The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital medical images are becoming even more widespread and used in a large variety of applications. Such images are often stored in local repositories and need to be transmitted/ received over the network. Therefore, data compression is an essential mechanism to adopt for improving the transmission time, as well as to optimize the required storage space. However, due to the clinical relevance of...
Internet of Things (IoT) aims to enable the interconnection of a large number of smart devices (things) using a combination of networks and computing technologies. But an influx of interconnected things makes a greater demand on the underlying communication networks and affects the quality of service (QoS). This paper investigates into the QoS of delay sensitive things and the corresponding traffic...
Semantic Web services (SWs) and P2P computing have emerged as new paradigms for solving complex problems by enabling large-scale aggregation and sharing of distributed computational resources. In this paper, we present a scalable approach based on epidemic discovery algorithm to discover new distributed and heterogeneous collaborative applications of large-scale distributed systems in a P2P network,...
This paper is concerned with the proposal of a numerical method to predict the movement of tsunami wave front by use of Dijkstra algorithm. Data for sea depth and land height are assigned to the nodes of rectangular meshes and the data values at the points except for these node points are approximated by linear interpolation. The velocity of tsunami wave front at any point is calculated in terms of...
In information systems, data in an object may illegally flow into another object if transactions read and write the objects. A transaction illegally reads an object if data in objects which the transaction is not allowed to read are stored in the object. In addition, it is specified data in which object is allowed to flow to other objects. A suspicious object is an object which is not allowed to flow...
Software-Defined Networking (SDN) promises a more flexible, automatable and programmable computer network. Software-Defined Networking separates the control from data plane. The control plane is placed in a centralized controller which network applications such as traffic engineering, QoS and firewalls reside. The centralize controller creates a scalability problem when large numbers of network events...
To transmit secure message, a controlled quantum secure direct communication protocol is proposed based on five-particle cluster state and EPR pair entanglement swapping. The sender and the controller own their EPR pair sequences respectively. The sender sends one photon of the EPR pair he owns to controller. The controller performs local unitary operation randomly on one photon of the EPR pair he...
We consider a problem of finding an optimal node placement that minimizes the amount of traffic by reducing the weighted hop distances in multihop networks. The problem is called Node Placement Problem (NPP) and is one of the most important issues in multihop networks. NPP is known to be NPhard. Therefore, several heuristic and metaheuristic algorithms have been proposed for optimizing NPP. Recently...
Thresholding is the method used for segmenting an image to isolate regions of interest from the image. The result of segmentation mainly depends on the selection of proper threshold values and number of classes. This paper proposes a method for optimal selection of threshold values using Evolutionary computing. The proposed method decomposes the given image to reduce its size so that it can be processed...
Nowadays the problem of energy consumption is becoming a pressing problem. We present an innovative system named Elettra able to allow people to monitor and control energy consumption in one or more buildings. For improving Elettra we introduce different methods taken from ambient intelligence. Through these methods we can infer energy consumption, construct a plan for decreasing energy consumption,...
This paper concerns the problem to place N non overlapping circles in a circular container with minimum radius. This is a well known and widely studied problem with applications in manufacturing and logistics and, in particular, to problems related to cutting and packing. In this paper we propose an algorithm that by applying a strength along a selected direction on each circle, simulates the shifting...
In ground station scheduling problem the aim is to compute an optimal planning of communications between Spacecrafts (SCs) and operations teams of Ground Stations (GSs). While such allocation of tasks to ground stations traditionally is mostly done by human intervention, modern scheduling systems look at optimization and automation features. Such features, on the one hand, would increase the efficiency...
The recent development of the society has caused new types of problems such as gaps of depopulation, population aging, and income between urban areas and local areas. The gap of communication networks is also one of the problems, and the poor network circumstance in local areas might affect the future medicare or welfare services by using Information Technology. Also, when there is a natural disaster...
Most of the existing back off algorithms adjust the Contention Window (CW) only after the occurrences of collision in wireless networks. To prevent/ reduce further collisions, this paper proposes a sliding CW approach, to be done, after each successful transmission. Based on the current channel status measured by channel utilization and contention ratio, sliding factors are determined to adjust both...
Recently, many MAC protocols have been proposed for making effective communications under the single transceiver and multi-channel environment. In those MAC protocols, however, occurrence of multi-channel hidden terminals problem degrades throughput performance of communication systems. Then, in order to mitigate bad effects of the multi-channel hidden terminals, both MAC protocols that are CAM-MAC...
Sensor networks using ZigBee are vulnerable to interference with Wi-Fi because ZigBee and Wi-Fi use the same frequency band. Other studies have measured the performance in an environment where Wi-Fi and ZigBee coexist, and some methods have been proposed to reduce the effect of interference by changing the timing of ACK and MAC parameters. However, conventional methods are not easy to implement. In...
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. As a solution for solving the above problem, there is the approach of Policy-based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control of every user...
In a cloud computing environment with multiple data centers over a wide area, it is highly likely that each data center would provide the different network delay to users at different locations. The authors proposed the joint multiple resource allocation method in a cloud computing environment that consists of multiple data centers and each data center provides the different network delay. However,...
Minimizing the application running cost becomes a must in our day when Cloud Computing offers support for a large variety of applications. Being at the confluence with Cyber infrastructures and Big Data platforms, Cloud systems support efficient and effective workflows. Due to the increase in computational power for executing workflows, the need for efficient usage of said power also arises. After...
To enhance the QoS performance in saturated multihop adhoc networks, it is essential to have cooperative algorithms for MAC layer contention resolution and TCP layer congestion control. This paper proposes a cross layer approach that modifies the back off mechanism and congestion control technique using Fibonacci sequence. Due to the golden section property of Fibonacci sequence, contention and congestion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.