The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A delay-SRLG constrained, path protection is proposed to encourage paths of different connections to wake up their common sleeping nodes. Simulations show superiority in maximizing the sleep of nodes while obtaining satisfactory blocking probability.
In order to improve the throughput and transmission reliability in wireless sensor network with limited resources, multicast network coding technology is imported in. On this basis, through random linear network coding by nodes' cooperation to make improvement in delayed and expense. The simulation results show that the transmission, to the opportunity routing, by cooperation network coding strategies...
the increased use of virtual connections in packet switched networks, in particular over the Internet, using MPLS and GMPLS evolution has produced a significant amount of studies on traffic engineering protocols, especially with regard to the different ways to provide quality of service over connections. This article presents a model to characterize the reliability of these types of networks, in computing...
This paper gives out a survey on event monitoring in Event-driven wireless sensor networks (EWSNs). In EWSNs, there are mainly two tasks, one is accurate event detection with higher detection probability and lower false-alarm probability. The other is reliable dissemination of the event information after accurate detection. In this paper, we firstly address the design issues for event detection and...
Vehicular ad hoc networks (VANETs) are a highly mobile wireless ad hoc networks that are targeted to support vehicular safety, traffic monitoring, and other applications. VANET applications are inherently broadcast oriented and require communication protocols to be reliable and scalable. Simple broadcast flooding satisfies these requirements, but its performance is highly dependent on network density...
IEEE- and ASTM-adopted Dedicated Short Range Communications (DSRC) vehicle safety-related communication services, which require reliable and fast message delivery, usually demand broadcast communications in vehicular ad hoc networks (VANETs). In this paper, we propose and justify a distributive robust scheme for DSRC one-hop safety-critical services. The new scheme enhances broadcast reliability using...
Several automobile manufacturers are offering assisted driving systems that use sensors to automatically brake automobiles to avoid collisions. Before extensively deploying these systems, we should determine how they will affect highway capacity. The goal of this paper is to compare the highway capacity when using sensors alone and when using sensors and vehicle-to-vehicle communication. To achieve...
In a wireless multi-hop network between a source node (S) and a destination node (D), multipath routing in which S redundantly sends the same packets to D through multiple routes at the same time is effective for enhancing the reliability of the wireless data transmission by means of route diversity. However, when applying the multipath routing to a factory where huge robots are moving around, if...
Wireless Body Area Networks (WBANs) offer tremendous benefits for remote health monitoring and real-time patient care. However, the success of such a system would primarily depend on the reliability of the data transmitted by the WBAN. Two aspects of data reliability need to be considered, namely, data accuracy and data freshness (or, recentness of data). Assuming that the sophistication of the sensors...
The Sub Bytes (S-boxes) is the only non-linear transformation in the encryption of the Advanced Encryption Standard (AES), occupying more than half of its hardware implementation resources. One important required aspect of the hardware architectures of the S-boxes is the reliability of their implementations. This can be compromised by occurrence of internal faults or intrusion of the attackers. In...
Using multipath routing protocols results in more efficient data transmission than single path routing protocols in Wireless Multimedia Sensor Networks (WMSNs). In this paper, we propose a new mechanism for improving video transmission over WMSN based on packet, path and queue priority scheduling over multipath routing protocol. We assume that network has high CBR (Constant Bit Rate) traffic with...
Breadcrumb systems (BCS) aid first responders by communicating their physiological parameters to remotely located base stations. However, state-of-the-art research only focuses on deploying breadcrumb systems on the assumption of uncoordinated users, which is inefficient. In this paper, we present the first design, implementation, and evaluation of reliable multiuser breadcrumb systems (MUBCS) which...
Wireless Access in Vehicular Environments (WAVE) protocol stack is the most important protocol used to allocate spectrum for vehicular communication. The capabilities of WAVE to provide reliable exchange of safety information are questionable. In a previous work, we suggested a system that employs cognitive networks principles to increase the spectrum allocated to the control channel (CCH) by the...
We propose a new scheme for reliable transport, both for unicast and multicast flows, in Delay Tolerant Networks (DTNs). Reliability is ensured through the use of Global Selective ACKnowledgements (G-SACKs) which contain detailed (and potentially global) information about the receipt of packets at all the destinations. The motivation for using G-SACKs comes from the observation that one should take...
Faster-than-at-speed testing is an effective approach to screen small delay defects (SDDs) and increase test quality and in-field reliability. This paper presents a novel framework of faster-than-at-speed test to minimize the slack of the sensitized path for each fault. The basic strategy is to use multiple faster-than-at-speed test timings with endpoint masking for each pattern. By performing a detailed...
Today's multi-media electronic era is driven by the increasing demand for small multifunctional devices able to support diverse services. Unfortunately, the high levels of transistor integration and performance required by such devices lead to an unprecedented increase of on-chip power that significantly limits the battery lifetime and even poses reliability concerns. Several techniques have been...
Broadcast is an important building block in ad hoc networks. Its challenge is to deliver a message to all nodes in the network for a reasonable cost in terms of message load and delay. Several context-aware broadcasting protocols have been proposed in order to meet this challenge, using location or proximity information in order to fine-tune retransmission decisions. However, existing protocols often...
This paper proposes a Numeral-Based Crosstalk Avoidance Coding (NB-CAC) to protect communication channels of Network-on-Chips (NoCs) against crosstalk faults. The NB-CAC scheme produces code words without bit patterns '101' and '010' to eliminate harmful transition patterns from NoC channels. This is done by the use of a new numeral system proposed in the paper. Using the proposed numeral system,...
Devadas has first proposed the notion of Silicon Physical Unclonable Function (sPUF), which takes advantage of delay variations of wires and gates. A Ring-Oscillator-Based PUF (RO PUF) is one possible implementation of an sPUF. One disadvantage of RO PUFs is that they require one pair of ring oscillators per bit of output. Therefore, in order to collect enough output bits for a safe security level,...
This paper proposes a reliable an energy efficient routing protocol for transmitting periodic packets on industrial wireless sensor networks. For reliable transmission of periodic packets, the proposed protocol chooses the path has highest end-to-end packet reception rate (e2e_PRR) to transmit data packets. Also, a mechanism is used to reduce the number of control packets. The simulation result has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.