The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the fundamental problem of improving the performance of many-to-one and many-to-many communications. Our approach is Time Division Multiple Access (TDMA) based but addresses the limitations of existing TDMA implementations in a novel way. In a nutshell, we combine packets from many senders into a single large packet transmission by exploiting capture effect achieved through...
A system to control the data flow between detector sensors input streams for the data connected with a single event is elaborated. Obtained results show that a High Performance Computing cluster data exchange can be efficient AND fault-tolerant.
The most emerging biometric technology used to ensure a reliable recognition rate is Multibiometrics. The unimodal recognition systems may lead to low recognition rate in real applications. To overcome this problem, we propose an approach for palmprint recognition based on local features. First, a palmprint image is divided into several sub-images, then the feature vectors are extracted from each...
The Smart Grid (SG) initiative introduces a two-way communication between utility companies and the consumers thanks to Advanced Metering Infrastructure (AMI) networks. One of the most crucial components that constitute an AMI network is smart meters (SMs). SMs execute some programs called firmware to rule the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services...
Wireless sensor network is a set of independent transducers with communication infrastructure for recording and monitoring at different locations. The monitoring parameters are energy, temperature, humidity, pressure, direction and speed of the node in the WSN. The main challenges of WSN are efficiency, scalability, heterogeneity, reliability, robustness, privacy and security. Many researchers are...
The most important application of vehicular networks is the dissemination of safety information. Uncontrolled rebroadcasts result in redundant retransmission of the same information, excessive channel collisions, and exhausted network resources. Minimizing network redundancy and latency while still ensuring high reliability of the entire network is one of the main objectives of multi-hop broadcasting...
Today's data center applications can generate a diverse mix of short and long flows. However, switches used in a typical data center network are usually shallow buffered in order to reduce queueing delay and deployment cost. As a result, the buildup of the queues by long flows can block short flows, leading to frequent packet losses and retransmissions, which translates to crucial performance degradation...
Nowadays, Machine-to-Machine (M2M) and Internet of Things (IoT) traffic rate is increasing at a fast pace. The use of satellites is expected to play a large role in delivering such a traffic. In this work, we investigate the use of two of the most common M2M/IoT protocols stacks on a satellite Random Access (RA) channel, based on DVB-RCS2 standard. The metric under consideration is the completion...
For secret-key generation by using a compound source, the actual statistics of the source are unknown to the participants. It is assumed that the probability distribution of the source belongs to a set which is known to the participants. The secret-key generation protocol should guarantee in this case the reliability and security of the generated secret-key simultaneously for all possible source statistics...
In real-time control systems, a fast and reliable data transmission mechanism is necessary. This paper analyzes the advantages and disadvantages of the existing data transmission protocol and proposes a data transmission protocol called Deque-ERUDP (Deque Efficient and Reliable Protocol Based on UDP) which can guarantee data transmission reliability and efficiency. The proposed protocol uses double...
We analyze the performance of the type-I automatic repeat request (ARQ) protocol with ultra-reliability constraints. First, we show that achieving a very low packet outage probability by using an open loop setup is a difficult task. Thus, we introduce the ARQ protocol as a solution for achieving the required low outage probabilities for ultra reliable communication. For this protocol, we present an...
The rapid improvement of systems that surround us such as automotive vehicles brings new challenges for system designers and manufacturers. New functionalities like advanced driver assistants leverage some responsibilities from the driver to an autonomous system. Being able to provide such functionalities requires a safety certification for the system, namely the reliability of the communication backbone...
In the reliable message transmission problem (RMTP) processors communicate by exchanging messages, but the channel that connects two processors is subject to message loss, duplication, and reordering. Previous work focused on proposing protocols in asynchronous systems, where message size is finite and sequence numbers are bounded. However, if the channel can duplicate messages-but not lose them-and...
A novel approach of a testbed for embedded networking nodes has been conceptualized and implemented. It is based on the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes are running in parallel and are connected via so-called virtual interfaces. The presented approach is very efficient and allows a simple description of test cases without...
Wireless and wired industrial communication systems often utilize deterministic, centrally coordinated communication concepts to ensure fast and reliable transmission of time-critical real-time data, for example for closed-loop control applications. In addition to such cyclic, real-time-critical traffic, often acyclic, non-real-time data has to be exchanged between the communication dvices, for example...
Cyber-physical systems connect the physical world and the information world by sensors and actuators. These sensors are usually small embedded systems which have many limitations on wireless communication, computing and storage. This paper proposes a lightweight coding method for secure and reliable transmission over a wireless communication links in cyber-physical systems. The reliability of transmission...
Large-scale parallel programming environments and algorithms require efficient group-communication on computing systems with failing nodes. Existing reliable broadcast algorithms either cannot guarantee that all nodes are reached or are very expensive in terms of the number of messages and latency. This paper proposes Corrected-Gossip, a method that combines Monte Carlo style gossiping with a deterministic...
Despite over a decade of research and development in fall detection systems, accurate and reliable systems in use are few. The existing fall detection approaches leave three major challenges unsolved: (1) insufficient fall data for model training process, (2) unreliable labeling of ground truth, and (3) resorting to artificial falls to model falls. In this paper we highlight these challenges in a...
Situational awareness during sophisticated cyber attacks on the power grid is critical for the system operator to perform suitable attack response and recovery functions to ensure grid reliability. The overall theme of this paper is to identify existing practical issues and challenges that utilities face while monitoring substations, and to suggest potential approaches to enhance the situational awareness...
This paper presents a summary and analysis deployment of a secure Intelligent Electronic Device (IED) management system at a utility in North America. The utility began their investigation into technologies and methodologies for securing their system for North America Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards. This report is intended for anyone considering the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.