The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The traffic condition information is critical to signal control and traffic queue management for intelligent transportation systems (ITSs). This work formulates the dynamic traffic flows by a parameter-driven discrete time series model. A modified Expectation-Maximization (EM) algorithm is proposed to estimate the parameters of the model. The conditional expectation given y in the E step of the EM...
Mobile devices pay the telecommunication cost of downloading Internet data proportional to the amount of data transferred. This paper introduces a special ad hoc network in which several mobile devices, called peers, to cooperate each other to reduce the overall cost to download Internet content. Each peer downloads a specific portion of the content over 3G connection and exchanges the portion with...
The importance of security in ad hoc network is increasing gradually to deliver information safely among nodes in hostile environment. The data is encrypted using various encryption techniques for the security reinforcement or for hiding the communication path. AnonDSR which offers anonymity to encrypt communication path, guarantees anonymity efficiently. The anonymity of source and destination nodes...
Personal Network (PN) is a user-centric concept to realize the interconnection of the users’ various devices and networks, such as home networks, corporate networks and vehicle area networks, at any time and any place. These networks may be geographically separated from each other and are usually organized in an ad hoc fashion, where the devices in one network can share content, data, applications...
This paper focuses on the derivation of the message complexity when two mobile ad hoc network (MANET) groups merge together, where the network groups already have been configured with IP addresses by using address autoconfiguration protocols (AAPs). The message complexity of the MANET group merging case (GMC) in Strong DAD, Weak DAD with proactive routing protocols (WDP), Weak DAD with on-demand routing...
Ad hoc networks are dynamic networks that consist of mobile nodes. Nodes in Ad hoc networks are usually laptops, PDAs or mobile phones. These devices feature Bluetooth and/or IEEE 802.11 (WiFi) network interfaces and communicate in a decentralized manner. Due to characteristics of Ad-hoc networks, Mobility is a key feature of routing protocol design. In this study, we present an enhanced routing maintenance...
The development of wireless network technology and user demands for mobility support have motivated the IETF to introduce mobile IP, mobile IPv6, and its extension, the network mobility (NEMO) basic support protocol. In the NEMO environment, mobile networks form a nested structure. Nested mobile networks based on NEMO basic support (NBS) protocol have the pinball routing problem because packets are...
Orthogonal frequency-division multiple access (OFDMA), which is a combination of orthogonal frequency-division multiplexing (OFDM) with frequency-division multiple access (FDMA), is regarded as a promising solution for enhancing the performance of interactive wireless systems in ubiquitous mobile communication environment. In such an application, this paper presents an investigation into improving...
In this paper, we present a method to analyze the performance of high-reliability Internet systems in wireless environments with Automatic Repeat ReQuest (ARQ) schemes. Considering the setting up procedure of a data link in wireless networks, we build a Geom/G/1 queue model with a setup strategy to characterize the system operation, and analyze the probability distribution of the system to obtain...
The timing offset is one of the main error sources in estimating the frequency offset in orthogonal frequency division multiplexing (OFDM)-based wireless local area network (WLAN) systems. Although some works have been done to mitigate the effect of the timing offset on the frequency offset estimation, most of the investigations require the knowledge of the timing offset range, which is not generally...
While the legacy TCP is the most commonly used and reliable transport protocol in the Internet, it is not suitable for massive data transfers in high bandwidth delay product networks. To cope with this problem, we propose high efficient TCP congestion control mechanism that can provide efficient data transfer in HBDP networks. When there is some available bandwidth and it satisfies a certain condition,...
Recent empirical and theoretical studies have shown that wireless links in low-power sensor networks are unreliable. Obviously, it is not a good choice for sensor networks that transmitting data unreliably, which will bring many problems to the networks, such as uncertainty, performance-decline, and so on. In this paper, a novel transmission strategy for reliable transmitting over unreliable links...
This paper proposes an optimized topology control scheme (GA-OTC) based on a genetic algorithm for clustering-based hierarchical wireless sensor networks (WSNs). By using a genetic algorithm, we can obtain optimal solutions to multiple objective functions according to the two criteria of both balanced energy consumption and minimized total energy consumption of cluster heads while the entire WSNs...
In wireless sensor networks (WSN) real-time data delivery is a challenging issue, especially when bursty events happen and many emergent packets appear. The cluster-based data aggregation has emerged as a basic and general technique in sensor networks. However, there is a trade-off issue between aggregation waiting (AW) delay and aggregation accuracy. Therefore, we propose a Delay Sensitive Feedback...
This paper proposes a low power real-time scheduling scheme that minimizes power consumption and reassigns polling order on the wireless sensor networks. The proposed scheme aims at enhancing the power performance based on the maximum constant power method along with the additional auxiliary schedule which can switch the primary one when a specific channel falls in a bad state or time slot is unused...
Sensor networks are suitable for a variety of commercial and military applications due to their self-organization characteristics and distributed nature. As a fundamental requirement for security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we describe an Adaptive Key Selection (AKS) scheme for multi-deployment in sensor networks...
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event, the photos of emergency situation are passed to the user’s portable devices such as mobile phone or PDA along with event description to help the user’s final decision. The system combines the foreground segmentation, object...
In order to control a remote robot over the internet, the operator needs to be able to exchange information with it in real-time. However, the camera image generally used for providing feedback information is too large to send in real-time over the internet. Furthermore, it takes a long time for the operator to send complex robot commands repetitively. These time delays in exchanging feedback and...
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that improves the flaw in cheap pseudonym design under the limitation of ambient e-service environment. This design is being applied to a collaborative iTrust platform for ambient e-service, a new scope of mobile ad-hoc e-service...
IEEE 802.16e Task Group has developed an IEEE 802.16 amendment supporting mobile terminals such as PDAs, phones, and laptops. The energy efficiency design is an important research issue for mobile terminals due to limited battery power of them. In this paper, we study the energy efficiency design of IEEE 802.16e. For the purpose of power efficient operation, there are two sleep mode operations related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.