The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The emergence of Wireless Sensor Networks (WSNs) applications such as localizing, tracking, surveillance, speedometers, and so on, synchronizing sensor motes' clocks is essential in WSNs. Thus, many time synchronization protocols are proposed in recent decade to get network wide synchronization. Each of those protocols strives to get a good precision in different ways. This paper aims to review some...
We present ACS-F2, a new electric consumption signature database acquired from domestic appliances. The scenario of use is appliance identification with emerging applications such as domestic electricity consumption understanding, load shedding management and indirect human activity moni-toring. The novelty of our work is to use low-end electricity consumption sensors typically located at the plug...
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used...
In this paper, we introduce the notion of mobility-cast in opportunistic networks, according to which a message sent by a node S is delivered to nodes with a mobility pattern similar to that of S - collectively named place-friends. The motivation for delivering a message to place-friends stems from the fact that current social acquaintances are likely to be place-friends. Most importantly, it has...
The next generation network (NGN) is driven by business. The business identification and control is meaningful to management of NGN and safety. Aimed at the accuracy and effectiveness of network business identification mechanism, one systematic model is developed with accurate and intelligent identification function. The research on business flow identification technology is conducted. Through testing...
There is currently no widely recognised methodology for undertaking data quality assessment in electronic health records used for research. In an attempt to address this, we have developed a protocol for measuring and monitoring data quality in primary care research databases, whereby practice-based data quality measures are tailored to the intended use of the data. Our approach was informed by an...
This paper aims to contribute to the demonstration of the microwave dielectric spectroscopy relevance for biological applications. We demonstrate indeed that microwave dielectric spectroscopy may significantly identify the membrane permeabilization (and its consequence on cells) of cells induced by chemo-treatment. Standard deviations on both real and imaginary parts (resp.) of the permittivity between...
Modern and future many-core systems represent complex architectures. The communication fabrics of these large systems heavily influence their performance and power consumption. Current simulation methodologies for evaluating networks-on-chip (NoCs) are not keeping pace with the increased complexity of our systems; architects often want to explore many different design knobs quickly. Methodologies...
One of the main challenges in robotics applications is dealing with inaccurate sensor data. Specifically, for a group of mobile robots the measurement of the exact location of the other robots relative to a particular robot is often inaccurate due to sensor uncertainty or detrimental environmental conditions. In this paper, we address the consensus problem for a group of agent robots with uncertain...
One form of molecular communications for short range transmission between nanomachines is Calcium Signaling. This form of signaling is commonly found in cellular tissues, which consist of tightly packed cells, whereby Ca2+ ions propagate and diffuse between the cells. However, the natural flexible structure of cells usually leads to them dynamically changing shapes under certain strains and forces...
In this paper, we present the design, implementation, and evaluation of the novel downlink Multi-User MIMO sounding protocol called MUTE. Our protocol decouples the sounding set selection used to collect Channel State Information (CSI), from the transmission set selection in order to minimize or even eliminate the overhead associated with sounding, while maximizing user selection performance. To this...
We consider the clock synchronization problem in wireless mobile ad hoc networks in the presence of Byzantine nodes. The communication topology is dynamic: nodes move randomly within a geographical area. We propose a clock synchronization protocol which is based on the linear approximate consensus method. Periodically each correct node broadcasts its current timestamp and gathers the timestamps provided...
This paper proposes a Delay Asymmetry Correction (DAC) Model to enhance clock synchronization protocols based on a Master-Slave arrangement such as the IEEE 1588 PTP protocol. The purpose of this work is to mitigate the effects of unpredictable packet delay variations (PDV), which may aggravate asymmetric link delays on timing packets, in order to improve the synchronization accuracy of the slave...
Tor is a popular anonymizing network and the existing work shows that it can preserve users' privacy from website fingerprinting attacks well. However, based on our extensive analysis, we find it is the overlap of web objects in returned web pages that make the traffic features obfuscated, thus degrading the attack detection rate. In this paper, we propose a novel active website fingerprinting attack...
Traditionally, the architecture of control system in large physics experiment is based on PLC and DCS like EPICS. For the control information in controls system, its timestamp is marked in control computer after transferred from PLC to computer. This mode will introduce more time deviation in time stamp. In CSNS, we will use a new PLC from BECKHOFF which can provide real-time timestamp, and we can...
SPam over IP Telephony (SPIT) is an emerging threat in the telecom era of Voice over IP Networks (VoIP). Though evolved from email spam, SPIT is more obstructive and intrusive in nature as they require response from the callee. Contemplating the behavior of SPIT, a provider based system is contributed with the proposed mechanism installed on the SIP proxy server. In this work, a biologically inspired...
We address the problem of estimating the neighborhood cardinality of nodes in dynamic wireless networks. Different from previous studies, we consider networks with high densities (a hundred neighbors per node) and where all nodes estimate cardinality concurrently. Performing concurrent estimations on dense mobile networks is hard; we need estimators that are not only accurate, but also fast, asynchronous...
The number of sensors pervading our everyday life, e.g., in smartphones, cars, and buildings, is constantly increasing. These sensors, which are typically embedded into resource constrained devices such as sensor nodes or smartphones, allow measuring the state of the entities they observe or are attached to. If this information is accessible via the Internet, they contribute to the Internet of Things...
Collecting histograms over RFID tags is an essential premise for effective aggregate queries and analysis in large-scale RFID-based applications. In this paper we consider efficient collection of histograms from the massive number of RFID tags without the need to read all tag data. We first consider the problem of basic histogram collection and propose an efficient algorithm based on the idea of ensemble...
Time synchronization is of great significance in underwater acoustic (UWA) networks. Many functions, such as network protocol stack, sleep-scheduling, and localization, are based on time synchronization. Because underwater sound speed is comparatively slow, synchronization protocols encounter a long propagation latency problem, which differs from those in terrestrial sensor networks. As a result,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.