The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper compares congestion controls of Multi-Path TCP (MPTCP) from a view point of Quality of Experience for Web services (Web-QoE) under heterogeneous environment; it assesses Web-QoE by experiments with subjects. The authors treat the four controls (LIA, OLIA, BALIA, WVEGAS) and evaluate Web-QoE by using Web usability. In addition to QoE, they also measure QoS and fairness. Their experiments...
Mobile communication service is widely penetrating to all the society as the key infrastructure. It is spreading beyond the conventional telephone service. Wide variety of social services including e-commerce, e-bank, navigation, location, healthcare, and education are offered on the network. It's not too much to say that people can never part with a smartphone as the most frequently use interface...
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
With the advancement in energy harvesting in terms of wireless charging techniques, it provides a novel way to solve traditional energy constraint problems in Wireless Sensor Networks (WSNs). Renewable energy such as solar, wind, and geo-thermal energy is converted to energy-storage and further use via harvest-then-transmit strategy. This article introduces a two-layer sleep scheduling system in energy-harvesting...
File transfers between the decentralized storage sites over dedicated wide-area connections are becoming increasingly important in high-performance computing and big data scenarios. Designing such scientific workflows for large file transfers is extremely challenging as they depend on the file, I/O, host, and local- and wide-area network subsystems, and their interactions. To gain insights into file-transfer...
Applying network coding and opportunistic routing can significantly improve the throughput performance of wireless multi-hop networks, but a mismatch problem still exists among the upper flow rate, routing and lower transmission resource scheduling. This paper models the throughput optimization as a network utility function maximization in wireless multi-hop networks. By applying Lagrangian dual decomposition...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
This paper briefly introduces the Command Query Responsibility Segregation (CQRS) and discusses the performance of the architecture. The pattern is separated from the business by modifying the behavior of modifying (adding, deleting, modifying the system state) and querying (without modifying the system state), making the logic clearer and easier to target different parts Optimization, and finally...
This paper introduces a new innovation for the analytical model to improve the throughput performance and energy efficiency for ideal channel conditions by the integration which challenges both fountain code and Markov chain modeling. In this context, the energy consumption is a critical resource that can be saved by minimizing the number of transmissions to be performed in the network. Channel contention...
Polar codes are a family of error correcting codes that achieves the symmetric capacity of memoryless channels when the code length N tends to infinity. However, moderate code lengths are required in most of wireless digital applications to limit the decoding latency. In some other applications, such as optical communications or quantum key distribution, the latency introduced by very long codes is...
LDPC codes are a family of error correcting codes used in most modern digital communication standards even in future 3GPP 5G standard. Thanks to their high processing power and their parallelization capabilities, prevailing multi-core and many-core devices facilitate real-time implementations of digital communication systems, which were previously implemented on dedicated hardware targets. Through...
Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance...
This paper presents the design and prototyping of hardware and software to address the problem of rapid and reliable 3D digitization of very large collections of pinned insects. Using the collection at the Field Museum of Natural History (FMNH) as a use case, a pipeline to ingest the entire collection of 4.5 million specimens in circa 1-2 years imposes a few second limit on average processing time...
Millimeter wave (mmWave) communication is a key enabling technology for 5G cellular systems. However, due to mmWave propagation characteristics, link length for very high rates is limited and will likely necessitate the use of relay nodes for longer-range ultra-high-speed backhaul communications. This paper investigates relay selection and scheduling to support high end-to-end throughput in mmWave...
Millimeter-wave communication in 60 GHz band is considered a promising technology to meet the explosive growth of data demand in Wi-Fi based WLAN. To address potential blockage for 60 GHz signals, multiple APs are proposed for such WLAN. This paper addresses the important problem of AP assignment and transmission scheduling for a multi-AP 60 GHz WLAN. We propose two AP assignment schemes with different...
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
This paper proposes the algorithms for optimization of Remote Core Locking (RCL) synchronization method in multithreaded programs. The algorithm of initialization of RCL-locks and the algorithms for threads affinity optimization are developed. The algorithms consider the structures of hierarchical computer systems and non-uniform memory access (NUMA) to minimize execution time of RCL-programs. The...
High fluctuation of signal strength is evident in wireless channel under mobile environment. IEEE 802.11n and IEEE 802.11ac based wireless technologies experience a challenge for selecting link configuration parameters, like number of spatial streams, channel bonding, advanced modulation and coding schemes, frame aggregation etc., dynamically under mobility. Selection of the best possible data rate...
This paper proposes a new configuration of a single-phase hybrid inverter with an integrated battery energy storage, which is suitable for residential households to maximize local consumption of solar energy and thus reduce dependency on grid support. The hybrid inverter is called Direct Storage Hybrid (DSH) Inverter. A transformer-less topology such as HERIC, operating at low frequency to generate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.