The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although some NoSQL systems such as Dynamo, Cassandra, MongoDB have provided different advantages for unstructured data management, no one can provide flexible query functions like MongoDB, while guarantee the availability and scalability as Cassandra simultaneously. This paper introduces a new methodology and implementation for improving the availability of unstructured data by presenting a new distributed...
To provide the real-time application environment in the laboratory for the research of on-line analysis and control applications in EMS system, a simulation platform used for system-level closed-loop control experiment is proposed and realized based on RTDS and EMS in this paper. A protocol converter and a real-time data storage control generator are developed independently. Through the RTDS-GTNET...
Creating composed services dynamically to meet the demand of every individual customer can be an inexpensive way for a service provider to differentiate itself from its competitors. Charging and billing systems are one of the key components supporting this business model. However, many existing charging and billing systems suffer from their time-consuming scheme1 configuration process. This limits...
Cyclic Redundancy Check (CRC) is a well-established coding method for error detection and is part of several industrial standards for data transmission and storage. If a second CRC is used on top of an existing standard CRC to provide additional reliability, we call this an embedded CRC. The performance of such CRC combinations has been considered only recently and is not yet well understood. In this...
If the number of initial entanglement pairs shared between two parties (Alice and Bob) is infinite, it is known that one-way entanglement purification protocols (1-EPPs) can perform as well as two-way entanglement purification protocols (2-EPPs) in a noisy quantum channel, whose characteristics are equal to those of a classical channel. However, when EPPs are applied in actual quantum information...
In [6], the 2-EPPs using quantum error correcting codes (QECCs) and binary search were proposed and shown to have a high purification capability. This protocol maintains a balance between error-detection and correction capabilities by using QECCs to detect errors and binary search to correct a single error. However, when we construct a protocol from codes whose code-length is long, sharing entanglement...
This paper proposes a tool which can create models for network intrusion detection. The created models are stored in Extensible Mark-up Language (XML) notation that describe packet level details, such as protocol header information, and in Message Sequence Chart (MSC) notation which is used for describing scenario information of network activities, for example describing a port scan with vulnerability...
I explain how the non-local correlations of entangled states can be used to design conceptually new random number generators whose randomness can be certified without any detailed assumptions about their internal working.
We consider the problem of designing distributed control protocols -for aircraft vehicle management systems-that cooperatively allocate electric power while meeting certain higher level goals and requirements, and dynamically reacting to the changes in the internal system state and external environment. A decentralized control problem is posed where each power distribution unit is equipped with a...
In this work, a network simulator for power line communications based in the Homeplug-AV technology is presented. The simulator implements both the physical and the MAC layers, along with an in-home power line channel generator, which makes it very useful in a wide variety of network optimization procedures. To the authors' knowledge, performance evaluation of the MAC layer of Homeplug-AV by means...
This paper presents a novel approach for a memory, which supports the flexibility of an FPGA-based dynamic reconfigurable System-on-Chip consisting of heterogeneous data processing nodes. The memory is accessible via the Network-on-Chip (NoC) and provides a dynamic mapping of address space for the different clients within the network. Different data transfer modes support especially the image processing...
Consider a $m$-round interactive protocol with soundness error $1/2$. How much extra randomness is required to decrease the soundness error to through parallel repetition? Previous work, initiated by Bell are, Goldreich and Gold wasser, shows that for \emph{public-coin} interactive protocols with \emph{statistical soundness}, $m \cdot O(\log (1/\delta))$ bits of extra randomness suffices. In...
The work presented in this paper is targeted at the first phase of the test and measurements product life cycle, namely standardisation. During this initial phase of any product, the emphasis is on the development of standards that support new technologies while leaving the scope of implementations as open as possible. To allow the engineer to freely create and invent tools that can quickly help him...
This paper proposes an extension to the current IEEE802.15.4 standard in which flexible mesh networking in the low power beacon mode is enabled through the use of a distributed duty cycle management (DDCM) strategy in conjunction with a distributed time beacon scheduling (DTBS) technique. The DTBS technique enables a beacon enabled coordinator to calculate its time schedule to transmit beacons, thus...
Intrusion tolerant services are usually implemented as replicated systems. If replicas execute identical software, then they share the same vulnerabilities and the whole system can be easily compromised if a single flaw is found. One solution to this problem is to introduce diversity by using different server implementations, but this increases the chances of incompatibility between replicas. This...
Protocol plays a profound role among networked computers in security issues. With the development of computer network engineering, protocol has become increasingly intricate in both data format and interaction behavior, which means that more potential defects exist in protocol software implementations. These factors make protocol vulnerable to malicious attacks and raise the security requirements...
Network processor is a type of specific instruction set processor which is used to process the data packet and possess specific circuit. In this paper, based on the testbench of network processor, functional coverage models are built by the two types of functional coverage expression provided by SystemVerilog. The functional coverage can be obtained automatically by these models. According to the...
We use one-time signatures to assure authenticity for messages that are broadcast over a Controller Area Network (CAN). The advantage is that we can use the simplest one-way functions which are computationally efficient while authentication does not depend on disclosure delays as in the case of protocols based on one-way chains and time synchronization. As the size of the one-time signatures is proportional...
Data replication is an approach which is supposed to increase data availability. Especially in mobile networks the availability can become a serious problem. In this paper we present our research on which nodes of VANET should actively take part in replication of distributed database. For our experiments we used simulation tool adhocsim.fri that is specialised in simulation of VANET in urban environment.
Link quality for WSN is easy to be disturbed by the environment. Link quality not only affects the reliability of data transmission in the network, but also determines the performance of related Upper-layer network protocol. Therefore, link quality evaluation becomes a considering question. The link quality evaluation methods include data package delivery rate and LQI(Link Quality Index). Practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.