right parameter values for kNN is problematic. Although many studies have investigated this problem, they did not consider all parameters of kNN at the same time. This paper aims to improve...
In dense wireless deployments, such as Enterprise WLANs (EWLANs) and home WLANs, interference may occur because of neighbouring WLANs sharing the same unlicensed spectrum. Mechanisms to centrally manage WLAN deployments cannot effectively mitigate the interference caused by hidden terminals (HTs) in WLANs that belong to different organisations. Furthermore, the impact of interference is amplified...
In this paper, we implemented OpenFlow scheduled bundle in the Open vSwitch software switch and evaluated its performance in SDN testbed networks under different scenarios. The scheduled bundle is a very new mechanism proposed in the OpenFlow protocol for achieving consistent updates among multiple SDN switches. However, this feature has not been supported in any hardware SDN switches or any software...
In this paper, we designed, implemented, and evaluated the performance of a Packet-in packet buffer system in an SDN bare metal commodity switch and Open vSwitch. In our approach, only the first packet of a new flow needs to be sent to the SDN controller via a Packet-in packet and all subsequent packets can be temporarily stored in the Packet-in packet buffer system until the arrival of the flow rule...
In recent years, many organizations, companies and government agencies have been suffering from brutality of targeted attacks. Especially, destructive targeted attacks such as Shamoon and Samas have been causing significant damages on the targets' cyber assets, disputing their critical business operations. Since such attacks tend to access many hosts simultaneously, a rapid incident response is essential...
The exponential amount of geospatial data that has been accumulated in an accelerated pace has inevitably motivated the scientific community to examine novel parallel technologies for tuning the performance of spatial queries. Managing spatial data for an optimized query performance is particularly a challenging task. This is due to the growing complexity of geometric computations involved in querying...
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation...
One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic...
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
Nanotechnology becomes reality paving the way for many new applications. In nanonetwork system, each nanosized device is equipped with limited capabilities and is dedicated to a basic task but the combination of the numerous devices actions results in high-level functions. In this context, large number of devices concentrated in a limited area must exchange data using wireless links. Spread in Time...
Chaos-based coded modulation (CCM) systems have been shown to be competitive against important wireless channels impairments, like fading. Nonetheless, these systems have not been tested yet in a real-world scenario, and their performance has only been explored using theoretical and numerical bounds, and validated by simulation. In this proposal, we take advantage of the availability of Software-Defined...
A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation...
Geographical load balancing (GLB) is widely established by cloud providers, to exploit the differences in electricity price, local green energy generation, transmission delay and cost etc across geographically dispersed data centers (DCs). With GLB, a cloud provider can achieve reduction of electricity cost or/and bandwidth cost or/and delay cost. However, these objectives are not independent from...
In this paper, we present MiniWorld, a novel distributed network emulator. It is based on full virtualization using QEMU/KVM, offers three network backends for emulating both wired and wireless communication, and provides several mobility patterns as well as distance-based link quality models. A snapshot boot mode is offered for accelerated booting of identical environments and repeating emulation...
User fairness and spectrum efficiency are conflicting objectives in cellular system optimization given that users share limited spectrum resources. Users at the cell edge are more likely to be unfairly treated due to their disadvantageous locations, where they experience high path losses and strong interferences if co-channel transmission exists. In this paper, a cell edge boundary is obtained and...
Video streaming now amounts to the majority of traffic in the Internet. Media streaming relies on large-scale content distribution networks (CDNs), that incur significant costs to build or use. P2P distribution of video content reduce reliance on CDNs and costs. Unfortunately, P2P distribution is fraught with QoE problems, specially during flash crowds or in scenarios where users have limited bandwidth...
Location-awareness plays an important role in Wireless Sensor Networks (WSNs) by aiding in tasks such as packet routing, event mapping, and energy savings. The use of Global Positioning System (GPS) on sensor nodes is not always viable due to a number of issues, e.g., power constraints. Location estimation solves the problem of computing sensor node positions by using information from devices that...
Mobile devices are now capable of handling many daily computing tasks that used to be accomplished by desktops or servers. However, these improvements also introduce resource-hungry mobile applications that require richer resource-hungry computing features and more complex functions. Mobile Cloud Computing (MCC) addresses these limitations considering the nature of mobility; this innovative strategy...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-carriage WSNs are also studied in cases of dangerous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.