The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Directional antennas have received much attention recently in multihop ad hoc networks, due to such benefits as increased transmission range, reduced co-channel interference, improved spatial reuse, and reduced susceptibility to jamming. However, existing random access scheduling schemes with directional antennas suffer from the issues of deafness and high probability of collisions. Moreover, such...
RFID technology is one of four basic technologies in the Internet of Things. In order to realize its intensive and large-scale uses, the key point is to increase the identification speed of tags. The conventional algorithm only uses integral Q which decreases the efficiency dramatically. In order to decrease the convergence time and rise the slot efficiency, this article proposes a novel anti-collision...
As a typical information-centric networking architecture, Named Data Networking (NDN) has attracted wide research attentions in recent years. Since NDN transport has new features of multi-source and multi-path, the implicit congestion detection mechanism of the traditional TCP protocol based on a single source and a single path is no longer suitable for NDN. In this paper, we propose a novel NDN congestion...
Current algorithms for MPTCP (as LIA, OLIA, BALIA, or wVegas) present loss-based congestion control on the exception of wVegas. Delay-based congestion control allows a preventive action against congestion, capable to avoid loss up to some extent, unlike loss-based congestion control. Additionally delay-based congestion control induces lower delay and presents higher fairness, but poor performance...
In the modern world of digitization, processing of data in real time requires an increase in the operating speed of a system. The processing more often than not utilizes multiplication which is time consuming and introduces considerable amount of delay. As such, there is a need to reduce this delay and achieve faster real time processing of data. This paper proposes a novel architecture for implementation...
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming a questioning task. Intruders hack the data and use it for their beneficial purpose. To avoid these undesirable acts, cryptography is used to ensure security of the covert and secure message. Although encrypted data is difficult to...
In order to handle the cross-tier and co-tier interference effectively for LTE-A two-tier heterogeneous network, we propose a CSGC algorithm based partial spectrum sharing scheme using cognitive radio (CR) technique. In this paper, Radio resources are divided into three parts: macro-dedicated part, shared part and femto-dedicated part. Simulation result shows that the proposed scheme not only solves...
In today's scenario most of the things in human life is E-banking where everything is faster and smoother. With the various exchange of electronics signals between any two servers or systems, the money transactions can be done and this process is E-banking. Third party software is used for this E-banking feature where end to end users are secured. The proposed AES algorithm enhances the performance...
The aim of topology-transparent scheduling algorithms for multi-hop wireless networks is to find a schedule for the nodes that does not need re-computation when the network topology changes. It caters to highly dynamic scenarios where topology changes occur faster than the speed at which schedule updates can be orchestrated. These algorithms normally take as input only global network parameters like...
Appropriate bandwidth allocation is an important issue to benefit the long Term Evolution (LTE) networks performance. Single-carrier FDMA (SC-FDMA) multiple access scheme has been chosen for the 3GPP LTE uplink scheduling. However, it requires that all the sub carriers allocated to a single user must be in contiguous frequency band within each time slot. This constraint limits the scheduling flexibility...
The IEEE 802.15.4 is designed for low data rate low power wireless personal area networks (LR-WPANs). LR-WPANs are envisioned for a variety of wireless sensor applications: health monitoring, commercial, agriculture, home and industrial automation. A significant feature of IEEE 802.15.4 is the very low duty cycle operation to preserve sensor node's energy. In this paper, we propose a delay mitigation...
Network bandwidth and server capacity are gradually becoming overloaded due to high demand and rapid evolution of high quality multimedia services over the Internet. Internet Protocol Television (IPTV) is among the multimedia services that demand more of network and server resources, especially with the emergence of Mobile IPTV. It is imperative for service providers to maintain good quality management...
Routing protocols is important part of the stable Designing of Hybrid wireless networks. Maintaining network topology and multi-hop routing are the main challenges of hybrid wireless network. To overcome these issues we analyze different QoS-aware routing protocols, those are ZRP, CEDAR, MRP, GAMAN, QMRPD, QOLSD, AQOR, TDR, QAODV, QOD, and D-adapt OR. Those protocols based on QoS-routing parameters...
This paper presents the results of a comprehensive interpretation to research some of the most commonly used encryption algorithms in the domain of cryptography firstly to identify as many of their weaknesses and vulnerabilities as possible, and secondly to identify the aspects of these weaknesses that can be avoided by correct implementation. Day by day the vulnerabilities are rapidly increasing...
Cloud computing is a rising technology. Scheduling techniques performs a major role in clouds because it process vast amount of data. We design a protocol to reduce the execution time and maximize the throughput and improve the performance of the server and also try to reduce the drawback of the existing protocols. We use the priority based load balancing algorithm based on the nature of the job to...
A wireless sensor network (WSN) has its application in various fields such as temperature monitoring, pressure monitoring, health monitoring, defence system etc. In wireless sensor networks, congestion occurs because of the inadequate resources like low processing power of the sensor node. The performance of the WSN is degraded by the congestion as it leads to the wastage of energy, reduction in throughput...
Following the decision to choose Rijndael as the successor of Data Encryption Standard (DES), Advanced Encryption Standard (AES) was increasingly used in numerous applications which require confidentiality and the secure exchange of the data. While security is a property increasingly sought for many applications (credit cards, telecommunications …), it becomes necessary to consider physical attacks...
The cryptographic hash algorithm has been developed by designers with the goal to enhance its performances in terms of frequency, throughput, power consumption and area. The cryptographic hash algorithm is implemented in many embedded systems to ensure security. It is become the default choice to ensure the information integrity in numerous applications. In this paper, we propose a pipelined architecture...
Nowadays, Wi-Fi is a very popular Technology. Faster data transfer and Security both are very important for Wi-Fi. At present, Advanced Encryption Standard (AES) is used for Wi-Fi that is more secured than other encryption algorithms but it is not so fast because of it's complex functions. On the other hand, Blowfish is a very faster encryption algorithm but it cannot apply on Wi-Fi because of it's...
This paper introduces a new contention window (CW) adaptation algorithm with the main objective of reducing energy consumption while maintaining required Quality of Service (QoS) for multi-class traffic with different priorities. The main concept of the proposed algorithm is adaptively adjust the contention window (CW) size according to the network load conditions and each traffic class applies different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.