The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To carry out the maintenance and analysis of communication networks, the network maintenance personnel must achieve real-time, accurate collection of signaling data of communication network. But the delay in the actual link signaling data transmission process is inevitable. If not take the delay correction will seriously affect the accuracy of the follow-up signaling message handling. This paper presents...
Owing to the popularity of Online Social Media (OSM), Internet users share a lot of information on and across OSM services every day. Users recommend, comment, and forward information they receive from friends, contributing in spreading the information in and across OSM services. We term this information diffusion process from one OSM service to another as Cross-Pollination, and the network formed...
The smart grid is a brand new power system that incorporates power infrastructures with information technologies. In the smart grid, power devices are interconnected to facilitate various intelligent applications via ubiquitous communications between devices. Currently, communications between equipments are mainly enabled by a centralized supervisory control and data acquisition (SCADA) system. An...
Wireless Sensor Networks (WSNs) have proliferated significantly in recent years. Nowadays they are used in many fields, such as military, environmental and industrial. Reliability and low latency are desirable characteristics of many WSN applications. In particular, time-critical WSN applications must be able to act according to the observed changes in the environment as quickly as possible, assuring...
Distributed virtual simulations deployed on shared resources can frequently undergo loss of performance due to external background load, improper placement of simulation entities, or dynamic simulation load changes. The High Level Architecture (HLA) was designed as a solution for coordinating the execution of distributed simulations. Even though this framework offers management services to organize...
Japanese government has limited CO2 emissions and energy consumption for enterprises for these years. Especially, Japanese manufacturing industry have to fight to reduce energy consumption because they consumes a large amount of energy. Meanwhile, productivity must be kept when reducing energy consumption in manufacturing. The paper proposes the method of health monitoring with considering transparent...
The design and optimization of a communication network is a complex task, because it involves a lot of factors. The two most important factors are the network cost and the communications delay. We have tackled this NP-hard multi-objective optimization problem using two metaheuristics not used before: NSGA-II and SPEA-II, demonstrating that SPEA-II offers better results than NSGA-II. In order to facilitate...
In this work we describe a methodology to estimate one-way packet loss from IPFIX or NetFlow flow records collected at two monitoring points. The proposed method does not require tight synchronization between the two monitoring points, nor it relies upon external routing information. It can run online or offline, and can work on legacy IPFIX/NetFlow traces which were not collected for the specific...
Traffic intersections are plenteous in this world we live in, while the efforts to secure them are not. With a little knowledge in the Department of Transportation one could easily take control of an intersection for a period of time without any interference from authorities. In this paper a proposal to encrypt such SDLC and broadband messages shall be described. DES and MD5 prove to be strong solutions...
The delivery of mobile services is traditionally limited to the cellular operator's home domain, except for a small set of standardized services. Due to the centralized nature of service platforms, resource demanding services suffer from long delays if a user is accessing them when roaming. In this paper we describe an architecture that supports a dynamic, distributed service provisioning for mobile...
Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst),...
The increasing development of configurable electronic systems for digital processing of signals from radiation detectors highlights the convenience of having more and more advanced equipment for support design and test of processing architectures from the hardware and firmware point of view. We propose a configurable design and test equipment that is able to emulate the detection process output on...
Wireless sensor networks represent relatively new data collection paradigm that is used for most of the indoor and outdoor data collecting environments. In an indoor factory monitoring environment production lines modification or expansion are necessary over time based on user and system requirements. For any kinds of modification in the production lines sensors addition and/or relocation are necessary...
Mutli-domain monitoring aims at guaranteeing QoS for services crossing several domains. It is often desirable to perform global monitoring to guarantee end-to-end QoS for services across domains and to reduce the monitoring cost. However, global monitoring might be infeasible due to confidentiality constraints. The alternative solution is to perform per-domain monitoring. In this work, we propose...
The energy consumption of ICT infrastructures has increased considerably in the recent years. This has resulted in extensive research on dynamic power management strategies as well as data centre design and placement. The main problem with most of the proposed or existing approaches is that they do not fully take the distributed nature of and strong logical dependencies between executed services into...
Mobile Ad-hoc Networks (MANETs) involve the establishment of wireless connections between mobile nodes, and can dynamically extend the coverage area of wireless local area networks (LAN). For MANETs that use a single channel, the communication performance decreases due to interferences between nodes when frames are being relayed. In this paper, we propose a priority control scheme based on neighbor...
Many algorithms have been proposed in the last decade to detect traffic anomalies in enterprise networks. However, most of these algorithms cannot detect anomalies that occur beyond enterprise boundaries. Anomaly monitoring and detection on end-to-end Internet paths, although important for network operations, is challenging due to lack of access and control over intermediate network devices. In this...
Delay boundary is an important topic for evaluating the service performance of network. In this paper, we focus on the delay boundary of the end-to-end in wireless sensor networks (WSN). We propose stochastic arrive curve model and stochastic service curve model based on stochastic network calculus (SNC), which can be applied to analyze the service performance of WSN. Then we derive the end-to-end...
In this paper we demonstrate the online applicability of the fault detection and diagnosis approach which we previously developed and published in [1]. In our former work we showed that a purely data driven fault detection approach can be successfully built based on monitored inter-component communication data of a robotic system and used for a-posteriori fault detection. Here we propose an extension...
For meeting quality of services, it is proposed the Analytic Hierarchy Process evaluation model with the new generation power information and communication technology (ICT) network in this paper. Firstly, based on the characteristic of the network, the quality evaluation indicators are established and the parameters of the indicators are extracted. Finally the proposed method implements evaluation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.