The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Optical networks have been widely adopted as the transport network in research industry for years. To better utilize the high speed benefit of optical transport networks, control framework has become the focus of research in recent years. This paper presented a control framework integrated with a set of algorithms, schemes and protocols. First, a two-level hierarchical routing strategy was introduced...
RFID technology has been widely used in logistic and authentication applications, but it still has many potential issues such as the risks of privacy and security. This paper presents a novel RFID security protocol based on the XTEA encryption. Analysis of the security and privacy of this novel protocol is performed using SystemC based modeling. Different attack models are implemented, and the results...
Connectors in distributed architecture play an important role. Software engineers meet more and more challenges of designing connectors. Particularly, in a distributed MVC architecture, there are many issues in the design of connectors such as: how to apply the architecture pattern to design of connector in distributed MVC system; how to make the connectors of MVC become loosely coupled. With the...
Key exchange is one of the major concerns in cryptology. Mutual learning between two neural networks has been used to address this issue. However, there is still a need to extend the concept so that a group of parties can share a common key. This work suggests an algorithm that employs and extends the mutual learning process to accommodate the much needed group secure communication. Here, a recursive...
The Domain Name System (DNS) is a critical service in the Internet infrastructure which provides user-friendly name to Internet IP address mapping. The absence of the DNS has a severe impact on several Internet services such as email. To avoid an intentional blocking from a malicious higher name server, a dynamic round-robin peer-to-peer (P2P) solution that is built over the Chord protocol is proposed...
Multi-core processor architectures, also known as chip-multiprocessors (CMPs), have become a predominant technology for applications demanding both the high bandwidth and the low power. A typical CMP architecture integrates multiple processor cores, one or more memory controllers, a multi-level cache hierarchy, and an interconnection network on a single chip. Sharing of large size cache among multi-cores...
The recent improvement of wireless communication networks has made possible the use of such networks at the lowest levels of factory automation systems, which typically imposes severe requirements in terms of both real-time performance and dependability. However, Industrial plants represent a hostile environment, for communication systems, due to the presence of different kind of noises. The presence...
In this paper we investigate the combination of Adaptive Modulation and Coding (AMC) and Hybrid Automatic Repeat reQuest (HARQ) techniques in an orthogonal cooperative scheme using infra-structured (fixed) relays. We consider realistic large scale and small scale path loss models, taking into account the antennas heights and the presence or not of line of sight (LOS). Results demonstrate that large...
In recent years network coding has emerged as an innovative approach to disseminate information in wireless networks. It is generally believed that by using network coding considerable amount of energy could be saved. However, in case of wireless sensor networks, significant challenges such as unreliable data transmission, limited transmission power of sensor nodes, external interference limit the...
This paper presents a new approach to clustering wireless sensor networks and determining cluster heads. Here we apply evolutionary algorithms in centralized clustering. LEACH-C is one of the effective (basic) parameters in network life time based on energy consuming value protocol. In suggested evolutionary algorithm, through proper application of evolutionary operators, we search for efficient clustering...
A series of unfortunate worldwide mine disasters took place recently and shock the world, the disasters ranged from collapsed mines causing death to trapping miners underground which caused many life losses and injuries. The importance of robust and reliable underground communication networks has become evident once again. A reliable underground communication network in mines will not only facilitate...
In recent years many strides have been achieved in the areas of smart homes and Wireless Sensor Networks (WSNs). In this paper, both are utilized to achieve energy management regarding comfort control in residential spaces. New algorithms are designed to achieve comfort control in terms of temperature and relative humidity in these spaces. These algorithms are to be implemented on errorless Zigbee...
The recent emergence of the sensor networks technology is significantly impacting the capabilities for automated distributed monitoring of environments. The low manufacturing cost of sensors, increased coverage and accuracy in distributed sensing due to their large deployments and their ability to operate in inhospitable terrains has made them an amenable technology for various surveillance and monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.