The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work studies centrality metrics as forwarding load predictors, for both unicast and multicast traffic, within dynamic ad hoc network topologies. We present results from a series of emulation experiments based around an emergency response mobile network scenario. From collected temporal topological and traffic data, we calculate a rank correlation measure between predictive centrality metrics...
This work introduces a novel surface registration method based on foliation. A foliation decomposes the surface into a family of closed loops, such that the decomposition has local tensor product structure. By projecting each loop to a point, the surface is collapsed into a graph. Two homeomorphic surfaces with consistent foliations can be registered by first matching their foliation graphs, then...
Video streaming is an important service provided by surveillance systems to enhance situation awareness. However, in military systems, data acquisition heavily depends on the network infrastructure. In this application domain, units are spread and the distance between the sources of data and the decision makers may be very large. In the case of video streaming, the demand for high network throughput...
Inferring fine-grained link metrics by using aggregated path measurements, known as network tomography, is essential for various network operations, such as network monitoring, load balancing, and failure diagnosis. Given a set of interesting links and the changing topologies of a dynamic network, we study the problem of calculating the link metrics of these links by end-to-end cycle-free path measurements...
In telecommunication networks resilience intuitively refers to cycles and their lengths. More specifically, considering that the shortest cycle involving each pair of nodes in the network can be disassembled into two disjoint paths, a working path and a backup path, the average of the shortest cycles involving each pair of nodes in the network can be considered as an indicative of resilience. In turn,...
A Software Defined Network (SDN) provides functionalities for modifying network configurations. To enhance security, Moving Target Defense (MTD) techniques are deployed in the networks to continuously change the attack surface. In this paper, we realize an MTD system by exploiting the SDN functionality to optimally reconfigure the network topology. We introduce a novel problem Shuffle Assignment Problem...
Contactless power transfer (CPT) is an emerging topic which relies in high frequency resonant inverters to transfer power from a transmitter to a physically separated receiver inductively. Capacitive compensations on both the primary and secondary sides of a loosely coupled transformer are usually employed in recent researches in order to enhance the power transfer capability and the system efficiency...
In this paper the calculations of the robustness of a network is addressed. After a brief description of the most relevant metrics, our Network Robustness Simulator(NRS) is presented as well as its structure and working model. The NRS computes the robustness I a dynamic scenario, it copes with multiple failures and different types of attack. In particular, the addition of the epidemic based model...
Complex networks have become a large area of study due to their pervasiveness in today's society and our dependence on them. While network science enables engineers and scientists to improve resilience of networks, due to lack of realistic data, simplistic assumptions may result in incorrect conclusions. Network service providers optimize their designs and plan for future capacities based on realistic...
Content Delivery Networks (CDNs) are a key en-abler for the distribution of large amounts of data with high capacity and low latency. For instance, content streaming companies extensively use geographical distribution and replication to meet the ever-growing demand for media. Optical networks are the only future-proof technology available that meets the reach and capacity requirements of CDNs. However,...
Server security is necessary to avoid all attack that will happen. IPS (Intrusion Prevention System) is an example of right solution for the security system. IPS can prevent an attack by using the IDS (Intrusion Detection System) and firewall features. In this paper, bro IPS on the server will be tested with some attack include DOS (Denial of Service), port scanning, and ftp brute force to ensure...
The Processing Architecture based on Measurement Metadata (PAbMM) is a data stream management system specialized in measurement and evaluation (M&E) projects, which incorporates predictive and detective behavior on data streams. It uses a case based organizational memory for recommending courses of action in each detected online situation and previously modeled by the project definition. In this...
We propose, under the form of a short overview, to stress the interest of graph to encode the "topological" structure of networks hidden in images especially when applied in life sciences. We point toward existing computer science tools to extract such structural graph from images. We then illustrate different applications, such as segmentation, denoising, and simulation on practical examples...
The article focuses on experimental measurement of multi-carrier narrowband Power Line Communication. The aim of experimental measurements was comparison of multi-carrier narrowband Power Line Communication from the view-point of possible communication distance, available data rate and impact of noise. The specifications G3-PLC and PRIME are considered. The field test results and data rate measurements...
With the widely using of network-on-chip in VLSI systems, mapping has been one of the most critical and general problem in VLSI design and test. In this paper, a breadth-first greedy algorithm is proposed to reduce internal congestion and solve the application mapping with the structure of the task topology and the shape of the mapping area. The experimental results show our solution achieves the...
Overlay multicast is regarded as a promising way for distributing file or live stream during recent years. In this paper, we reinforce an optimal DAGs (directed acyclic graphs) construction algorithm by relaxing its partitioning and sorting conditions. We employ a realistic topology (CERNET2 backbone) to evaluate several typical types of optimal DAGs in terms of the underlay performance metrics. Simulation...
We review the statistical network assessment process (SNAP) and apply it to the analysis of two different network topologies. Using SNAP, we identify topological bottlenecks and we test the effectiveness of physical layer solutions in unlocking them. We show how selected introduction of spatial division multiplexing (SDM) through fiber doubling enables to achieving a 63% and 12% capacity increase...
Web software systems generally reside in highly volatile environments, their incoming traffic may be subject to sharp fluctuations from reasons that cannot always be captured or predicted. Cloud computing provides a solution to this problem by offering flexible resources, like containers, which can be quickly and easily scaled according to the current workload needs. Automating this process is a key...
Service-oriented architecture (SOA) is an architectural paradigm that advocates composition of loosely-coupled services in order to construct more complex applications. The agility and complexity of modern web services on one hand and the arbitrary interconnections among them on the other hand, make it difficult to maintain a sustainable trustworthiness in long-running SOA-based applications. Moreover,...
Because of the popularity of cloud computing, Cloud Service Providers (CSPs) can rent virtual machines (VMs) from Cloud Providers (CPs) conveniently. In our previous work, we proposed an autonomic and elastic resource scheduling framework, named AERS, which made full use of both proactive and reactive controllers in the field of dynamic resource provision and was integrated with an availability-aware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.