The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IEEE1588 is a Precise Time Protocol (PTP), which is of potentially wide application in control and measurement networks. Stamping PTP messages accurately in physical layer taking advantage of hardware circuits, it is one of important key technologies to achieve the object of high precision time synchronization of IEEE1588. This paper analyzes the content of IEEE1588 standard in detail, and proposes...
As process technology shrinks, the adaptive leakage power compensation scheme will become more important in realizing high-performance and low-power applications. In order to minimize total active power consumption in digital circuits, one must take into account sub-threshold leakage currents that grow exponentially as technology scales. This describes to predict how dynamic power and sub-threshold...
IPTV video streams have the characteristics of long-lived connection, high bandwidth consumption and delay sensitive. In this paper, we propose a novel point-to-multipoint distribution mechanism for IPTV video network, and it's especially suitable for the edge network which is between access network and end users. A new transport protocol -- Labelcast, is designed and implemented. Label is used to...
This paper presents a coordinated emergency voltage control scheme against long-term voltage instability. It uses a set of distributed controller groups, each controller monitors load voltage in a zone and takes local actions to keep the system voltage stable. Emergency actions are coordinated and optimized with information exchanges between controllers, an action criterion is introduced to avoid...
Service-oriented Architecture (SOA) for sensor network applications aims at providing composable sensor network services supporting functionality within a specific application domain together with tools for service composition, so more complex functionalities can be composed of component services. In a distributed environment, such a scheme works by having a given component service choose other components...
Electric power grid contains three main subsystems, i.e., power generation, power transmission & distribution, and customer facilities. Recently, wireless sensor networks (WSNs) have been considered as a promising technology that can enhance all these three subsystems, making WSNs an important component of the smart grid. However, environmental noise and interference from nonlinear electric power...
The problem of cooperative intrusion detection in resource constrained wireless networks (e.g., adhoc, sensor) is challenging, primarily because of the limited resources available to participating nodes. Although the problem has received some attention from the research community, little is known about the tradeoffs among different objectives, e.g. network performance, power consumption, delay in...
Wireless body sensors combined with ubiquitous Wireless Sensor Networks enable pervasive healthcare applications. This technology can significantly improve the quality of life of chronically ill and elderly. Remote medical monitoring applications consist of many features as continuous medical monitoring, emergency alerts, location tracking and home automation. These heterogeneous systems have to implement...
IP-spoofing attacks remain one of the most damaging attacks in which an attacker replaces the original source IP address with a new one. Using the existing attacking tools to launch IP spoofing attacks, an attacker can now easily compromise access routers and not only the end-hosts. In this paper, we propose a trust-based approach using a Bayesian inference model that evaluates the trustworthiness...
Heterogeneous Chip Multi-Processors (heter-CMP) provide suitable resources to various applications and could get more benefits on performance than homogeneous CMP. To fully develop the performance of the heter-CMP system, the applications should be scheduled to the proper cores by the scheduler of the operating system according to their behaviours. Besides, the last level cache (LLC) miss rate is...
NBTI degradation mechanism is studied for 0.18µm pMOSFETs. Degradation on saturation and linear mode of operations are investigated respectively. To address the controlled delay in between stress cycles which account for the recovery effect, an optimized ID-VG sweep is devised in this work. The optimized ID-VG sweep is found to be able to reduce the recovery effect and it is easily to be implemented...
This paper studies source location anonymity in a large monitoring wireless sensor network with a single data collector, and under a global attack. The qualifier ”global” indicates the capability of the eavesdropper (attacker) to capture all network transmissions, and to discern their time and location. We propose a scheme for generating fake network traffic to disguise the real event notification...
Active Queue Management (AQM) and Explicit Congestion Notification (ECN) are two methods that attempt to alleviate the problems of FIFO queues and of packet drops for congestion indication respectively. Random Early Detection (RED) is the most popular AQM method. The Domain Naming System (DNS) protocol is a core Internet protocol with very high impact on user experience and overall network functionality...
Threat of Distributed Denial of Service (DDoS) attacks has been increasing with growth of computer and network infrastructures. DDoS attacks generating mass traffics make network bandwidth and/or system resources depleted. Therefore, it is significant to detect DDoS attacks in early stage. Our previous approach used a traffic matrix to detect DDoS attack. However, it is hard to tune up the parameters...
This paper presents a novel energy-efficient pulse switching protocol for ultra light-weight wireless network applications. The key idea is to abstract a single pulse, as opposed to multi-bit packets, as the information exchange mechanism. Pulse switching is shown to be sufficient for event and target tracking applications with binary sensing. Target tracking with conventional packet transport can...
Wireless sensor networks (WSN) can be an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when a network is deployed to monitor sensitive objects. In order to enhance source location privacy in sensor...
Network evolution towards self-aware autonomous adaptive networking aims at reducing the burden of configuring and managing networks, which leads to performance degradation. In order to optimize network operations, the introduction of self-awareness, self-management, and self-healing into the network was proposed, leading to a novel paradigm in networking - known as cognitive networking. This paper...
This paper presents a self-injection-locked (SIL) sensor array for cancelling the effects of random body movement on the detection of vital signs. To achieve this goal, a subject is seated between two SIL sensors to measure rates of respiration and heartbeat using the Doppler shift, and the effects of random movements by the subject are cancelled by wireless mutual injection locking (MIL) of the two...
Amblyopia or “lazy” eye is a disorder of the visual system that causes poor vision in an eye that is otherwise physically normal, and it affects 2–3% of the population, which equates to conservatively around 10 million people under the age of 8 years worldwide. Amblyopia is a neurologically active process: the problem is caused by either no transmission or poor transmission of the visual stimulation...
Water vapor is an important kind of greenhouse gas in the atmosphere whose spatial distribution is extremely uneven and time variation is also very fast. It is not only the main driving force of weather and climate change, but also an important formation and evolution reason for disastrous weather, especially meso-small scale disastrous weather. Along with the development of GPS meteorology, people...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.