The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) detect and monitor the outside physical state by the sensor nodes organizing automatically. Clustering is a standard approach for achieving efficient and scalable performance in WSNs. In the applications of analysis topology discovering, geography routing, tracking and so forth, we need to resolve how to search for the boundary nodes and form the network boundary. Different...
Wireless Sensor Network (WSN) is widely used in Emergency Management System (EMS) to assure requirement of safety in current society. For centralized management, it is difficult for conventional systems to assure the real-time transmission of emergency information under rapidly changing situations. Thus, based on the Autonomous Decentralized Community (ADC) concept the main route for emergency information...
Today's Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life. The problem is complicated by the fact that one cannot rely on the cooperation of individual servers and routers to aid in the collection of network traffic measurements vital for these tasks. Packet Forwarding Priority can have a significant impact on the performance...
Wireless Sensor Network(WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory makes sensor networks infeasible to use conventional security...
Notice of Violation of IEEE Publication Principles"Workload-Based Query Routing Tree Algorithm in Wireless Sensor Networks,"by Yingchi Mao, Xiaofang Li, Yi Liang, in the 2010 International Conference on Computational Intelligence and Software Engineering (CiSE), December 2010, pp.1-4After careful and considered review of the content and authorship of this paper by a duly constituted expert...
In wireless sensor networks, it is important to minimize energy consumption of the sensor nodes. Energy consumption of sensor nodes can be reduced explicitly by making sensors sleep when they are idle. In this paper, we consider a single wake-up periodic schedule in that the sensor wakes up in one slot out of k slots. This results in every sensor node having a duty cycle of 1/k on an average. However,...
On-line monitoring and diagnosis of wind power generation is not easy because of its discrete distribution. In this paper, a new monitoring and diagnosis system for this problem is presented, which is based on ad-hoc networks. The reliability and maintenance is improved dramatically and some special functions for components failure alert are also added. Finally, a small ad-hoc network for simulation...
Live monitoring of athletes during sporting events can help maximise performance while preventing injury, and enable new applications such as referee-assist and enhanced television broadcast services. A major challenge is the extraction of athlete physiological data in real-time, since the radio range of body-worn sensor devices is limited, necessitating multi-hop routing mechanisms. However, little...
Although significant efforts have been devoted in the literature to measurements of the Internet topology, little attention has been given to the qualification of routing deviations and multipath dynamics at the Autonomous System (AS) routing level. We observed Internet AS-level routes toward thousands of destinations for several weeks between 2009 and 2010 to have a better understanding of these...
Problems of Wireless Sensor Networks (WSN) caused in the laboratory are predictable, and easy to resolve. While in the deployment and management phases, a number of factors in the environment raise more problems that are difficult to predict or simulation than in laboratory condition. To effective manage and monitor those problems, an effective management mechanism is needed, which analysis the problems...
We present WiMFlow, a dynamic and self-organized flow monitoring framework in Wireless Mesh Networks. The protocol allows for an autonomic organization of the probes, with the goal of monitoring all the flows in the backbone of the mesh network accurately and robustly, while minimizing the overhead introduced by the monitoring architecture. A new mechanism that adapts the control messages emission...
Energy utilization is a challenging task that is being encountered in low-powered Wireless Sensor Networks (WSNs) when designing an algorithm, protocol or hardware. Congestion is a factor that can affect a network's lifetime (and energy utilization), since it usually leads to packet drops or collisions in the medium followed by possible retransmissions. Forwarding data packets through alternative...
Many contributions use the degree distribution of IP-level internet topology. However, current knowledge of this property relies on biased and erroneous measurements, and so it is subject to much debate. We introduce here a new approach, dedicated to the core of the internet, which avoids the issues raised by classical measurements. It is based on the measurement of IP-level neighborhood of internet...
Detecting errors in traffic trajectories (i.e., packet forwarding paths) is important to operational networks. Several different traffic monitoring algorithms such as Trajectory Sampling, PSAMP, and Fatih can be used for traffic trajectory error detection. However, a straight-forward application of these algorithms will incur the overhead of simultaneously monitoring all network interfaces in a network...
For large-scale wireless sensor networks (WSNs), a three-layer topology architecture and an algorithm of topology control for its key communication layer are proposed in this paper. In the algorithm, the base station of the network leads the ring periodically to discover the minimum power cost links from base station to each sinks, and a minimum spanning tree will be constructed. This tree will be...
In this paper, we study the efficiency of inter-domain state advertising in multi-domain networks, in which the intra-domain topology is substituted with a full-mesh topology of abstract links interconnecting the border nodes of the domain. The advertising trigger rate of individual abstract link is taken as the metric of efficiency. We present an analytical model that reveals the contributions of...
InfiniBand networks are aimed to fulfill increasing communication demand of parallel applications in high performance clusters. However, the dynamic behavior of communication load may cause bottlenecked link(s) which lead to message congestion. Congestion spreading increases latency and reduces network throughput causing important performance degradation. In this paper, we propose a congestion control...
Most of the extant wireless medicare system have been used Bluetooth or WiFi standard based on IEEE 802.11 to implement wireless communication. However, those could not work as a network and transmit data to specific terminals. Wireless Sensor Networks (WSNs) based on IEEE 802.15.4 present a possibility to implement a networked medicare system. Most of those networking algorithms have been discussed...
Several trends in SIP application server deployments in large scale telephony environments exacerbate the classic problem of feature interaction : use of distributed feature servers, mixing of legacy and green-field feature servers, and the co-existence of multiple third-party feature implementations provisioned in the same environment. Next-generation SIP application servers will include an application...
In this paper, we outline a fast approach to build a model of the Internetpsilas AS-level routing topology. More important than the construction process itself is the detailed analysis of the modelpsilas accuracy by comparing it against a vast amount of routing table data. This analysis allows researchers to evaluate whether the model itself is accurate enough for their own evaluation purposes, i...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.