The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The web-based Go-Smart environment is a scalable system that allows the prediction of minimally invasive cancer treatment. Interventional radiologists create a patient-specific 3D model by semi-automatic segmentation and registration of pre-interventional CT (Computed Tomography) and/or MRI (Magnetic Resonance Imaging) images in a 2D/3D browser environment. This model is used to compare patient-specific...
In this paper, we describe the RobinHeart surgery robot development related project in which entire robot operation is supposedly done remotely, using wide area network connection. In such environment, any vision and telemanipulation data packets are subject to delay, limitations, issues and failures, as any network connections do. It has become necessary to create an internetwork emulation for the...
This paper proposed a novel algorithm to analyze the evolution of regional collaborative innovation systems from the complex network perspective. At first, we illustrate the structure of collaborative networks, which contains several elements. And we found out the system could be regarded as a complex network. As to the evolution algorithm we proposed, in order to match the actual situation, each...
Advances in multimedia and network technology enables to stream UHD video over public Internet. However, previous congestion control schemes have several limitations to guarantee the quality of UHD video streaming. The sluggish behavior of congestion control scheme disturbs the rapid increase in video quality. Another problem is burst packet losses caused by overshooting of transmission rate. These...
As the network is being evolved towards the content-centric network and the content itself is more focused rather than the host, a new paradigm called content-centric networking (CCN) is being considered for the Future Internet. Because the traffic in the Internet and wireless network has been increasing rapidly due to the continued proliferation of mobile devices, it is important to minimize the...
In this paper, we propose CGM-PS, a partial-decentralized, un-starving, work-conservative, and preemptive coflow scheduling scheme to shorten the Coflow Completion Time (CCT) for TCP flows in data center networks (DCNs). In CGMPS, we propose both inter- and intra- coflow scheduling policies. In inter-coflow scheduling, we present P-SEBF, which adopts a connected-graph model based novel concept Partialcoflow,...
In this paper, we focus on the topic of construction of multicast trees in overlay networks. Moreover, we address our problem with the survivability assumptions and propose several scenarios that can be applied to provide the required protection. We perform numerical experiments to compare proposed survivability scenarios and investigate the problem of providing survivability to both static and dynamic...
Evolution of information technologies and increased automation of manufacturing processes allow organizing the control of remote dynamic objects at real-time operation mode. The application of web-technology for organization of human machine interface makes it possible to conduct data-processing via local network and Internet. This paper is devoted to processes of identification of dynamic properties...
Information-centric networking (ICN) is suggested by many papers and research projects to improve network performance and enhance network resource efficiency in recent years. Moreover, in these researches, some researchers not only proposed their ideal ICN approaches but also modified the existing cache replacement mechanism to fit their ICN approaches. In this paper, we aim at investigating and quantifying...
Smart phones are ubiquitous nowadays and have taken over the bulk data transfers in mobile networks. The next generation phones are even more powerful to handle voice, video and data catering real time multimedia experience. Unfortunately, the increase in service provider capacity has not kept up with the user demand for more bandwidth. It is becoming very expensive for service providers to cater...
Much has been written on how the increase of connectivity through the internet and other media has facilitated successful changes in government such as the Arab Spring. However, regime change, even when essentially peaceful, occurs in a dynamically complex environment that renders often counterintuitive results. For example, when a government falls to an insurgency (peaceful or otherwise), the establishment...
Virus is a traditional and serious threat of the Internet. The spread of a virus and the containment of the spread can be generalized in an abstraction of a two-side problem in which one side tries to spread the infection as much as possible while the other side tries to detect and limit the spread. Two parameters play an important role: (1) the probability of a successful infection, (2) the probability...
Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on the Internet. Differently from previous attacks, many recent DDoS attacks have not been carried out over the network layer, but over the application layer. The main difference is that in the latter, an attacker can target a particular application of the server, while leaving the remaining applications...
This paper presents a congestion controller in Internet, which is based on a discrete-time state space model with uncertainties, time-varying state and input delays and nonlinear disturbance. The controller is designed via robust H∞ control approach. Simulation results are given to show the effectiveness of the proposed controller.
Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible for its own behaviors so that the entity is part of larger chains of the system's accountability. In this paper, we propose designs of a multiresolution flow-net scheme to achieve...
This paper deals with obtaining the meteorological data (temperature, wind speed, wind direction, clouds coverage, sun rise, sun set) from the internet weather servers through free weather API functions in XML format. Together with stored operational data (traffic intensity, traffic speed, opacity, CO level…) from the existing tunnel are this data sent into the PLC based tunnel simulator through external...
Due to the in-network caching capability, Content-Centric Networking (CCN) has emerged as one of the most promising architectures for the diffusion of contents over the Internet. In this paper, we propose an energy-efficient distributed in-network caching scheme for CCN. In the proposed scheme, each content router only needs locally available information to make caching decisions considering both...
In this paper, we evaluate privacy preservation capability of biometric hashing methods. Although there are some work on privacy evaluation of biometric template protection methods in the literature, they fail to cover all biometric template protection methods. To the best of our knowledge, there is no work on privacy metrics and assessment for biometric hashing methods. We use several metrics under...
In the last few years, the research community has witnessed the rapid development of the Information-Centric Networking (ICN) approach aiming at evolving the Internet from today's host based packet delivery towards directly retrieving information in a secure, reliable, scalable, and efficient way. The Internet of Things (IoT) concept envisions scenarios in which “smart objects” can be interconnected...
In VANET, nodes move at high speed and change connecting network frequently. As a consequence, IP duplication may occur and packets would not be sent to the correct destination. This paper aims at reducing the size of location information in duplicate address detection (DAD) scheme. We propose a grid-based duplicate address detection (GDAD) scheme and separate network into several grids, where the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.