The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An effective and simple solution methodology is applied and demonstrated to optimize the reliability redundancy allocation problems (RRAP) for the series-parallel system, the complex (bridge) system, and the overspeed protection of gas turbine system. The objective of the RRAP is the best known to maximize the system reliability for numerous decades. For this paper, in order to maximize the system...
Mobile Health (mHealth) is now emerging with Internet of Things (IoT), Cloud and big data along with the prevalence of smart wearable devices and sensors. There is also the emergence of smart environments such as smart homes, cars, highways, cities, factories and grids. Presently, it is difficult to quickly forecast or prevent urgent health situations in real-time as health data are analyzed offline...
There are many costs associated with the building and running a telecommunications network, both capital (CAPEX) and operational (OPEX) costs. On the one hand, complex routing schemes activated in multi-layer networks, like MPLS, logically imply assignment of costs to a collection of modules, from more than one layer, so defining the cost model is a non-trivial task. On the other hand, optimization...
Resilient networks are those capable of continuously offering telecommunication services in the presence of network failures. New paradigms for reliable network design have been emerging and constantly improving network survivability. Failure-Independent Path-Protecting (FIPP) p-cycles are a path based extension of the well-known p-cycle concept and inherit attractive properties of ring-like recovery...
Broadband network performance is multi-faceted: it varies by ISP, by content source, by household connection, and by time-of-day. Daily or monthly averages, as published by content providers such as Netflix and Google, do not convey the full picture. In this paper we leverage M-Lab, the world's largest open measurement platform, to characterize broadband performance across Australian households. Our...
Crowdsourcing platforms provide an easy and scalable access to human workforce that can, e.g., provide subjective judgements, tagging information, or even generate knowledge. In conjunction with machine clouds offering scalable access to computing resources, these human cloud providers offer numerous possibilities for creating new applications which would not have been possible a few years ago. However,...
In this paper, a new notion which we call verifiably anonymous data collection protocol is introduced and formalized in the client-server model where each respondent uses a web interface to communicate with a server operated by the data miner. A construction leveraging a combination of semantically secure double trap-door encryption and OR zero-knowledge proof system is proposed and analyzed, where...
Outsourcing heavy computational tasks to remote cloud server, which accordingly significantly reduce the computational burden at the end hosts, represents an effective and practical approach towards extensive and scalable mobile applications and has drawn increasing attention in recent years. However, due to the limited processing power of the end hosts yet the keen privacy concerns on the outsourced...
Capacity, survivability and power efficiency are properties of wireless networks that designers strive to increase. These goals, however, may oppose one another. This paper introduces a method in which all three goals may be pursued simultaneously in ad hoc networks through the use of a multi-objective cross entropy optimisation operating on the placement of additional nodes and transmission power...
In Mobile Ad Hoc Networks (MANETs), node mobility results in frequent topology changes. This makes it difficult for routing protocols to cope with the change timely. As nodes move arbitrarily and unpredictably, maintaining routing in such environment is a serious challenge. This paper presents a mechanism that targets the node mobility in a near future scenario and takes action to maintain the active...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.