Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We propose an algorithm for maximizing the lifetime of a wireless sensor network when there is a mobile sink and the underlying application can tolerate some degree of delay in delivering the data to the sink. Our main contribution is that the algorithm is distributed, and in addition, mostly uses local information. Such an algorithm can be implemented by parallel and/or distributed execution and...
Topological changes in Mobile Ad-hoc NETwork (MANET) render routing paths unusable. Using multiple redundant paths between the source and the destination is a technique which reduces the affect of this problem. Shared links and nodes between paths present common failure points which can disable many or all of the paths. Disjoint path set requires the multiple paths to be link- or node-disjoint. However,...
Application-Layer Multicast (ALM) is considered a viable solution for compensating the lack of global IP Multicast deployment. While early ALM approaches consider only stationary end-systems, their use becomes more and more feasible on smaller devices like laptops and mobiles. Many ALM protocols have been proposed that employ multi-metric optimization strategies to consider e.g. delays, fanout-degrees,...
In this paper, instruction level optimization by exploiting SSE2 instructions is proposed to speed up the time-critical modules in H.264 encoder. SSE2 instruction set to execute a large number of small-size native data type operations in parallel to improve the real-time multimedia data processing capability. The contributions of the paper are manifold: Firstly, the paper shows SSE2 instruction set...
In this paper we aim to introduce a power optimizing system for Base Transceiver Station. This technique will help to maintain an uninterruptible communication service to the mobile users. This smart intelligent system monitors the battery under voltage levels, Diesel Engine alternator diesel tank float level and room temperature condition. Power optimization system is microcontroller based and also...
In this paper, we present a modified on-demand routing algorithm for mobile ad-hoc networks (MANETs). The proposed algorithm is based on both the standard Ad-hoc On-demand Distance Vector (AODV) protocol and ant colony based optimization. The modified routing protocol is highly adaptive, efficient and scalable. The main goal in the design of the protocol was to reduce the routing overhead, response...
In practice, ad hoc networks are still too unreliable for standard mobile and vehicular communications. It is thus important to complement current protocols in this context, with schemes guaranteeing the exchange of critical data when needed. A promising approach in this realm is to use an overlay subgraph, over which critical messages are exchanged and acknowledged in a peer to peer fashion. Overlay...
A computer security system is typically tasked with identifying an intrusion, which is defined as a set of actions that attempt to compromise, “the integrity, confidentiality, or availability of any resources provided by a computing system” [1] An attack on a computer system plays out in a series of sequential events, the granularity of which can vary drastically depending on the type of exploit....
This paper has summarized all kinds of handover problems in the TD-SCDMA networks, and analyse these problems, finally it gives out the optimization solution which could improve the KPI of the TD-SCDMA networks effectively.
Users of today's networks expect certain services from the network. Indeed one of the purposes of the network is to enable nodes to access remote services and resources not locally available. Given the significance and potential benefits of MANETs, it is necessary to design robust protocols which ensure that users of such networks are able to find the services they require. Due to limited computing...
This paper presents a distributed algorithm for mobile sensor networks to monitor the environment. With this algorithm, multiple mobile sensor nodes can collectively sample the environmental field and recover the environmental field function via machine learning approaches. The mobile sensor nodes are able to self-organise so that the distribution of mobile sensor nodes matches to the estimated environmental...
This paper presents a novel navigation and motion planning algorithm for mobile vehicles in rough terrains. The main purpose of the algorithm is to generate feasible trajectories while selecting smoother paths, in the sense of level of roughness, toward the goal position. The purpose is achieved by adapting the passivity-based model predictive control optimization setup (PB/MPC), recently proposed...
Despite much research activity over the last several decades on wireless communications in general, and ad hoc wireless networks in particular, there remain many significant technical challenges in the design of these networks. As it is not possible to give a significant amount of power to the mobile devices of ad-hoc networks so that it could work for long time, so mobile devices with rechargeable...
With the rapid growth of mobile communications, deployment and maintenance of cellular mobile networks are becoming more and more complex, time consuming, and expensive. In order to meet the requirements of network operators and service providers, the telecommunication industry and international standardization bodies have recently paid intensive attention to the research and development of self-organizing...
In this paper, we propose the Nash bargaining solution for the interference problem in cellular networks. The base-stations of neighboring cells negotiate with each other to determine the best number of channels that should be allocated to their edge users. While cells optimize the allocated resources on a local level, the bargaining process acts as a common framework that combines the optimization...
This article analyzes the statistical properties of narrowband mobile-to-mobile (M2M) fading channels with equal gain combining (EGC) under line-of-sight (LOS) propagation conditions. Here, we study a dual-hop amplify-and-forward (AF)relay network. It is assumed that there can exist LOS components in the transmission links between the source mobile station and the destination mobile station via K...
This paper introduces a solution to enable self-optimization of coverage and capacity in LTE networks through base stations' downtilt angle adjustment. The proposed method is based on fuzzy reinforcement learning techniques and operates in a fully distributed and autonomous fashion without any need for a priori information or human interventions. The solution is shown to be capable of handling extremely...
Troubleshooting of wireless networks is a challenging network management task. We have developed, in a previous work, a new troubleshooting methodology, which we named Statistical Learning Automated Healing (SLAH). This methodology uses statistical learning, in particular logistic regression, to extract the functional relationships between the noisy Key Performance Indicators (KPIs) and Radio Resource...
The neighbour cell list (NCL) in cellular networks has an important impact on the number of dropped calls and is traditionally optimized manually with the help of planning tools. In this paper, a method for automatically optimizing a NCL is presented, which consists of an initialization using a self-configuration phase, followed by a self-optimization phase that further refines the NCL based on measurements...
The topological properties of mobile P2P Ad Hoc networks are critical factors that dominate the performance of these networks. The node degree and diameter of these networks are most important parameters which measure the autonomy, efficiency, robustness and load balancing of these networks. In order to improve the four features for these networks, researchers have proposed many practical systems...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.