The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new, highly scalable analytical model of the electronic-and-optical routing and grooming process that accurately reproduces and explains recent results for the numerical optimization of transponder count in networks with quasi-static uniform and random traffic.
Vehicular Ad Hoc Networks (VANET) is a variant of Mobile Ad Hoc Networks (MANET) in which communication nodes are mainly vehicles. VANETs are heterogeneous networks which provide wireless communication among vehicles and vehicle to Road Side Units (RSU). Now-a-days, it has become an interesting area of research as it is intended to improve Intelligent Transport System (ITS). To exploit effective communication...
With the extensive use of sensor-embedded smart phones, Location-Based Social Networks (LBSN) become more and more popular among online social networks in recent years. In social networks, constructing the shortest path with minimum cost between any two nodes efficiently is vital for both graph analysis and implementation of applications. This is well known as the routing problem in social networks...
Reorder buffers are often needed in multi-path routing networks-on-chips (NoCs) to guarantee in-order packet delivery. However, the buffer sizes are usually over-dimensioned, due to lack of worst-case analysis, leading to unnecessary larger area overhead. Based on network calculus, we propose an analysis framework for the worst-case reorder buffer size in multi-path minimal routing NoCs. Experiments...
Opportunistic Routing (OR) takes advantage of the broadcast nature of the wireless medium to increase reliability in communications. Instead of selecting one node as the next-hop forwarder, OR selects a set of candidates to forward the packet. In this way, if one of them does not receive the packet from the source, another candidate will be able to do it, this avoids the need forare-transmission from...
Any path routing has been proposed as a new routing paradigm for enhancing the performance of Wireless Mesh Networks (WMNs) by exploiting the inherent broadcasting and spatial diversity properties of a wireless medium. This routing paradigm is based on a MAC protocol which provides an any cast transmission capability and therefore allows each node to send its packets to any candidate neighboring node...
Delay Tolerant Networks (DTN) has been proposed to provide communication between nodes where they are intermittently connected. In this situation, a new routing approach, store-carry-forward, is used to deliver data between source and destination. Even though long delay is acceptable in DTN, however some applications occasionally require predetermined bounded delay. To meet this requirement, some...
UW Health (the integrated health system at the University of Wisconsin, Madison, WI) has been engaged in a multi-year initiative to transform the primary care delivery system. In support of the redesign, discrete event simulation models are developed to analyze the patient flows of pediatric care processes with complex interactions among patients, care providers, and other resources. Using the simulation...
The most important thing to workflow management is modeling business processes. It can ensure the correctness after model is put to use only when efficient modeling technology is used to build complex business processes. On the one hand the readability of model represented can be improved on the other hand it is convenient to the model performance analysis. This paper points out that the strict semantic...
Wireless Sensor Networks (WSNs) have their profound applications almost in all possible fields to facilitate automation. All WSNs contain low powered nodes for sensing information about the environmental conditions and incessant reporting to the base station. Security is a very essential and critical criterion for communication. The nodes must be trust worthy and believable for routing sensed information...
Network on Chip (NoC) is a sophisticated communication infrastructure that provides quality of service (QoS) guarantees for a complex Systems-on-Chip (SoC) application. Some applications demand guaranteed end-to-end latency. Mapping algorithms are used to map an application on an NoC to satisfy the bandwidth constraints and end-to-end latency requirements. The design of the mapping algorithms determines...
The problem of choosing the route providing the best communication opportunities among the available routes is particularly challenging in self-organizing Cognitive Radio networks, since the communication opportunities are deeply affected by the primary-user (PU) activity. Furthermore, whenever the route selection exploits proactively acquired information on the PU activity, routing update packets...
The diagnosis-stage is always the bottleneck stage for the normal arriving patient flow and the referral patient flow influx in Outpatient Department (OD) in Chinese hospital. And the referral patient has high-priority than the normal arriving patient in general. How to minimize the referral patients mean waiting time and meanwhile keeping the normal patients queue stable? Around the goal a general...
Managing power by means of architectural optimization has emerged as one of the most important FPGA-based design challenges. In this paper, we present an analytical model to estimate the dynamic and leakage power for a wide variety of FPGA architectures. The proposed power model has been integrated into the Geometric Programming framework in order to investigate the impact of various architectural...
Reliable dissemination of data in mobile ad hoc network necessitates high degree of connectivity among the nodes present in that environment. The existence of selfish nodes could drastically affect the network connectivity. However, the impact of selfish nodes on network connectivity has been studied either through reputation factor computed based on past history or conditional probability manipulated...
In this paper, a scalable mobility-aware pheromone termite (PT) analytical model is proposed to provide robust and faster routing for improved throughput and minimum latency in Wireless Sensor Networks (WSNs). PT also provides support for the network scalability and mobility of the nodes. The monitoring process of PT analytical model is based on two different parameters: packet generation rate and...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
The precision farming techniques provide favorable conditions to grow money crops like capsicum, nursery plants in a temperature and humidity controlled fashion. Wireless sensor networks (WSN) can be used for automatic monitoring and control of soil humidity and temperature inside the green house. The Contiki OS with routing protocol implementation as per IETF specifications, is better choice for...
Network-on-Chip (NoC) is the most promising communication architecture for modern System-on-Chip (SoC). A system level analysis with a sound NoC model may provide an efficient NoC implementation. In this paper, we propose an accurate NoC model for performance evaluation based on Timed and Colored Petri Net (TCPN). The TCPN provides a detailed modeling of discrete event systems, enabling further evaluation...
A Mobile ad-hoc network (MANET) is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to this it is vulnerable to various kinds of security threats. Black hole attack is one of such threats. This paper lead emphasis on AODV routing protocol in MANET, along with various types of security attacks and security threats...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.