The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH) is the wireless sensor network protocol standard proposed by the Internet Engineering Task Force (IETF) for Internet of Things (IoT). Aside from 6TiSCH, there are other existing protocol standards for wireless sensor networks which are suitable to be deployed in industrial applications. However, there are no comprehensive performance evaluations done...
This paper presents a TCP/IP-based architecture (IPSecOPEP) to resolve the interoperability issue between PEPs (Performance Enhancing Proxies) and IPSec (Internet Protocol Security). Where this problem is due to the cryptographic protection of TCP header by IPSec ESP protocol, which prohibits TCP enhancing mechanisms to be performed by PEPs. The key idea of this solution is that IPSec devices can...
We daily add more devices and services into existing intelligent home networks. Consequently, various networking standards evolutions being experienced world over have not left home networks behind. These evolutions results in competition and depletion of the available limited resources. Consumers therefore, experience unavailable, unreliable and poor performing network both locally and remotely....
Acquiring current position information from the GNSS is a straightforward procedure outdoors. Any mobile device, equipped with a GNSS receiver, having a line of sight with enough numbers of satellites can calculate its location. The mobile device does not need a full connection with any of these satellites. In the indoor positioning using the Wireless Ethernet IEEE 802.11 (Wi-Fi) standard, some accurate...
The performance of parallel distributed file systems suffers from many clients executing a large number of operations in parallel, because the I/O subsystem can be easily overwhelmed by the sheer amount of incoming I/O operations. Many optimizations exist that try to alleviate this problem. Client-side optimizations perform preprocessing to minimize the amount of work the file servers have to do....
In mobile ad hoc networks (or MANETs) devices usually rely on batteries, so the lifetime of these networks highly depends on the energy consumption of the devices composing them. In this paper, we improve the performance of the adaptive enhanced distance based broadcasting algorithm, AEDB, as well as we optimize it using a hybrid multi-objective algorithm, CellDE. The optimization is done by maximizing...
The paper deals with the steps proposed for performance optimization of PC to device file transfer. From the Key Performance Index (KPI) testing its seen that PC to device file transfer takes more time than Device to PC whose performance is good at the MTP (Media Transfer Protocol) level. Hence necessary steps are taken to increase the performance of PC to Device transfer, for ex: for a file transfer...
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and managing firewall policies within the modern highly distributed, dynamic and heterogeneous environments might greatly limit the effectiveness of firewall security...
Computing is now shifting towards multiprocessing. The fundamental goal of multiprocessing is improved performance through the introduction of additional hardware threads or cores (referred to as “cores” for simplicity). Modern network stacks can exploit parallel cores to allow either message-based parallelism or connection-based parallelism as a means to enhance performance. OpenSolaris has redesigned...
In cooperative automatic repeat request (C-ARQ) protocols, one or more nodes can act as relays, collaborating in the frame retransmission process between a sender and a destination node. In the framework of a broadband mobile access network, we consider a relay enhanced cell where the sender represents the base station, and an undefined number of relays can cooperate with a single user (destination)...
Next generation networks (NGNs) are evolving to accommodate a variety of new services and traffic types, while allowing a user to roam within the service area of the network, or between networks without deteriorating a predetermined quality of service (QoS). In order to establish a proper background for "end-to-end" QoS support, we have identified the key adaptation issues and proposed the...
Processor stalls and protocol messages caused by coherence misses limit the performance of shared memory applications. Modern multiprocessors employ write-invalidate coherence protocols, which induce read misses to ensure consistency. Previous research has shown that an invalidate protocol is not optimal for all memory access patterns - an update protocol can significantly outperform an invalidate...
We present a practical, systematical method for the evaluation of the soft error rate (SER) of microelectronic devices. Existing methodologies, practices and tools are integrated in a common approach while highlighting the need for specific data or tools. The showcased method is particularly adapted for evaluating the SER of very complex microelectronic devices by engineers confronted to increasingly...
In this paper, an individual 3D face generation method has been proposed. This method is based on candide-3 and aims for pose normalization for face recognition system. By using ASM and AAM for facial feature point tracking and model parameters optimizing, this method decreases the computation time of 3D face generation and improves the level of the 3D model fitting with the input image. Through applying...
Many interesting workloads today are limited not by CPU processing power but by the interactions between the CPU, memory system, I/O devices, and the complex software that ties all the components together. Optimizing these workloads requires identifying performance bottlenecks across concurrent hardware components and across multiple layers of software. Common software profiling techniques cannot...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
This paper provides a short review of radio frequency/microwave power amplifiers (PAs) and their critical role in a modern satellite communication system. Authorspsila original design contributions are also highlighted.
The next generation of wireless communication is a ubiquitous radio system concept, providing wireless access from short-range to wide-area, with one single reconfigurable and adaptive system for all envisaged radio environments. This paper presents the design approach of RCO (reconfigurable concurrent oscillator) that simultaneously generates two or more signals of different frequencies that eliminate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.