The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
XCP is one of the most commonly used protocols in modern congestion control implementations. XCP can provide the available transmission rate to applications. It is well known fact that one of the issues of XCP is that the time-delay of its traditional implementation (TR-XCP) is twice the time-delay of its flow model. This leads to unstable behaviors when controlling the congestion in networks with...
Mechatrolink-III is a real-time Ethernet protocol designed to achieve high performance with short cycle time. The Mechatrolink-III protocol includes five communication phases: synchronization, cyclic communication, retry communication, C1 master message communication, and C2 master message communication. These communication phases directly affect the cycle time of Mechatrolink-III. This paper analyzes...
Location-tracking is a major privacy problem, especially with high penetration of smart-phones and GPS-enabled devices around the world. In this paper, we propose a Hybrid and Social-aware Location-Privacy in Opportunistic mobile social networks (HSLPO), a collaborative and distributed obfuscation protocol that offers location-privacy k-anonymity. HSLPO discovers the users' own social network and...
A network model with both social and communication characteristics is considered. Different capacity regions are computed as a function of the social network size for each node. It has been shown that as the social connectivity among nodes improves, the likelihood of finding shorter path between source-destination pairs in the network increases which results in increase in the capacity compared to...
In 2009 and 2011, Toorani and Falahati introduced two variants of the classical Hill Cipher, together with protocols for the exchange of encrypted messages. The designers claim that the new systems overcome the weaknesses of the original Hill Cipher, and are resistant to any ciphertext-only, known-plaintext, chosen-plaintext, or chosen-ciphertext attack. However, we describe a chosen-plaintext attack...
Envisioning to meet the expectations arising from the Future Internet, and specifically to provide efficient Quality of Service (QoS) support for multimedia multi-user sessions, the attempts by the research community have resulted in mechanisms such as Multi-User Aggregated Resource Allocation (MARA). The MARA mechanism adopts an over-provisioning centric strategy to control surplus class-based bandwidth...
The IEEE 802.11 standard does not define any feedback policy for the multicast transport. Hence missing multicast packets are not retransmitted and are definitely lost. In this paper we define the Block Negative-Ack (BNAK) recovery policy. Using our protocol, the multicast source transmits a block of multicast packets followed by a Block NAK Request (BNR). Upon reception of a BNR, a multicast member...
The ability to identify anomalous traffic patterns is a central issue for network managers: primarily lots of problems could arise from network attacks, such as viruses and tunneling tools. In this paper we present a detection algorithm able to extract information analyzing features of the network traffic containing attacks. The algorithm exploits statistical methodologies for traffic categorization...
A distributed approach for the economic dispatch of generating units is presented. It is assumed that the generators are connected by a communication graph. Each unit has information about itself, and can exchange information only with a few neighboring units in such a graph. Using graph theory and consensus algorithms, the proposed approach solves the economic dispatch problem in a distributed manner...
This paper presents experimental results of the application of Packet-Based Control approach with dynamic controller on a real plant: the Furuta Pendulum. Despite its easiness of realization, Furuta Pendulum presents some features useful for our purposes, such as pretty non-linear dynamics, unstable equilibrium point and heavy dynamical inaccuracies. The network communication channel has been implemented...
The discipline of linear control in centralized systems has been extensively studied and optimal results can already be found in the literature. However, in recent years, new variants of control systems have appeared, among them control communication networks with various degrees of reliability. Two approaches have been defined to cope with missing control values in such non-ideal networks: output...
We use a categorical topological semantics to examine the Deutsch-Jozsa, hidden subgroup and single-shot Grover algorithms. This reveals important structures hidden by conventional algebraic presentations, and allows novel proofs of correctness via local topological operations, giving for the first time a satisfying high-level explanation for why these procedures work. We also investigate generalizations...
Most electronic auction schemes need assistance of third-party arbitration institution. If the third-party agency conspires with seller or buyer, buyer's bid price and seller's trade secret would be betrayed. Based on the Bit commitment and blind signature, an electronic auction scheme is proposed. The peculiar feature of the proposed scheme is that the third-party agency can be untrusted, namely,...
This paper proposes a new attack method on digital signature scheme. Some signature schemes which have design defect can been broken through this method. In this method, some signature datum will be constructed into identical base datum, anyone could employ this way to attack and forge a valid signature. At the same time, some examples are given to illustrate the status of design defect in these signature...
This paper is concerned with sampled-data consensus of first-order delayed multi-agent systems with delayed-state-derivative feedback. First, the delay decomposition technique is used for obtaining the consensus protocol based on sampled-data. Then, the stability theory of linear systems and the algebra graph theory are employed to derive the necessary and sufficient conditions about the sampling...
Cluster based routing technique is most popular routing technique in Wireless Sensor Networks (WSNs). Due to varying need of WSN applications efficient energy utilization in routing protocols is still a potential area of research. In this research work we introduced a new energy efficient cluster based routing technique. In this technique we tried to overcome the problem of coverage hole and energy...
In wireless sensor and actor networks (WSANs), nodes collaborate to accomplish distributed sensing and computation. One of the most attractive features is that global macro- behaviors in the network emerge from local micro-actions in and interactions between nodes. In this paper, we review a recently proposed approach, which bases on a chemical metaphor and its related theory, to design, analyze,...
A large portion of energy-aware routing protocol for wireless sensor networks are cluster-based. In cluster based approach, energy at the cluster head nodes are drained more rapidly compared to other member nodes. Dynamically change cluster heads periodically could partialy mitigate this problem, but clusters that are far from base station still suffer from large amount of energy for directly transmit...
In this paper, we analyze the current binary partition multi-hop broadcast protocol and propose an enhanced solution, namely, Trinary Partition Black-Burst based Broadcast Protocol (3P3B) for Emergency Message (EM) dissemination. 3P3B provides low and constant latency regardless density and size of networks compared to existing solutions. It also enhances message dissemination speed and message progress...
The heterogeneous multicast networks are the networks with several wireless technologies that provide multicast service. Due to the high data rate of the service, point-to-point (P2P) transmission mode, which is employed by unicast channels, is no longer the best mode because of its inefficiency in power consumption and spectrum utilization. Compared with P2P, point-to-multipoint (P2M) transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.