The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics were dealt with: information technology; telecommunication technology; traffic; QoS; mobile agent; human interface; content delivery; multicast communication; data mining; ubiquitous computing; home network; mobile communication; mobile IP; security; and network service
IP network technology growth has triggered the rapid growth of network services over IP networks. TCP is a trusted protocol because of its connection-oriented functions. It guarantees that the data arrives in order and retransmits lost packets. Many services have been used on IP networks, and a trusted protocol such as TCP will continue to be used. TCP is connection oriented. Therefore, if there are...
In order to improve TCP performance, a method using a PEP (performance enhancing proxy) is proposed. The PEP operates on a router along a TCP connection. When a data packet arrives at the PEP, it forwards the packet to the destination host, transmits the corresponding ACK (premature ACK) to the source host in behalf of the destination host and stores the copy of the packet into its own buffer (PEP...
A power line communication network (PLC) is an attractive infrastructure for home LANs. However, in PLC networks, since all the nodes use a single channel, the packet transmission delay easily increases when the number of nodes and/or the offered load increases. In order to reduce the round trip delay and achieve high throughput, we consider several prioritized ACK transfer methods suitable for the...
Interest in the TCP overlay network, which controls the data transmission quality at the transport layer, has grown as the user demand for sophisticated and diversified services in the Internet has increased. In the TCP overlay network, TCP proxy is a fundamental mechanism that transparently splits a TCP connection between sender and receiver hosts into multiple TCP connection at some nodes in the...
Packet sampling techniques have recently attracted much attention as a solution to the traffic measurement in high-speed networks, where large processing cost is incurred when monitoring the behaviors of a large number of sessions. We have proposed a method for estimating TCP packet loss rate from sampled packets and have evaluated the method through simulations and experiments. Results of those evaluations...
This paper proposes an adaptive control method of delayed transmission for massive and intensive telecommunication traffic expected in communication-broadcasting integrated services. It furthermore presents quantitative evaluation of the proposed method through computer simulations and experiments using a test bed. Communication-broadcasting integrated services, which have been started by the terrestrial...
We have designed a network resource control system for large-scale networks, based on a bandwidth broker model, called RA (resource agent). The RA provides parameter-based admission control and manages network resources with a database. We have clarified that the concentration of the database access is a performance bottleneck of the RA. We propose "virtual link multi-mapping model," for...
With the spread of broadband and wireless Internet access, there is a growing need for a nomadic network environment enabling the use of network services anywhere, via various access media. In a nomadic network environment, however, the connectivity is decreased because users move among different access networks, and the bandwidth is narrow and fluctuating, especially for radio propagation in wireless...
It is well-known that TCP Reno cannot provide satisfactory performance in high-speed long-delay networks. As a means addressing this problem, gentle highspeed TCP (gHSTCP) has been proposed in Z. Zhang et al. (2004). However, its effectiveness has only been demonstrated in simulation experiments. In the present paper, a refined gHSTCP algorithm is proposed for application to real networks. The performance...
In recent years, video streaming delivery services of several Mbps has become very popular on IP networks such as the Internet. At the present stage, however, commercial high-quality video streaming that will need tens of Mbps is provided only by specified service providers who can guarantee communication quality of the network. Therefore, in order to let many users enjoy the services freely and easily...
Workflow technology is considered today as one of the key technologies for providing efficiency and consistency of organizations. The concepts of workflow embody the ideas of controlling and coordinating activities and interaction among individuals and software components. Today's workflow systems assume that each work item is executed by a single worker. From the viewpoint of the system, a worker...
In a cluster of computers, if the system load in each of computers is nearly equal, it indicates good resource utilization. It is well-known that load balancing is a key factor in developing parallel and distributed applications. In our paper, a mobile agent based load balancing technique is presented. Instead of balancing the load in cluster by process migration, or by moving an entire process to...
The database field has developed very powerful technologies for finding efficient execution plans for declaratively specified queries. Moreover, database queries have increasingly complex in the age of the distributed DBMS (DDBMS). In order to optimize queries accurately, sufficient information must be available to determine which data access techniques are most effective. The role of query optimization...
A parallel program is composed of multiple processes, each of which is to perform one or more tasks defined by the program. The optimization objective for partitioning is to balance the workload among processes and to minimize the interprocess communication needs. Its primary goal is to ensure that no processor is idle while there are processes waiting for services in other processors. Mobile agent...
Mobile agent technique involves distributed control if communication among different types of network, especially when it can migrate from station to station. Mobile agent technology' has the ability to travel from host to host in a network and to places of their own choosing at times. If motivates force in reducing network traffic and overcoming network latency and their ability to operate asynchronously...
As one of mobile agent applications, many systems which provide continuous service for users moving on a network have been proposed. In these systems, because a movement of mobile agents is performed after a user movement, users must wait for arrival of mobile agents. To reduce users' waiting time, we propose a fundamental framework for mobile agent systems where an agent can move precedently before...
In this paper we present Myanmar character identification of handwriting between exhibits and specimen of Myanmar handwriting documents. This is also a method to identify the writer of Myanmar handwriting documents. Many methods have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed. There are many methods for writer identification...
Characters are printed in various languages in the world. Printed character recognition is one of the oldest fields of research since the advent of computers. However it is an open field for researchers due to the challenging nature of perception and recognition. Myanmar language is the main language and Myanmar printed characters are widely used by over 85% of 49.5 million populations in Myanmar...
We propose a system to recognize off-line Myanmar handwriting and printed characters, the language used by the majority of Myanmar. This system is based on the use of discrete hidden Markov models. Myanmar handwriting and printed characters or words were chosen for the study. After preprocessing step, the characters are auto-segmented using recursive algorithm as sequences of connected neighbors along...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.