The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The demonstrated system is an online video streaming service using QUIC protocol as transport. Video buffer status information is gathered at the client side and it is transferred to the video content server via the object priority assignment method of QUIC. Our proposal is to utilize the priority information for congestion control (CC) influence as well. In our realization, the server extracts the...
This paper covers a study on WebRTC data channel performance in current web browser implementations. The goal is to find out whether WebRTC data channels are usable today in web applications demanding throughput performance for data transfers consisting of arbitrary data. Performance is measured using a purpose-built web application and various simulated network conditions. Packet capture is used...
In cognitive networks, cognitive (unlicensed) users need to continuously monitor spectrum to detect the presence of primary (licensed) users. In this paper, collaborative spectrum sensing scheme is exploited as the masterstroke., furthermore, cognitive users transmission powers are constrained, and the relative positions among the two cognitive users and the primary user in the three-dimensional space...
Wireless sensor networks (WSNs) currently operate in the unlicensed industrial, scientific and medical (ISM) spectrum band. However, more and more wireless equipments make this band overcrowded. The tremendous growth in the applications of WSNs has posed great challenges for the precious radio electromagnetic spectrum resource. The limited wireless spectrum resource will be the bottleneck for the...
Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today's de-facto access control protocol and specification language, XACML, does not provide sufficient syntactic and semantic support for the specification of attribute relations in their scheme. In this...
This paper presents the design and implementation of a novel reconfigurable mobile node for wireless sensor networks. The proposed node is a palm-sized small robot which has two joints for crawling locomotion. It adopts the ZigBee protocol for wireless communication and control and therefore can be added to a ZigBee-based sensor network as a mobile node. Multiple modular nodes can make physical connections...
We embed an operational semantics for security protocols in the interactive theorem prover Isabelle/HOL and derive two strong protocol-independent invariants. These invariants allow us to reason about the possible origin of messages and justify a local typing assumption for the otherwise untyped protocol variables. The two rules form the core of a theory that is well-suited for interactively constructing...
Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location information for nodes is still a challenge. So far, many protocols have been proposed to solve this problem, most of which offer exact routing location information, and are complicated to implement in practice. In this paper, we propose...
Recently in order to improve the longevity and energy efficiency of WSN (Wireless Sensor Network), widely research have been carried on. Up to the present, many presented methods are based on clustering hierarchical structure. Nevertheless, these protocols don't consider the problem of data sensibility. Based on cluster hierarchical structure, we propose a routing protocol through which each node...
As manufacturing process technology enter into nano-phase, integrate billions of transistors on a single chip has become a reality. By combining pre-designed and configurable SoCs as complementary and independent resources, a new concept of embedded HPC system named as PRSoC was proposed. HPC architectures, MPI parallel programming specification, IPC mechanism of multi-core / multiprocessor system,...
In recent years, we have seen tremendous growth in the applications of wireless sensor networks (WSN) operating in unlicensed spectrum bands. However, there is evidence that existing unlicensed spectrum is becoming overcrowded. On the other hand, with recent advances in Cognitive Radio (CR) technology, it is possible to apply the Dynamic Spectrum Access (DSA) model in WSN to get access to less congested...
In ad-hoc networks, at the beginning of network formation or later for routing purposes it is essential for a node to know how many neighbors it has. The capture effect, the effect of receiving a packet from a collision, can degrade the performance of the procedure of estimation of number of neighbors (ENN). The capture effect depends on different network parameters which are different in underwater...
Service composition is becoming a central aspect in the new paradigm SaaS. In practice, most web services can not be integrated directly into applications because there are some mismatches in their interfaces. These mismatches may arise at different interoperability levels: technical, signature, behavioral, quality of service and semantic. In this paper, we present a model-based framework for generating...
Mobile Ad-hoc Networks (MANETs) enable users in physical proximity to each other to exchange data without the need for expensive communication infrastructures. Each user represents a node in the network, and executes a neighbor discovery Typically, nodes broadcast beacon messages that are received by other participants within the sender’s communication range. Routing strategies are computed on-line...
In this paper, we propose a cognitive p-persistent carrier sense multiple access (CpCSMA) scheme for spectrum sharing based cognitive radio (CR) networks. In order to guarantee the quality of service of the primary (licensed) network, secondary users are allowed to transmit their data as long as the interference received at a primary receiver is limited by the predetermined level. In the proposed...
In this paper we present a solution for the realization of large Cognitive Radio Networks. The solution features a spectrum-aware neighbor discovery and clustering scheme that works in conjunction with a network coded cognitive control channel in order to allow Cognitive Radio devices to opportunistically access the unused spectrum. We evaluate the performance of the proposed solution with respect...
In this paper we consider a two-hop relay network consisting of a source, a destination and multiple relay nodes. For a given quality of service (QoS) requirement such as transmission rate between the source and the destination, relay nodes have an adaptive power control scheme to meet the QoS requirement. The adaptive power control scheme is assumed to be based on the channel condition between relay...
In the design and application of wireless body area network (WBAN) system, one main requirement is to improve the performance of the system under low signal to noise ratio scenario and more emphasis is put on the improvement in data link layer and network layer rather than physical layer. In this paper, the idea of applying cognitive radio (CR) technology, one promising technology in recent wireless...
In this paper, we consider the problem that despite considerable Cognitive Radio (CR) research over the last decade and standardization efforts in DySPAN related topics in recent times, thus far, the commercial realisation of autonomous and intelligent networks has not been fulfilled. This is partly because of the complexity of deploying learning algorithms and protocol solutions that satisfy the...
In this work, a cognitive cooperative communication protocol is proposed for cognitive ad-hoc networks, in which primary users and cognitive radio (CR) users may cooperate for mutual benefit. The new cooperation protocol allows active cooperation between primary users and CR users in which CR users assist to relay primary users' signals in exchange for some spectrum released from the primary users...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.