The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates...
In the traditional Publish/Subscribe (Pub/Sub) paradigm, most of the responsibilities lie with the broker, thus making it burdened. It also takes a considerable amount of time to first route the publications and subscriptions towards the broker, and then to further route the notifications to the subscribers. This leads to delays in data delivery. Besides delay and bandwidth consumption, the number...
Communications Operations Procedure-1(COP-1) is widely used for reliable transmission of telecommand data for space missions. This paper focuses on the delay performance of COP-1 protocol over long and lossy link. The typical work conditions and process are studied combined with the characters of both the link and the transmission task. Based on the analysis of the procedure, the quantificational...
We propose an asynchronous, decentralized algorithm for consensus optimization. The algorithm runs over a network of agents, where the agents perform local computation and communicate with neighbors. We design the algorithm so that the agents can compute and communicate independently at different times and for different durations. This reduces the waiting time for the slowest agent or longest communication...
This article considers the problem of constructing an adaptive control system for nonlinear priori uncertain dynamic object with statement delay and relative order greater than one. As methods of solving the hyperstability criterion and high-speed self-tuning correction unit are used.
In this paper, we present a delay-optimal packet scheduler for processing the M2M uplink traffic at the M2M application server (AS). Due to the delay-heterogeneity in uplink traffic, we classify it broadly into delay-tolerant and delay-sensitive traffic. We then map the diverse delay requirements of each class to sigmoidal functions of packet delay and formulate a utility-maximization problem that...
Vehicular ad-hoc network (VANET) is an integral component of intelligent transportation systems (ITS). Due to frequent speed variations of vehicles, network formation and deformation is very frequent. Furthermore, for safety applications, we wish to create the communication without any delay or collision. Therefore, communication among the vehicles is even more challenging. D-LAR (Directional-Location...
Mobile adhoc networks are composed of anticipating nodes which forward data to each other. They are organised in temporary topology. In such a network Quality of service is of prime importance. Delay is essential metric of QoS. E2E delay depends on many important variables such as path length, hop count, mobility of nodes, intervention from other neighbors, bandwidth and past values of delay etc....
Topology control is one of the key technologies in ad hoc network. Recently some topology control algorithms focus on reducing the end-to-end delay have been proposed. However, they do not consider the delay which is caused by contending for the shared channel and collision at MAC layer. In this paper, we put forward a new delay model to character the link delay which is composed by the transmission...
In Wireless Sensor Network (WSN) applications such as environment monitoring, building monitoring, etc., sensor nodes collect data and send it to the base stations or sinks for analysis. As the networks grow in scale, it necessitates using multiple sinks in the network. In here, throughput capacity and the average delay of WSN with multiple sinks, which are two main quantity of interest, has been...
Traditional IP networks are becoming more complex to satisfy the demands of modern applications and it draws communication providers to exploit a wide range of specialized hardware. Commissioning of a new network service implies additional room for new equipment, power sources, cooling systems, etc. Besides, there is need for increase of qualified stuff. This results in the escalation of capital and...
WiFi networks have becoming popular in the past decade to provide network access due to its inexpensive but high-bandwidth infrastructure. With the increasingly dense WiFi deployment and the rapid proliferation of network devices and applications, the demand for more bandwidth, constrained delay performance and less power consumption is soaring; however, the traditional WiFi networks have become incapable...
Ultra-Dense Network (UDN) is a promising technology to cope with explosively increasing traffic demands. Delay is an important performance indicator in UDN. In this paper, we analyze the impacts of average sleeping time of BS and association radius on the mean delay in UDN. The explicit relationship between delay and the average sleeping time and association radius is presented. An M/G/1/N processor...
Power is a major issue in today's system on chip design at deep submicron. It is very important to control power dissipation in cache memories because 70 % of chip area is covered by memory in microprocessors. Various low power circuits are proposed in the past for volatile memories to alleviate the problem of power dissipation. However in today's era nonvolatile SRAMs (NVSRAMs) are being proposed...
In wireless adhoc network, important issue is connectivity between nodes & establishment of link. There are many parameters which influences packet delivery ratio, throughput & energy of a node but it has strong dependency on distance between the nodes & their placement. For commercial wireless network uniform distribution of nodes are impractical but implementing connectivity of non-uniform...
ITU-T H.264/MPEG-4 Scalable Video Coding (H.264/SVC) is one of popular video coding standard after H.264/MPEG-4 Advanced Video Coding (H.264/AVC) which was created by Joint Video Team (JVT) between Video Coding Expert Group (VCEG) ITU-T and Moving Picture Expert Group (MPEG) ISO/IEC. This standard allows video coding using single layer or more ones to provide the scalability of the coded video.
This paper will discuss about transmission of multimedia content in limited capacity network (up to 5 Mbps), especially to study about the impact of background traffic towards multimedia content delivery quality in a limited capacity network. Observation methods proposed in the study include measurement of limited capacity network, background traffic modeling, and simulating the network to observe...
Interconnects are integral part in the chip design which plays a major role in circuit performance in DSM technology. Due to the presence of parasitic such as Resistance, Capacitance components, signal degradation and delayed problems may occur. Now days because of technological advances, number of nodes increasing in circuits, there by introducing more parasitic in multi nodes which will effect on...
Cognitive Radio ad hoc network is a sort of wireless network. Cognitive radios have the ability to sense the wireless medium. Routing is the major research area and ensuring quality-of-service (QoS) is a challenging problem. This paper proposes a neighbor node discovery mechanism based delay aware routing protocol in order to provide QoS in such network. Primary QoS metrics such as throughput and...
Scanning attack is usually the precursory step to attack a network by which adversaries gather significant information of the network and employ it to discover the vulnerabilities and save their precious time. Recently, researchers have proved that adversaries can scan a SDN network utilizing packets response time difference. In this paper, a probability-based delay scheme is introduced to combat...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.