The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Simulated use of IP applications on hosts spread on the internet is expensive, which leads already in simple use cases to an enormous amount of time for setting up and carrying out an experiment. Complex scenarios are only possible with an additional infrastructure. This document describes a framework with which a needed infrastructure can be implemented. This infrastructure allows an efficient...
Cross-layer based approach is used in cognitive wireless networks for efficient utilization of unused spectrum by quick and correct detection of primary signals. In the current research, Su’s algorithm was modified and the RASH (Random Access by Sequential search and Hash organization) algorithm was proposed for quick detection of idle spectrum. Once the idle spectrum is detected, the Hidden Markov...
Radio spectrum is scarce and precious resource in wireless networks. To efficiently utilize radio spectrum, idle radio channels can be rented between various wireless networks and a wireless network renting out its idle channels can withdraw its radio channels when requiring its channels. However, the rental and withdrawal of radio channels result in two phenomena. One is the variation in the number...
Testing Web applications is still a challenging work which can greatly benefit from test automation techniques. In this paper, we focus on using ontologies as a means of test automation. Current works that use ontologies for software testing are discussed. Further a theoretical roadmap is presented, with some examples, on ontology-based web application testing.
This paper examines the most frequent cause of data breach today – that of stolen or lost laptops. Over one million laptops go missing each year in the U.S., creating tremendous problems and exposure for American companies, universities, government agencies, and individuals. This paper first looks at the size and scope of the laptop theft problem and the ramifications of the loss of the hardware and...
Due to globalization, stronger competition, increased complexity, information explosion, interconnection and exten-sive use of IT data and information management are main performance driver and key differentiator for sustainable or-ganization success. Long time organizations had developed IT systems regarding overall access rights. Due to stronger re-quirements of data protection code and increased...
This paper aims at investigating the WSN (wireless sensor network) connectivity to external networks and infrastructures. It addresses research regarding existing techniques, mechanisms and devices that will provide connectivity of WSNs to external networks.
A useful tool in the design of reliable digital communication systems is channel coding. Turbo codes [1, 2] have been shown to yield an outstanding coding gain close to theoretical Shannon limit in the Additive White Gaussian Noise (AWGN) channel. This is due to relatively large coding gains that can be achieved. Turbo codes are widely used in many communication systems. In this paper, we chose two...
Nowadays, the increased use of battery-powered mobile appliances and the urge to access sensitive data anywhere has fuelled the demand for wireless networks. However, wireless network is susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality, authenticity, integrity and non repudiation of the data being exchanged...
As the field of the wired networking communications developed, so did the mechanisms for the reliable delivery of messages from one user to another. With the advance of the wireless communications, these mechanisms had to be adjusted, or sometimes developed anew. Vehicular ad hoc networks present themselves as a specific example, where the mechanisms, which are in use in the Wireless LANs and mobile...
With the rapid deployment of distributed systems and the Internet, federation activities such as online collaboration and information sharing become pervasive. Trust is a big issue in these federation activities. To manage trust in federation activities, authentication information needs flexible manipulation to accommodate technical and managerial requirements. To achieve identity federation across...
Authorization and protection deal with the problem of the control of access to resources. A key aspect of modern computing systems is resource sharing, so a need arose to govern access to these resources only to authorized users. In multi-user operating systems (such as Linux) authorization is of great interest. Computer security and authorization as a subset is characterized by the fact that a security...
The networking capabilities of mobile devices have increased dramatically in recent years. A wide range of mobile devices now provide the capability to simultaneously connect to multiple underlying networks. The increasingly ubiquitous deployment of WLAN technologies, particularly in urban and campus scenarios, has allowed mobile developers to enhance their application functionality based on the characteristics...
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and implementation of a reconfigurable Galois field multiplier, which is implemented using field programmable gate arrays (FPGAs). The multiplier of Galois field based on karatsuba’s divide and conquer algorithm allows for reasonable...
Using non-linear control theory we developed and analyzed a generic Integrated Dynamic Congestion Controller “IDCC” scheme for controlling differentiated-services network traffic, having the information on the status of queue in the network. The controller scheme is based on a nonlinear model of the network which is generated using fluid flow model, considering time delay. The time delay is introduced...
An ad hoc network is a dynamically reconfigurable network without any infrastructure or centralized administration and which is formed of a group of wireless mobile hosts, each of which have a limited wireless transmission range. EADARP is an Energy Adaptable Distance Aware Routing Protocol (EADARP) for wireless mobile ad hoc networks is developed to improve basic performance metrics for multicast...
The Border Gateway Protocol (BGP) is the path vector protocol that routes inter-domain traffic, connecting Autonomous Systems (AS’s) together to form the decentralized backbone of the Internet. In the event of a network failure, BGP can take minutes to converge under default settings. With the route withdrawal rate limit (WRATE) change in the new BGP specification, the effect of the Minimum Route...
This paper evaluates error reduction in wireless communication networks. We have reviewed selective acknowledgement schemes to provide reliable end-to-end communication on wireless-link. TCP (Transport control protocol) has poor performance over wireless-link. Due to high error rate, page response time (sec), and retransmission count over wireless-link. We present a scheme to improve performance using...
In the context of new high-data-rate wireless communications, multiple antenna systems are now taken into account early in the design phase. A new combining technique, OSC-SSBC (Orthogonal Space Combining – Space-Space Block Coding), was proposed by the authors as an alternative to STBC (Space-Time Block Coding) in MIMO systems, which is still based on high redundancy algorithms. The new receiver...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.