The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future spacecraft systems will require careful co-design over both physical and cyber elements to provide a better performance for holistic system. Furthermore, the event triggered control is a resource-aware strategy which allows a reduction of the computation and communication demand without sacrificing performance. In this paper, we discuss that a nonlinear event triggered control approach is applied...
Robust and accurate traffic prediction is critical in modern intelligent transportation systems (ITS). One widely used method for short-term traffic prediction is k-nearest neighbours (kNN). However, choosing the right parameter values for kNN is problematic. Although many studies have investigated this problem, they did not consider all parameters of kNN at the same time. This paper aims to improve...
In this paper, we implemented OpenFlow scheduled bundle in the Open vSwitch software switch and evaluated its performance in SDN testbed networks under different scenarios. The scheduled bundle is a very new mechanism proposed in the OpenFlow protocol for achieving consistent updates among multiple SDN switches. However, this feature has not been supported in any hardware SDN switches or any software...
In recent years, many organizations, companies and government agencies have been suffering from brutality of targeted attacks. Especially, destructive targeted attacks such as Shamoon and Samas have been causing significant damages on the targets' cyber assets, disputing their critical business operations. Since such attacks tend to access many hosts simultaneously, a rapid incident response is essential...
The exponential amount of geospatial data that has been accumulated in an accelerated pace has inevitably motivated the scientific community to examine novel parallel technologies for tuning the performance of spatial queries. Managing spatial data for an optimized query performance is particularly a challenging task. This is due to the growing complexity of geometric computations involved in querying...
One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing anti-jamming defense mechanisms is equally important. In this paper, we propose a truthful mechanism, robust against the jamming, for a dynamic...
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
Nanotechnology becomes reality paving the way for many new applications. In nanonetwork system, each nanosized device is equipped with limited capabilities and is dedicated to a basic task but the combination of the numerous devices actions results in high-level functions. In this context, large number of devices concentrated in a limited area must exchange data using wireless links. Spread in Time...
Chaos-based coded modulation (CCM) systems have been shown to be competitive against important wireless channels impairments, like fading. Nonetheless, these systems have not been tested yet in a real-world scenario, and their performance has only been explored using theoretical and numerical bounds, and validated by simulation. In this proposal, we take advantage of the availability of Software-Defined...
A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation...
User fairness and spectrum efficiency are conflicting objectives in cellular system optimization given that users share limited spectrum resources. Users at the cell edge are more likely to be unfairly treated due to their disadvantageous locations, where they experience high path losses and strong interferences if co-channel transmission exists. In this paper, a cell edge boundary is obtained and...
Location-awareness plays an important role in Wireless Sensor Networks (WSNs) by aiding in tasks such as packet routing, event mapping, and energy savings. The use of Global Positioning System (GPS) on sensor nodes is not always viable due to a number of issues, e.g., power constraints. Location estimation solves the problem of computing sensor node positions by using information from devices that...
Probing is a technique used for network monitoring and measurement applications, including detection of silent failures and performance analysis to verify compliance with service-level agreements. Many existing approaches to probing-path selection seek to minimize the number of probes (an NP-hard problem) or to minimize probing delay, but they fail to properly assess the network overhead imposed by...
A Vehicular Cloud is defined as a set of vehicles that share their computation resources in a cloud. These resources are scheduled on demand based on cooperation between vehicles and the roadside. The biggest challenge in this type of cloud is to create a structure that will manage the service and resource when the cloud does not depend on the roadside infrastructure. Thus, the vehicles need to collaborate...
A structured overlay running as the base of a DHT or ALM occasionally receives a large number of messages collectively. Those cases are opportunities for an overlay to bundle multiple different messages into a single message and achieve extraordinarily effective message deliveries. Such message bundling reduces the number packet transmissions on an underlay network such as an IP network. This paper...
Ethernet plays an important role in the layer 2 network. Unfortunately, the tremendous Address Resolution Protocol (ARP) broadcast traffic among massive hosts limits the scale of Ethernet. Recently, Software-Defined Network (SDN) has been proposed to suppress broadcast traffic by centralized control. However, existing approaches based on SDN suffer from an adaptability limitation as they cannot independently...
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are catching the attention of telecom operators. Telecom environments establish a set of Carrier Grade requirements such as high availability, high throughput and low latency. To address these challenges SDN deploys logically-centralized controllers, such as ONOS and OpenDayLight. Based on the JAIN SLEE component model, which...
Multistage Interconnection Networks (MINs) remain interesting for research and are continuously being improved as they are essential devices for constructing scalable parallel computers or for connecting networks. In this paper a new idea - new architecture - is introduced. The proposed construction uses switch elements connected with redundancy internal paths and fan out at the end of the construction...
Filling depressions is a commonly used preprocessing step for the automatic extraction of drainage networks from raster digital elevation models (DEMs). The Priority-Flood algorithm is the fastest depression-filling algorithm for floating-point DEMs. Most of the variants of the Priority-Flood algorithm processes disjoint depressions using one single priority queue, without taking advantage of the...
A three-dimensional hydrodynamic numerical model coupled with a sediment transport model has been applied to simulate the estuarine circulations and suspended sediment transport in the Hooghly Estuary under the presence of strong tidal currents and huge freshwater discharge during the monsoon. The model topography has been derived from the depth sounding data assimilated from the hydrographical survey...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.