The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now a days wireless sensors are attracting strong interest for different monitoring and controlling applications as they are integrated with the function of sensing, processing and wireless communication. The wireless sensor networks have been deployed for agricultural, industrial, remote monitoring and traffic management purposes. As energy shortage is a worldwide problem so that more attention has...
The spry maturation of Internet of Things (IoT) has paved way to the rapid development of numerous sectors and these have been envisioned in; connected transport, smart cities, connected homes, connected healthcare, etc. IoT is a technology that connects "things" that are embedded with sensors, actuators and network connectivity to collect and exchange the data to the internet. The ability...
Several data center applications such as Hadoop and OpenStack VM provisioning utilize group communication (one-to-many or many-to-many transfers). Since these applications require reliable and stable delivery, they rely on TCP for all group communications. Even though multicast lends itself naturally to these group communication patterns, it has remained largely under-deployed in the Internet owing...
This paper reports an organized suite of experiments comparing a parallel matrix program in performance and reliability using a single-sided statistic multiplexed computing framework against MPI based on end-to-end computing framework.
Approaches such as increasing the number of intermediate stages are introduced to increase the reliability and throughput of Multistage Interconnection Networks (MINs). However, they mainly try to change the network architecture to achieve the goal of having more reliable network. When multiple sources in such a network try to send data, collision of packets and blocking problems are inevitable. Using...
Vehicle-to-vehicle communication systems support diverse cooperative applications such as virtual traffic lights. However, in order to harness the potential benefits of those applications, one must address the challenges faced by distributed algorithms in environments based on unreliable wireless communications. In this paper we address the problem of leader election among the nodes of a cooperative...
Due to its own features including variability of network topology, instable vehicle density and so on, Vehicular Ad hoc Networks (VANETs) can hardly guarantee efficient and reliable network connectivity which plays an important role in data dissemination. Compared with VANET, cellular networks is of great advantage to provide timely data propagation. To solve the problem of disconnection in VANET,...
The Internet of things (IoT) presents the future of internet by incorporating objects to communicate with themselves. Different protocols have been emerged to meet the requirements of limited resource objects of IoT. Constrained Application Protocol (CoAP) is the application protocol which is used in IoT communication stack is prone to performance degradation resulted from traffic congestion. Basic...
To increase the safety of the passengers, modern transport system is transforming into an Intelligent Transport System, adopting several components like Road Site Units (RSU) and Warning Light Devices (WLD). The On-board unit in the vehicle will transmit Basic Safety Messages (BSM) periodically to other vehicles and RSUs to prevent collisions and improve traffic flow. WLDs are embedded into road to...
Providing better energy efficient network is the important critical issues in Wireless Sensor Networks (WSNs). We present Multi-constraint Energy Balanced Opportunistic Routing (MEBOR) algorithm that enhance the network lifetime. Proposed algorithm is devised with unique parameters viz., Single hop Packet Progress (SPP), Packet Reception Ratio (PRR), Residual Energy and Energy Density to select intermediate...
The growing number of security threats on the Internet and computer networks demands highly reliable security solutions. Meanwhile, Intrusion Detection (IDSs) and Intrusion Prevention Systems (IPSs) have an important role in the design and development of a robust network infrastructure that can defend computer networks by detecting and blocking a variety of attacks. Reliable benchmark datasets are...
With the prompt advancement and widespread selection of wireless sensor networks (WSNs), security has grown a frequently noticeable problem. To establish a session key in sensor node communication is a challenging job for WSNs. Key exchange and group key transfer protocols based on trusted key distribution center can be applied for the network infrastructures with fixed topology. But these protocols...
In Delay/Disruption Tolerant Networks (DTNs), the Licklider Transmission Protocol (LTP) is proposed to further improve the efficiency of data delivery over links with long delay and frequent interruptions, which operates under the bundle layer running the Bundle Protocol (BP). In this paper, we focus on such kind of BP/LTP based DTN architecture and analyze its performance from the viewpoint of queueing...
The backbone of Internet of Things (IoT) is the communication protocols which seamlessly integrate thousands of nodes and enable a light weight data transfer process. This research is to analyze the efficiency and applicability of different M2M protocols that are available for IoT communication. For the purpose of evaluating the protocols a Raspberry-Pi with Raspbian OS and a temperature sensor are...
Forensic Voice Comparison (FVC) is increasingly using the likelihood ratio (LR) in order to indicate whether the evidence supports the prosecution (same-speaker) or defender (different-speakers) hypotheses. In addition to support one hypothesis, the LR provides a theoretically founded estimate of the relative strength of its support. Despite this nice theoretical aspect, the LR accepts some practical...
Smart grids are considered as one of the most revolutionary technologies in the field of power and communication. However, security management of such a big infrastructure is a key challenge for the research community of the world. In this context, this paper provides the major security goals of smart grid systems along with classification of different vulnerabilities. Additionally, we also present...
In a data communication network, several flows contend to utilize limited and shared network resources, however, this gives rise to congestion along with other network issues. So, this leads to the development of congestion control based methods/ protocols to support the deployment of real-time multimedia applications while ensuring reliability and fairness. This paper presents a simulation based...
Bluetooth Low Energy (BLE) has recently positioned itself as one of the key enabling technologies in the Internet of Things (IoT). In order to provide scalability, one promising way to collect data from BLE sensors is to utilize the existing population of smartphones in their range as relays to the cloud. In this case, providing reliable data transfer becomes complicated due to challenges such as...
This paper presents an efficient and reliable protocol that enables a pipelined transmission using two channels in wireless sensor networks. Nodes in the network form a tree originating from a sink node. A sharable slot is allocated to each tree level and one unique channel is assigned to every other level in the tree. Data transmission is performed from the lowest level to the highest level, allowing...
A solar car is an electric vehicle that runs entirely on solar energy. Designing, building and racing solar cars has been a longstanding worldwide challenge for engineering and computer science students, with the overarching goal being to design devices that use sustainable energy sources. This article describes our experience and educational outcomes (the modeling and design of computer-based systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.