The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power Capping techniques are used to restrict power consumption of computer systems to a thermally safe limit. Current many-core systems employ dynamic voltage and frequency scaling (DVFS), power gating (PG) and scheduling methods as actuators for power capping. These knobs arc oriented towards power actuation, while the need for performance and energy savings are increasing in the dark silicon era...
Wireless Sensor Communication Networks have more concern on its routing techniques. Since the WSCNs nodes are battery powered, routing algorithms should assure the concept of energy saving without affecting the other performance metric like Throughput, Delay and Packet delivery ratio etc. The modified AOMDV called as Enhanced Energy Efficient Multipath Routing Protocol ( EEEMRP )is a proposed algorithm...
Nowadays, 10 Gb/s networks are becoming more and more widespread. Consequently, there is an increasing need for testing equipment for those networks, to measure parameters such as throughput, delay, jitter, packet loss rate, etc. Network testing equipment can be either active or passive, depending on whether it injects traffic or simply monitors packets in network links. In this paper we focus on...
In virtualized environment, several computers run on a physical computer. Many of virtualization systems have a ballooning function with which memory allocation size for a virtual machine can be dynamically changed without restarting the virtual machine. Thus, it is expected that performance of an applications in a virtual machine can be improved by dynamic optimization of the virtual machine memory...
Problem of Congestion in Wireless Sensor Network (WSN) is an area which draws attention of various researchers in recent years. The challenge lies in developing a model for routing which can find the optimized route on the basis of distance between source and destination and the residual energy of the node. Various models have been proposed and developed from time to time and their merits and demerits...
In wireless ad hoc networks, misbehavior of nodes in computation of backoff value is one of the problems that affects the performance at MAC layer. To overcome this problem, this paper proposes a solution in which Contention Window subrange is specified by the receiver to the sender through CTS/ ACK packet. The advantage of sending the Contention Window subrange is, it is easier to detect the misbehaving...
The web today is a growing universe of interlinked web pages and web apps, teeming with videos, photos, and interactive content. Over time web technologies have evolved to give web developers the ability to create new generations of useful and immersive web experiences. The most important technology in realizing this shift is Ajax (Asynchronous Javascript and XML). Ajax is a major breakthrough in...
Mobile Wireless Sensor Network (MWSN) has gained its popularity due to its wide-range of application. However, extensive deployment of sensor node in harsh, uncontrolled or hostile environment makes the sensor node to become faulty and unreliable. In order to overcome this issue, a Fault Detection and Recovery technique for Cluster heads (FDRC) in mobile wireless sensor networks is proposed. For fault...
A new combination between Wireless Sensor Network (WSN), mobile robot and satellite technology for Indonesian volcano monitoring system, Mobile Monitoring System for Indonesian Volcano (MONICA) has been developed. This system divided into two modes: fixed-mode and mobile mode. The first mode has shown a good performance. For a small event of volcano activity, the system only uses power 1 million times...
In the era of big data and cloud, distributed key-value stores are increasingly used as building blocks of large-scale applications. Comparing to traditional relational databases, key-value stores are particularly compelling due to their low latency and excellent scalability. Many big companies, such as Facebook and Amazon, run multiple different applications and services on top of a single key-value...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
The article deals with the problem of controlling the flow of information coming from a group of unmanned aerial vehicles by radio channel. The stream is a sequence of binary information packages. The inevitable data losses compensated by repetition of lost packages. Modern methods control of data flow assumes using a mechanism automatic repetition query based on the method of sliding window. In this...
Wireless sensor networks have a most stimulating affair of Energy conservation. Different types of techniques were introduced to increase lifetime of network. Clustering is one of them to reduce energy consumption in network. This paper presents an idea of a novel protocol Multilevel Balanced Distributed Energy Efficient Heterogeneous Protocol (MBDEEHP) to create clustering in heterogeneous environment...
This paper reports our recent result in designing a function for autonomous APs to estimate throughput and delay of its clients in 2.4GHz WiFi channels to support those APs' dynamic channel selection. Our function takes as inputs the traffic volume and strength of signals emitted from nearby interference APs as well as the target AP's traffic volume. By this function, the target AP can estimate throughput...
This paper presents implementation of a reactive base station selection scheme for millimeter-wave (mmWave) communications. In mmWave communications, the frame loss rate increases and the throughput sharply decreases when a pedestrian blocks a line-of-sight (LOS) path. To alleviate this human blockage problem, base stations can be selected so as to maintain LOS paths on the basis of communication...
Monitoring system provides a clear insight into the state and performance of service components in cloud computing platforms. It collects metrics from dispersed sensors and stores them in databases for show and future query. To choose the most suitable database for a monitoring system is complex, since the performance requirement on cloud monitoring system in different data centers differs widely...
A detailed understanding of HPC application's resource needs and their complex interactions with each other and HPC platform resources is critical to achieving scalability and performance. Such understanding has been difficult to achieve because typical application profiling tools do not capture the behaviors of codes under the potentially wide spectrum of actual production conditions and because...
Underwater sensor networks are gaining prominence in various applications of underwater monitoring and resource explorations. The minimum energy routing algorithms [2] are implemented in underwater oil resource explorations. The topologies already in use are wired where all sensor nodes behave as coordinator, except the PAN coordinator. This may increase the depletion of battery energy, and cost of...
In a general purpose cloud system efficiencies areyet to be had from supporting diverse application requirementswithin a heterogeneous storage system. Such a system poses significant technical challenges since storage systems are traditionallyhomogeneous. This paper uses the Ceph distributed file system, and inparticular its concept of storage pools, to show how a storagesolution can be partitioned...
Network virtualization is one of the key concepts of the Future Internet. However, the use of virtualization techniques in wireless mesh networks has thus far not been adequately studied. In this paper we describe ViMeNO: a Virtual wireless Mesh Network architecture for Operators, i.e., the first virtualization-enabled wireless mesh network architecture designed for operators. In the proposed architecture,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.