The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a promising direction of future Internet, Content-Centric Network (CCN) has attracted world-wide attention. In-network caching is an important feature of CCN network, which has significant impacts on the performance of content transmission. Existing researches on in-network caching either have no regard for the collaboration or need giant additional overhead for global optimization. This paper...
This paper describes a simple process for the generation of arbitrary probability distributions of complex data with correlation from sample to sample, optimized for hardware in the loop radar environment simulation. Measured radar clutter is used to evaluate the accuracy of the method, as well as the degradation in accuracy for both the clutter magnitude probability distribution and Doppler spectrum...
Monitoring and sensing of spectrum are becoming more and more important, as the subject of using underused TV White Spaces (TVWS) spectrum by software defined radios (SDR) and cognitive radios is advanced forward towards practical applications. Correctly identifying available TVWS bands is critical for success of TVWS based broadband communications, not causing interference to reception of TV broadcast...
A simple method for the measurement of complex permittivity is presented using an open TEM (Transverse Electro-Magnetic) cell. The scattering parameters of the TEM cell are measured with and without a rectangular sample of the material under interest in the cross section of the cell. Then the principle is to run a FDTD (Finite Differences Time Domain) simulation of the measurement setup and find the...
This paper overviews the measurement and simulation of the electric parameters of a small stripline. The stripline was designed and built for electromagnetic compatibility (EMC) testing of small electronic devices with the accent on electromagnetic immunity (EMI) testing. The paper describes the measurement of electric field inside the stripline in an anechoic chamber and the simulation using parametric...
Modern software and hardware designs are mostly hierarchical. Moreover, while the design specification is defined up-down, the design implementation and verification are done down-up. In such a case, as a rule, coverage properties for simulation-based verification are defined inconsistently for different stages of the design flow. The fact leads to the well known explosion of bug rate, when we pass...
Evaluating the performance of a computer system requires the use of representative workloads. Therefore it is customary to use recorded job traces in simulations to evaluate the performance of proposed parallel job schedulers. We argue that this practice retains unimportant attributes of the workload, at the expense of other more important attributes. Specifically, using traces in open-system simulations...
Innovative method of a real time measuring of drive systems operational parameters is presented. Such systems are commonly used in transportation vehicles working in cooper mines. Cardan shaft with strain gauge bridge was used as autonomous torque transducer, transmitting remotely measuring data in real time to the master system for data acquisition.
Critical infrastructure's (CI) (electricity, heat, water, information and communication technology networks) security, stability and reliability are closely related to the interaction phenomenon. Due to the increasing amount of data transferred, increases dependence on telecommunications and internet services, the data integrity and security is becoming a very important aspect for the utility services...
Vehicular Ad-hoc Network is gaining the attention of researchers because of the technological advancements for developing an Intelligent Transportation System (ITS). The dynamic nature of vehicles (nodes) leads to frequent path breaks and network fragmentation. Therefore, routing has become a critical issue in inter-vehicle communication. Location management in VANETs is considered as a critical issue...
We evaluate a routing metric, called TXPFI, which captures the expected number of frame transmissions needed for successful delivery of data in Wireless Sensor Networks (WSNs) featuring non-fully cooperative nodes and unreliable links. The study, which addresses the exploitation of the TXPFI in routing protocols of distance-vector type, assesses the impact of different network settings on the performance...
Mobile Ad Hoc Networks (MANETs) use many different routing protocols to route data packets between nodes. These routing protocols are designed taking for granted that all nodes are cooperative and willing to forward control and data packets from and to other nodes. However, when selfish nodes exist in the network, the network performance may degrade significantly. In previous research, selfish nodes...
Due to intermittent connectivity and uncertain node mobility, opportunistic message forwarding algorithms have been widely adopted in delay tolerant networks (DTNs). While existing work proposes practical forwarding algorithms in terms of increasing the delivery rate and decreasing data overhead, little attention has been drawn to the control overhead induced by the algorithms. The control overhead...
This research estimates the minimum intervention distance needed for a vehicle to safely avoid an obstacle, while also preventing wheel lift and tire skid. The intervention strategy considered is an open-loop lane change avoidance trajectory. As the vehicle approaches the obstacle, it continually determines the available lane change maneuver, relying on predictions of the Zero-Moment Point (ZMP) metric...
Recently we proposed a simple, computationally inexpensive multi-agent simulation strategy to understand drop movement in a microchannel with Hele-Shaw flow geometry (2D). This has helped us understand the collective behavior of the drops in these systems. However, transitioning these systems to practice would require that strategies are developed to combat the inherent fluctuations that are a part...
While the services-based model of cloud computing makes more and more IT resources available to a wider range of customers, the massive amount of data in cloud platforms is becoming a target for malicious users. Previous studies show that attackers can co-locate their virtual machines (VMs) with target VMs on the same server, and obtain sensitive information from the victims using side channels. This...
Wireless Sensor Networks (WSNs) often need to operate under strict requirements on energy consumption and be capable of self-adapting to the presence of non-trusted nodes which do not fully cooperate in the packet forwarding operation. In such an environment, the mechanism employed for the calculation of routing paths of minimum cost in terms of the number of transmissions executed for the reliable...
In this paper, we used our proposed and implemented system based on Hill Climbing algorithm, called WMN-HC for mesh router node placement in WMNs. We evaluate and compare the performance of the proposed system for different movement methods. We took into consideration Normal and Uniform distributions of mesh clients. We use as evaluation metrics giant component and number of covered mesh clients....
A threshold based Schnorr-Euchner (TSE) sphere decoder (SD) is presented in this paper to reduce the high computational burden incur in multiple input multiple output (MIMO) decoding. The proposed method makes use of the probabilistic threshold for SE enumeration to remove the nodes which are most unlikely to be an ML solution. The threshold is chosen using the pruning probability based on noise statistics...
In this paper, we evaluate privacy preservation capability of biometric hashing methods. Although there are some work on privacy evaluation of biometric template protection methods in the literature, they fail to cover all biometric template protection methods. To the best of our knowledge, there is no work on privacy metrics and assessment for biometric hashing methods. We use several metrics under...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.