The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new broadcast protocol have been developed in this paper. Itpsilas based on a new method in which rebroadcasting a packet is decided by an intelligent classification scheme. Each MN builds a classifier and uses it on data collected from the network environment. For an input vector describing a broadcast packet and current network conditions, the classifier returns a result of "rebroadcast"...
To propose an adaptive error checking solution on the basis of estimation of the change trend of packet-loss rate, the solution improved auto repeat request method based on RDP to realize real-time transportation in a low packet-loss rate. And in order to solve the problem of error checking in a low transmitting rate, it made use of improved forward error correction to decollate images at the basis...
This paper introduces the continuous chaotic frequency modulation signals (CCFMS), which have good autocorrelations and flat frequency spectra. We show that the CCFMS have excellent delay and velocity detection performance. Moreover, the CCFMS require far lower realization costs and can provide flexible parameters adjustment. Simulation results show that the delay resolution of the CCFMS can be improved...
There are the selfish and malicious nodes that two types of threats exist in ad hoc network. This paper gives the detailed analysis of the two types of threats, introduces some existing solutions and point out their inadequacy at the same time. On this basis, a solution based on trust evaluation was proposed.
Due to their dynamic topologies, providing quality of service (QoS) in wireless ad hoc networks introduces major new challenges to the research community. Now, the commercially available ad-hoc network products are those based on the IEEE802.11 Distributed Coordination Function (DCF). Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby...
Through extensive simulations, we found that the mobility in mobile ad hoc networks (MANET) can induce persistent packet reordering. In this paper, we present a set of simple modifications to the TCP protocol to improve its performance to mobile-induced packet reordering in MANET. The new protocol based on the simple idea of delaying the triggering of congestion response algorithms for a short time...
Generally, every Website provides its own resource upload and download modules for users to share resources. However, the resources uploaded to Websites' servers are often lack of unified and professional management. Whatpsilas more, when the amount of user using the upload and download modules increases, it will put a big pressure on the Websitepsilas server in term of bandwidth. To solve these problems,...
The explosive demands of multimedia services have been grown up to support delay-sensitive applications, e.g., VoIP and streaming using codec. When a mobile node (MN) moves across different types of networks, the codec should be effectively adapted according to the significant change of network condition, i.e., throughput and delay. Therefore, in this paper, we propose a codec adaptation for vertical...
Internet Service Provider (ISP) needs to evaluate change of network congestion level, accordingly takes measures of congestion control to mitigate network congestion and guarantees to provide definite quality of service (QoS) for users. After autonomous system (AS) performance matrix model was introduced, a new path performance metric RL was defined firstly, and then four kinds of scalar quantity...
Efficiency is a crucial metric to evaluate the performance of routing protocols in MANETs. A ratio of average number of control and data packets transmitted to data packets delivered, proposed by S. Corson and J. Macker, is utilized to evaluate the efficiency of routing protocols in this paper. The efficiency evaluation and comparison of AODV, DSDV are carried out based on the simulations in different...
Study of frequency coded synthetic aperture radar was concerned in this paper. A new frequency-domain extracted IFFT approach (FDE-IFFT) to obtain high range resolution profile was proposed, and the mathematical principle of this new method was detailed analyzed. Simulation results and series of radar images using time domain back-projection method were given in the end. All results proved that the...
We propose a three-level SuperPeer network (TSN) for file sharing built on a SuperPeer network. The TSN adopts a SuperPeer P2P network capable of providing file management and the structured P2P network capable of searching file as its basic structure. It is required to dynamically reconstruct its network topology according to changes in peer state and file hot. We propose an autonomic, distributed,...
The composed service for the complicated business appeared with the boom of electronic commerce. Previous routing algorithms designed for the linear and parallel service composition are not feasible since there are multiple interactive messages between service components. The feasible composed-service scheme selection algorithms are present, which regards delay as a prior consideration while finding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.