The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Needleman-Wunsch algorithm (NW) marked the genesis of a new field of research known as sequence alignment. Its inception was motivated by the growing need for automated methods to find homologous biological sequences. Subsequently, sequence alignment has established itself as a standard approach in bioinformatics, and has also been applied to other domains, including sequences of temporal events...
Under the wireless communication network environment, the received signal will be effected by noise and interference. And it will produce many inaccurate codes consequentially. Under this situation, the error bits in the binary data after demodulating and decoding will affect the formats extraction of the unknown protocols. In order to improve the accuracy under the noise interference and the adaptability...
This study was on the computer network layer and application layer data packet interception, analysis, analysis of network data flow filter, protocol decoding, multi-node collaborative detection, anomaly feature extraction, pattern discovery algorithms, intrusion detection model, network-level intrusion detection The algorithm and protocol analysis test method and so on, trying to find fast and efficient...
Current trends in health management improvement demand the standardization of care protocols to achieve better quality and efficiency. The use of Clinical Pathways is an emerging solution for that problem. However, current Clinical Pathways are big manuals written in natural language and highly affected by human subjectivity. These problems make the deployment and dissemination of them extremely difficult...
We present a distributed on-line algorithm for detecting conjunctive stable predicates in dynamic systems. The algorithm consists of a virtual network topology to maintain the causality relationships between distributed events and protocols to check the verification of the predicates over consistent global states. A lazy detection protocol has been developed to minimize the number of messages for...
In this paper, we present the development of a CAN protocol simulator. This simulator is expected to help analyzing faulty behavior of the CAN protocol in order to develop diagnosis strategies.
The proliferation of online auctions has caused the increasing need to monitor and track multiple bids in multiple auctions. As a solution to the problem, an autonomous agent was developed to work in a flexible and configurable heuristic decision making framework that can tackle the problem of bidding across multiple auctions that apply different protocols (English, Vickrey and Dutch). Due to the...
Sensor technologies have become vital today in gathering information about close by environments and its use in wireless sensor networks is getting widespread popular every day. Using heterogeneous nodes in a sensor network increases network reliability and lifetime. Our paper focuses on cluster head selection problem to improve full network coverage. Our proposed algorithm for cluster-based network...
The advances in research on ad hoc networks, the availability of cheap radio interfaces (e.g. WiFi) and the increasing amount of electronic devices installed in vehicles have set the path for vehicular ad hoc networks. In the past few years, vehicular ad hoc network (VANET) research has addressed all layers, trying to optimize from the physical layer to the application layer to support the design...
BGP allows providers to express complex routing policies preserving high degrees of autonomy. However, unrestricted routing policies can adversely impact routing stability. A key concept to understand the interplay between autonomy and expressiveness on one side, and stability on the other side, is safety under filtering, i.e., guaranteed stability under autonomous usage of route filters. BGP route...
Tag anti-collision protocol is one of the most important issues in RFID research, and many new methods have been proposed to solve the problem. In this paper, main anti-collision algorithms are illustrated and analyzed. Consequently, the comparison of these algorithms is summarized, and the perspective of tag anti-collision issues is inferred.
EPC Q scheme is a very popular protocol in RFID, in which the reader uses parameter Q to vary the slot number that tags can select. In this paper, we propose a new algorithm based on this scheme. We first propose a fast and efficient tag estimation method according to stochastic analyses on the first three slots of each frame, then propose a new ALOHA based multi-branch anti-collision scheme. Both...
In this paper, we show the enhanced version of SLPv2 (Service Location Protocol version 2). It is one of the service discovery protocols in wired network, and we propose the wireless network based SLP for WSN (wireless sensor network). If a wired protocol is transferred to the wireless domain, then we have to consider some critical problems, like resource and power wall, etc. So SLP for the WSN must...
Even if the market penetration rate of biometric technologies is still far below its potential, many biometric systems are used in our daily real-life. One of the main reasons to its low proliferation is the lack of a generic and complete approach that quantifies the performance of biometric systems taking into account individuals' perception among the process. Among all the existing biometric modalities,...
In recent years peer-to-peer (P2P) systems gain much attention. Growing popularity in P2P based protocol implementations for file sharing purposes caused that the P2P traffic exceeds Web traffic, once of the dominant traffic on the Internet. In fact of that, the use of P2P systems introduce many new problems related to traffic engineering or network optimization. In accordance to our previous works...
In wireless data communication, security has become an important measure. In this paper, we reveal vulnerabilities and weaknesses of WEP protocol which is used in IEEE 802.11b. The major issue of WEP protocol is the lack of a proper key management technique. We propose a method to overcome above by introducing a dynamic key for authentication and data transmission on per data frame basis.
A behavior-driven artificial neural network computing system is presented to solve problems occurred in artificial neural network course. With this system, users will concentrate their efforts on algorithms instead of computing environment, and can define arbitrary learning algorithms at any time, and submit the work to the server to execute. The server can load the work dynamically. When finishing...
Construction of learning structures for Bayesian networks is considered in this work when data is securely maintained by different parties, not willing to reveal their individual private data to each other. We propose a privacy-preserving protocol for Bayesian network from data which is homogeneously partitioned among two or more parties by using K2 algorithm, a heuristic algorithm typically used...
DCUR follows the same procedure as define in Bellman-Ford but uses two vectors, namely least cost and least delay vector. The main drawback of DCUR is its assumption of link costs. It means that the minimum cost path is more often chosen and therefore the load distribution is not fair for the minimum cost paths. In this paper we propose a way to modify the cost and delay metrics dynamically in the...
The initial phase in a content distribution (file sharing) scenario is delicate due to the lack of global knowledge and the dynamics of the overlay. An unwise distribution of the pieces in this phase can cause delays in reaching steady state, thus increasing file download times. We devise a scheduling algorithm at the seed (source peer with full content), based on a proportional fair approach, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.