The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Edge-computing is one of the most promising techniques to leverage the excess capacity that exists at users' premises. Unfortunately, it may be vulnerable to free-riding, i.e., To nodes that attempt to benefit from the infrastructure without providing any service in return. In this short paper we address free-riding in the context of edge-assisted streaming and propose the use of carefully crafted...
Wireless Sensor Network is collection of sensor nodes which consist of sensing device, storage device, processing unit and antenna. These nodes may be placed in difficult physical environment for sensing an event, collecting data, processing data and forwarding it using wireless network to the sink, where data can be stored, processed and analyzed. Animal monitoring, Building monitoring and other...
Underwater sensor networks are gaining prominence in various applications of underwater monitoring and resource explorations. The minimum energy routing algorithms [2] are implemented in underwater oil resource explorations. The topologies already in use are wired where all sensor nodes behave as coordinator, except the PAN coordinator. This may increase the depletion of battery energy, and cost of...
Though current workflow systems, known as the major task managing tool in data-center, use UNIX-based user/group authorization mechanisms to defend unauthorized operations, the information in workflow systems, such as DAG (Directed Acyclic Graph), could be easily exposed to any user-level malicious monitor. In this paper, we propose a type of side channel attack to data-center workflow information...
Wireless Mesh Network (WMN) is developed as an emerging key solution for wireless broadband connectivity through a flexible and cost-effective way. However, due to the lack of a physical line of defense, the security in such a network is a big concern. Intrusion Detection System (IDS) is considered as one of the most effective security mechanisms in WMN. Traditionally, IDS is operated on the monitor...
Seawater hydraulic system which are environmentally compatible with automatic pressure compensation are suitable for working in deapsea water and maintaining the marine environment. In this paper, Seawater hydraulic system structure will be converted into complex network model. According to basic parameters in complex network theory, complex network model of seawater hydraulic systems are constructed...
Recent advances in low power networked embedded systems and electrochemical/optical water quality sensors have enabled the generation of low-cost, low-power water quality sensor nodes. These sensor nodes leverage the idea of wireless sensor networks for water quality monitoring in drinking water distribution systems, where large numbers of spatially distributed sensor nodes operate cooperatively to...
In this paper, semi-decentralized sliding mode observers are designed for a network of homogeneous linear time invariant dynamical systems, represented in terms of a graph based on relative information. The proposed sliding mode observers reconstruct actuator faults occurring at the node itself as well as in the closed neighbourhood node set. Two distinct observer frameworks are proposed. In the first...
Real time monitoring and control of wind power farms (WPFs) require a high reliable communication network infrastructure. The WPFs monitoring and control can be guaranteed through the communication network by using redundant resources and quality of service (QoS) for different applications. In this paper, we study and simulate resilient network architecture for monitoring and control WPFs. The communication...
In this paper, an I–V tracer which operates autonomously, with no need to be disconnected from its load, will be discussed. The current state of I–V tracers commercially available will be discussed and motivation will be provided for the online autonomous I–V tracer. Design of such an I–V tracer using the single-ended primary inductance converter (SEPIC) will be discussed, and simulation results of...
Cloud computing is a groundbreaking solution to acquire computational resources on demand. To deliver high quality cloud services and provide features such as reduced costs and availability to customers, a cloud, like any other computational system, needs to be properly managed in accordance with its characteristics (e.g., scalability, elasticity, timeliness). In this scenario, cloud monitoring is...
Fog computing is rapidly changing the distributed computing landscape by extending the Cloud computing paradigm to include wide-spread resources located at the network edges. This diffused infrastructure is well suited for the implementation of data stream processing (DSP) applications, by possibly exploiting local computing resources. Storm is an open source, scalable, and fault-tolerant DSP system...
Considering the growth of customers craving for complex services like IPTV, cloud storage, and online gaming, traditional networking is quickly becoming an obsolete technology. The new networking paradigm, Software Defined Networking (SDN), in combination with the recent communication protocol, OpenFlow, brings a new perspective to the operator and cloud provider's core networks by providing new autonomous...
Surgical Site Infection (SSI) imposes a significant burden clinically and compromises patient recovery. Anastomosis in the gastrointestinal (GI) tract is a particularly challenging case where failure of the anastomosis can lead to leakage, resulting in an increase in mortality rates. However early diagnosis and intervention are hampered by a lack of continuous sensing and long diagnostic intervals...
In the course of increasing the production flexibility and dynamics, the replacement of wired industrial monitoring and control systems by wireless solutions is ongoing. To offer a similar degree of reliability as wired solutions, the IEEE 802.15.4e, targeting factory automation, defines the Time Slotted Channel Hopping (TSCH) mechanism. It appears promising to reach a timely, reliable and energy...
The success achieved by Cloud Computing Services (CCSs) in modern IT scenarios is nowadays a matter of fact and service offerings between providers and customers continuously grow up and widen their scope. Similarly, service offerings are more and more based upon dynamic reservation and allocation of network, storage and computational resources, the hiding of visibility of internal IT components,...
Agent based techniques are used to coordinate demand and supply for increasing the embedding capacity of dispersed, badly predictable, renewable energy based power systems. VPPs (Virtual Power Plants) using this technology have demonstrated their feasibility in field tests and currently are scaled up to satisfy requirements for massive rollout [1]. These agent-based VPPs mostly are used in normal...
Cloud computing services are seeing great success in IT scenarios. Dynamic reservation and allocation of network, storage and computational resources, the hiding of visibility of internal IT components, as well as the pay-per-use paradigm are nowadays more and more widespread ways to provide and consume services. Their complexity, however, is clearly visible in composing services to satisfy users'...
Network resource measurement is a key functionality for large scale network management. Intelligent, network-aware applications may benefit from access to detailed representations of network resources, including multi-layer topologies and real-time traffic measurement, and shared resources may obtain better overall utilization by identifying performance bottlenecks. In this study, we describe a network...
Colored Petri nets are widely used to model Automated Manufacturing Systems thanks to their compactness to describe complex networked systems. Compared to general Petri nets, they allow many folding techniques so as to condense the system model. With them, many control synthesis problems are reduced to the solution of matrix operations. Supervisory control techniques can be realized in a computationally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.