The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present the RAPTOR family as an advanced modular platform for both FPGA-based rapid prototyping and hardware acceleration. Using modern FPGAs and high speed communication links, performance and flexibility of the approach will be shown by means of Kohonens self-organizing map algorithm. This highly parallel algorithm is partitioned onto several FPGAs in different system environments,...
Replication technique is an effective method for improving the availability of data and enhancing performance, however, it also brings significant costs in storage space and traffic. In this paper, we study how to decrease redundant traffic cost and redundant replicas for replication in structured P2P overlay by topology optimization. We develop a hierarchical proximity-aware P2P overlay with dominating...
As more and more services are provided by servers via the Internet, Denial-of-Service (DoS) attacks pose an increasing threat to the Internet community. A DoS attack overloads the target server with a large volume of adverse requests, thereby rendering the server unavailable to ??well-behaved?? users. Recently, the novel paradigm of traffic ownership that enables the clients of Internet service providers...
An algorithm of adaptive deformation estimation of moving object in mean-shift tracking method is developed. Firstly, the differences between object and background in the weight image associated with the target candidate region are analyzed. By their different distributions, the area estimation of the target is converted into the task of image segmentation. The threshold is automatically selected...
A vast majority of control systems require the use of networks for the communication between the different agents: sensors, controllers, and actuators. The existing paradigm regards the messages, between sensors and controllers and between controllers and actuators, as periodic. Although this strategy facilitates the analysis and implementation, it leads to a conservative usage of the communication...
We consider the revenue management problem on communication networks with multiple classes of traffic. Bandwidth allocation is determined to maximize revenue under network users' quality of service requirements. This paper presents the sensitivity analysis of an average revenue function for given traffic class by varying bandwidth allocation, traffic demand and the number of virtual paths. Numerical...
We present a network-assisted scheme for media-aware bandwidth sharing among multiple video streaming sessions. Departing from the conventional paradigm of fair-rate allocation among data traffic flows, our scheme allocates the bottleneck bandwidth among the video streams according to their rate-distortion (R-D) characteristics, with the objective of minimizing the total video distortion of all streams...
In this paper, an effective solution for video-on-demand (VoD) streaming services based on BitTorrent mechanism is present. In this solution, several modifications have been incorporated into BitTorrent to support high quality streaming content delivery. First, pieces are selected based on the double windows algorithm instead of the rarest-first policy. Second, some neighbor peers are selected based...
This paper studies the impact of a femto-cell underlay deployment that shares radio frequency resources with urban macro-cells. Femto-cells promise substantial gains in spectral efficiency due to an enhanced reuse of radio resources. However, owing to their random and uncoordinated deployment, they potentially cause destructive interference to macro-cells and vice-versa. In order to maintain reliable...
A very simple method to demodulate the digital frequency modulated (FM) signal is presented in this paper. A unit delay operator, multiplier, lowpass filter, arccosine function, and adder are employed. The proposed method is easily adjusted and controlled. The computer simulations are conducted to demonstrate the performance of the proposed technique.
Through the theory of Digital Down-Conversion, the paper brings forward the proposal that using multi-stage filtering and decimation to reduce the amount of computation and memory space, and targeted solved the technical question of spectrum aliasing. Combination of an engineering practice designed by Intermediate Frequency Digital Demodulator, the paper suggests an optimal configuration principle...
Input-queued scheduling algorithms are designed to improve the throughput which use the input and output terminal in the router to obtain the maximum packets. And the length of the input queue is an important target, that can decides the superiority-inferiority about the capability of the input algorithm. With the existing algorithms, the main content about the scheduling algorithm are ensuring the...
This paper presents a novel binary interleaving process foreseen as a pseudo spreading technique against interference noise and selective channels. The system addresses time-variant binary block interleaving codes considered here for UWB-OFDM transmissions as an alternative to the ECMA-368 standard binary cyclic shifter stage. The interleaving technique denoted dynamic binary interleaving code (DBIC),...
Parallel transport control protocol (TCP) has been used to effectively utilize bandwidth for data intensive applications over high bandwidth-delay product (BDP) networks. On the other hand, it has been argued that, a single based TCP connection with proper modification such as HSTCP can emulate and capture the robustness of parallel TCP and can well replace it. In this work a Comparison between single-based...
Wireless mesh network (WMN) is a promising technology for broadband Internet access due to its low cost, ease of deployment, increased coverage, and robustness. Equipping each mesh router with multiple radios can greatly improve the capacity of WMNs since the radios at each node can simultaneously transmit data on orthogonal channels. Channel assignment is an important problem in multi-radio multi-channel...
In this paper we propose a new cover traffic generation algorithm for flow-based anonymity systems and compare it with other algorithms from the literature. Our algorithm is based on four ideas: fixed time rounds, flow classification with different protection methods for different classes, protection depending on the potential cost and finally, use of history. Simulation results show that our solution...
This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (path MTU discovery) and PLPMTUD (packetization layer path MTU discovery). In particular, for these mechanisms we propose two new steganographic methods and three extensions of existing ones. We present how mentioned mechanisms can be used to enable hidden...
Routing schemes for network recovery aim to find connection paths under the scenarios of link or node failures that disrupt end-to-end connectivity. Several recovery schemes consider a proactive search for alternative links (or paths) that can restore the lost connectivity after the failure. However, the effect that the modification of network traffic after the switch over the alternative paths brings...
In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class...
The popularity of video websites shows an enormous need for video sharing from individuals. We believe that P2P dissemination services, which leverage users' upload bandwidths, will become pervasive to enable high-quality video multicasting. Though several P2P systems were proposed, we argue that a next-generation one should minimize its peer lag so that concurrent subscribers can enjoy the same home-run...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.