The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to a number of protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life is still limited, in part due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel ad hoc protocol named...
Recent advances in the electronics for wireless communications is enabling transceivers to transmit and receive signals at the same time. Thus, the so called full duplex (FD) radios will soon be introduced in devices as opposed to traditional half duplex (HD). However, although FD radios allow to almost double the capacity of a single link, the advantage obtained in a network is still debated and...
GB/T 28925-2012 is a standard of P. R. China for active radio frequency identification (RFID). It defines wireless communications between reader and tag at 2.45GHz. Framed Slotted Binary Tree (FSBT) anti-collision protocol is adapted in it. However, performance of FSBT is not evaluated and parameters of FSBT are not estimated. A metrics for evaluating time performance and another metrics for evaluating...
This paper presents a TCP/IP-based architecture (IPSecOPEP) to resolve the interoperability issue between PEPs (Performance Enhancing Proxies) and IPSec (Internet Protocol Security). Where this problem is due to the cryptographic protection of TCP header by IPSec ESP protocol, which prohibits TCP enhancing mechanisms to be performed by PEPs. The key idea of this solution is that IPSec devices can...
The ability to remotely discover and configure devices in an automation network without the need for prior knowledge of the network topology or the identities of hosts and servers is a key requirement for industrial networks and cyber-physical systems. The Dynamic Host Configuration Protocol (DHCP) as a UDP-based standardized network protocol became very successful in computer networking and also...
RFID is one of the most pervasive technologies in contemporary societies. Modern RFID applications require efficient tag identification mechanisms to improve performance. Recently, a new approach has arisen to enhance the identification process in an RFID network. This new approach considers the inclusion of an additional device in the RFID network, which leads to an augmented RFID system. Up to date,...
Network performance increase does not have to be associated only with the upgrade of existing infrastructure and devices. More effective and less expensive increase of network performance can be achieved via sophisticated improvement of existing protocols, mainly at network and transport layer. The aim of this paper is to introduce our new approach for solving network performance issues which occur...
Cyber-physical systems are an emergent paradigm to design complex, adaptive and smart systems, combining computational applications with physical hardware devices. Multi-agent systems play an important role in such systems to provide flexibility, robustness and adaptation, but their alignment will require the integration of agents with physical devices. This process is usually complex and time consuming...
Certification is the process in which a manufacturer has to prove to authorities that an aircraft and systems like safety-critical avionic systems work safely as intended without unacceptable hazards. Means to achieve this are redundancy, separation/protection, monitoring, and recovery mechanisms. The objective of this paper is to provide a cost-efficient solution for monitoring of Commercial Off-The-Shelf...
Smart Grid constitutes the next generation of electricity delivery systems that intend to enhance reliability, efficiency, and security of the power grid. A fundamental component of this intelligent network is the Advanced Metering Infrastructure (AMI), which provides a two-way communication network between Utilities and a collection of smart meters located at the customers side. The interconnected...
Robust Header Compression (ROHC) is a standardized option defined by the IETF to compress the various transport and communication protocol headers over wireless links. In the present day scenario, when the applications and services are evolving to become more bandwidth hungry, wireless networks are expected to be capable of letting them drive on wireless links and provide required quality of service...
In recent years, due to the development and innovation in hardware and software, the scenario of a global worldwide network capable of interconnecting both traditional nodes and new Smart Objects (the Internet of Things) is coming true. The Internet of Things (IoT) will involve billions of communicating heterogeneous devices, using different protocols in order to enable new forms of interaction between...
This paper highlights the significance of Coverage analysis with respect to the functionality and adherence to the standard specification of SATA, SAS, NVME & eMMC Devices (SSD's, HDD's). Coverage analysis aims at achieving an effective way of testing the intrinsic functionality of the storage devices. Commands are issued to the Device under test to validate the attributes such as methods...
Wireless industrial communications are expected to represent an essential component of the Factories of the Future. Current industrial wireless standards have been designed for networks with fixed devices, while future systems might require the mobility of certain devices within a factory. The neighbour discovery mechanism is an important feature of wireless standards for facilitating the mobility...
The usage of electronic payment in Indonesia shows a remarkable growth, especially on micro payment. However, the existing systems cannot be interchangeable and each system used their proprietary device. This condition leads to inefficiency at the user. In this paper, we propose an integrated electronic payment system. The system use e-cash that can exchanged between multiple banks. It also can support...
PLC is the acronym for ??PowerLine Communication?? and means data communications via power wiring. PLC was initially used for tele-protection and tele-monitoring of electrical substations by means of high voltage power lines, in order to avoid costs of microwave or fiber optic links. More recently, PLC has been also adopted for automatic smart metering. However, only with the advent of low-cost digital...
The absence of a commonly adopted performance evaluation framework is hampering advances in the design of effective video trackers. In this paper, we present a single-score evaluation measure and a protocol to objectively compare trackers. The proposed measure evaluates tracking accuracy and failure, and combines them for both summative and formative performance assessment. The proposed protocol is...
Coverage of formal property specifications has important ramifications in design verification. Mutation coverage, a well studied approach towards specification coverage, checks whether the specification fails in the presence of a fault. Existing mutation coverage methods are broadly divided into those which inject the fault into a given implementation and those which inject the fault directly into...
OpenFlow is the most promising architecture for future Software Defined Networks (SDNs). However, from the aspects of large-scale or carrier-grade networks, it still lacks some key components. For example, QoS (Quality of Service) provisioning is an indispensable part of such production networks. During the evolution of the OpenFlow standard, some QoS capabilities have been added to the protocol,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.