The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we study dynamic quality of service scheme in GSM/GPRS wireless network. A load balancing architecture constructed by distributed intelligent agent has been presented to support real time or burst data services. Fuzzy neural network was employed to predict GPRS traffic by learning examples. Meanwhile, we have presented a traffic estimation algorithm and a simple decision mechanism to...
With the growing importance of data, networked storage of high performance and strong security has become a hotspot of research. Aiming at the goals, we designed an iSCSI-based object storage security system (iOBS3) adopting OSD command sets. First, incurring to the block I/O channel of iSCSI and the security method within OSD, iOBS3 can provide highspeed bandwidth of block I/O and access control...
Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward a hierarchical trusted architecture for wireless sensor network, and establishes...
A new wireless sensor networks (WSNs) routing protocol which based on the classic flooding and gossiping is presented. When selecting the transmit route, the source sensor node uses the lightweight cryptography and lets several sensor nodes to encrypt and transmit data cooperatively, thus it can lighten the load of single sensor node, ensure the communication security, provide good load balancing...
In this paper, we address the problem of image transmission over unreliable networks, such as the Internet, where packet losses occur. The most recent literature indicates multiple description (MD) as a promising coding approach to handle this issue. The traditional spatial domain multiple description image coding techniques usually results in the very low coding efficiency. This paper proposes a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.