The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Present research work propose the design of a low energy and high throughput, hierarchical clustering based routing protocol for smart home sensor network application. Proposed protocol perform dynamic cluster head selection based on multiple node characteristics like node residual energy, node distance from sink and node average distance from neighbour nodes. Cluster head distribution is even and...
This work proposes a parallel cloud-to-cloud data transfer method in which intermediate nodes are spawned and utilized in order to increase the transfer throughput by aggregating bandwidth. Existing data transfer methods do not take advantage of public cloud elasticity — the maximum throughput is limited by the available bandwidth of the source or/and destination transfer node. In this paper, a technique...
This paper introduces a new innovation for the analytical model to improve the throughput performance and energy efficiency for ideal channel conditions by the integration which challenges both fountain code and Markov chain modeling. In this context, the energy consumption is a critical resource that can be saved by minimizing the number of transmissions to be performed in the network. Channel contention...
Penetration of multimedia communications with mobile Wi-Fi and tethering requires wireless LANs (WLANs) to guarantee a specific bandwidth in densely deployed WLANs. IEEE802.11e (HCCA) with 802.11aa could use inefficiently radio frequency as well as fail to provide each WLAN with enough CFP period in which sending opportunity of a terminal is guaranteed. To guarantee a specific bandwidth even in densely...
Cognitive radio networks (CRNs) enable secondary users (SU) to make use of licensed spectrum without interfering with the signal generated by primary users (PUs). To avoid such interference, the SU is required to sense the medium for a period of time and eventually use it only if the band is perceived to be idle. In this context, the encryption process is carried out for the SU requests prior to their...
Here we study the shape, size, and merging pattern of the area following the toll barrier, from the five aspects including the accident prevention, throughput, cost, service time and passing capacity. We build the corresponding model of the new single-in and double_out toll station to measure the optimal solution of the toll plaza on the basis of a series of methods such as the factor analysis, principal...
The computer modeling system of industrial extruders with adjustable configuration has been developed allowing solving control tasks of multi-assortment polymeric film quality under change-over of production lines on new assignments and under product manufacture. The system includes module for extruder mark choice, module for extruder configuration design, module for calculation of geometrical parameters...
To improve the performances of wireless sensor network (WSN) and its lifetime, the management of power consumption and the energy harvesting is crucial. In this paper, we propose an energy-harvested management mechanism (EH2M) for WSN, in order to minimize the duty-cycle on the basis of the present amount remaining energy. With EH2M, each sensor node can adjust its duty-cycle dynamically by computing...
The performance of an FPGA based CNN accelerator is determined by both parallelism and frequency, however, most prior works optimize the parallelism in the RTL design and resolve the frequency after the synthesis. This paper presents a design space exploration method for the pipeline implementation of the deep CNN models, which concurrently optimizes parallelism and frequency to achieve a comprehensive...
Negotiating service level agreements (SLAs) between cloud consumers and service providers is a key aspect of highly automated cloud systems. However, this process needs to be optimized to reduce the time of negotiation and the quality of solutions. In this paper, a parallel implementation of the particle swarm optimization (PSO) technique is proposed to improve the SLA negotiation in cloud computing...
Multi Criteria Decision Making (MCDM) is useful for choosing a possible objective. The objective is to investigate how far TOPSIS method of MCDM can be utilized for delay sensitive network selection problem. In this paper, TOPSIS method is used for taking decision in delay sensitive network selection for achieving reliability of network selection with Wireless Body Area Network (WBAN) parameters;...
Energy consumption problem is considered an extremely important problem that faces the Wireless Sensor Networks (WSNs). For this reason, a lot of efficient energy protocols have been developed in order to reduce the energy consumption, as well as to prolong the lifetime of the sensor networks. The DMHT-LEACH protocol is one of these protocols. It proposes a dynamic technique for facilitating the data...
In most Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, channel estimation is required for equalization and symbol detection. It often exploits the specified pilot symbols consuming not only a large part of the throughput but also significant power resources. This paper quantifies the theoretical maximum power reduction of the transmitted pilots when...
In March 2016, a new protocol called licensed-assisted access (LAA) has been embodied in Release 13 (Rel-13) for Long-Term Evolution (LTE) to operate on unlicensed spectrum and interwork with Wi-Fi. The relevant standards clarify the channel access procedures and contention window (CW) adjustment procedures for LAA. In a long period of time, the coexistence performance of LAA with other technologies,...
The Low Voltage Power Line Communication (LVPLC) MAC protocols are an important influence factor to the network throughput. To solve the problem that the relatively low throughput due to the asymmetric PLC channel influence, we propose an improved adaptive p persistent CSMA protocol to optimize throughput for the finite loads in LVPLC accurate artificial cobweb network. This protocol reduces collision...
This work aims at understanding and evaluating the impact of using different path loss models in the optimization trade-off of small cell (SC) networks. In LTE-A, the more realistic propagation models are the more efficient the radio and network optimization becomes. In this work we compare four urban path loss models: the urban/vehicular and pedestrian test environment from the ITU-R M. 1255 Report...
Harmonious coexistence between LTE with Licensed-Assisted Access (LTE-LAA) and WIFI is a research issue due to deploying LTE to unlicensed spectrum 5GHz. Listen-before-talk (LBT) scheme works as a requisite in unlicensed spectrum to ensure the fairness among different radio access technologies (RATs). To reduce the collision caused by relatively fixed contention window (CW) of LBT scheme and ensure...
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance of slow tasks distribution. Speculative execution (SE) presents a way to deal with Straggling tasks by monitoring the real-time progress of running tasks and replicating potential "Stragglers" on another...
G-TCP represents novel transport protocol designed to be used by Next Generation Networks. It engages famous Fibonacci sequence to calculate congestion window size when the protocol operates in congestion avoidance phase. Modification of window decrease parameter is introduced in order to improve protocol behaviour in high and low speed networks.
This paper develops a control scheme for the multi-gated perimeter traffic flow control problem of urban road networks. The proposed scheme determines optimally distributed input flows (or feasible entrance link green times) for a number of gates located at the periphery of a protected network area. A macroscopic model is employed to describe the traffic dynamics of the protected network. To describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.