The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a series of novel secure dynamic routing protocols are proposed to provide the end-to-end security. Unlike the existing dynamic routing protocols with security consideration which focus on a certain specific network threat, in the paper the proposed approach is based on a comprehensive network security evaluation framework. By analyzing the threats, vulnerabilities, countermeasures,...
Opportunistic networks are the manifestation of wireless ad-hoc networks where there is no continuous end-to-end path. The forwarding of messages takes place via any nodes that are encountered, and therefore the measurement of message passing efficiency between nodes becomes challenging if a number of different protocols are to be compared and evaluated. Prior work has identified an evaluation framework...
In this paper, we use the NCTUns network simulator to study intelligent traffic signal control algorithms. NCTUns is both a microscopic traffic simulator and a network simulator. We imported the real-life map of a district of the Taipei city into NCTUns to let simulated vehicles move on the roads of the imported map. Then, we used a new and unique feature of NCTUns - each simulated vehicle moves towards...
Wireless sensor networks observe the occurrences of concerned events by the collaboration between sensor nodes via wireless communication. Sensors are usually prone to errors due to the unstable conditions they are exposed to. The goal is to solve event boundary detection with faulty sensors (EBDF) problem which is to successfully identify the sensor nodes close to the event boundary when faulty sensors...
Information-Centric Networking is (ICN) gaining increasingly concerns, as an important direction of the future Internet architecture research. To study the impacts of various cache policies on overall performance of ICN network, we formulate the in- network caching problem of ICN into Mixed-Integer Linear Programming problem. Furthermore, we infer that frequency-based cache policies like LFU are supposed...
Two time efficient simulation methods for the prediction of the conducted and radiated automotive EMC emission tests, respectively, are presented. To verify the correct prediction of the cable bundle model, a novel cable bundle test bench has been developed. It allows a fully automated network analysis with up to 32 ports. Several types of cable bundles are experimentally characterized under stochastic...
This paper presents an extrinsic data compression method for double-binary turbo codes. Frame and extrinsic data memory occupy more area in turbo decoder implementations with the frame size increasing. Besides, non-binary turbo codes have much more extrinsic memory usage than single-binary turbo codes. This proposed compression method utilizes an operation in radix-4 single-binary turbo decoder and...
Vehicular networks are meant to exist wherever the road will take them. This includes small towns, rural highways, suburbs, downtown urban centers, and urban highways. The density of vehicles varies greatly across these environments. This work looks at the effects of implementing Quality of Service (QoS) as well as a relatively similar method that inserts stochastic delays in pseudonym (PN) transmission...
The fixed-complexity sphere decoder (FSD) has been proposed to attain the near-optimal performance achieving the same diversity order as the maximum-likelihood decoder (MLD) recently. However, it suffers great redundant computations resulting in high power consumption. In this paper, we conduct an improved algorithm for the original FSD by using early termination (ET). This algorithm (abbreviated...
Hadoop and the associated MapReduce paradigm, has become the de facto platform for cost-effective analytics over “Big Data”. There is an increasing number of MapReduce applications associated with live business intelligence that require completion time guarantees. In this work, we introduce and analyze a set of complementary mechanisms that enhance workload management decisions for processing MapReduce...
Sensor selection is to pick out an appropriate subset of active sensors for reliable collaborative sensing. Naturally, the selected sensors should be as uncorrelated as possible to have more independent sensing outputs for information fusion. In this paper, various uncorrelation metrics are unified by the concept of Bregman divergence. The sensor selections are then systematically formulated as NP-hard...
This paper details a method involving a series of metrics and visuals designed to assist in the determination of a single design or set of designs' valuable changeability in the era domain of Epoch-Era Analysis (EEA). A brief introduction to the necessary concepts of EEA is included, with references for further information. Examples are provided in the form of a partial case study of a potential orbit-realigning...
We report a study that investigates the role of situation awareness acquisition behaviors and decisional heuristics on mission success in a complex strategic decision making simulation. Thirty-two subjects completed a turn-based counter-insurgency scenario against a simulated adversary. Subjects played the role of a commander whose goal was to stabilize a failing state by allocating resources in various...
The need for service resilience is leading to a steadily growing number of multi-homed Internet sites. In consequence, this results in a growing demand for utilising multiple Internet accesses simultaneously, in order to improve application payload throughput during normal operation. Multi-path Transport Layer protocol extensions - like Multi-Path TCP (MPTCP) for TCP and Concurrent Multipath Transfer...
Interactive learning environments are increasingly used to help people better deal with complex situations. One way to improve decision making effectiveness is to train systems thinking skills using interactive simulations in order to reduce the occurrence of “unintended side-effects” of interventions and catastrophic failures. We present a prototype training procedure intended for military officers...
Multi-objective optimization methods are essential to resolve real-world problems. An artificial bee colony algorithm used to the multi-objective optimization problems is presented. In the algorithm, solutions with a smaller number of dominating solutions and a larger crowding distance are first chosen into the next generation, their vicinity is searched with a higher probability and at self-adjective...
Algorithmic trading (AT) strategies aim at executing large orders discretely, in order to minimize the order's impact, whilst also hiding the traders' intentions. Most AT evaluation methods range from running the AT strategies against historical data (back testing) to evaluating them on simulated markets. The contribution of the work presented in this paper is twofold. First we investigated different...
The novelty of this study is the extension of the relationship among error vector magnitude (EVM), bit-error-rate (BER) and signal-to-noise ratio (SNR) for an AWGN channel to the communication systems subject to nonlinearity in such channels. Particularly, this introductory work attempts to make a connection between the nonlinearity characteristics (i.e., both joint and individual AM-AM and AM-PM...
Due to the increasing complexity modern System on Chip designs are developed by large design teams. In addition, existing design blocks are re-used such that the knowledge about these parts of the design entirely depends on the quality of the documentation. For a single designer it is almost impossible to have detailed knowledge about all blocks and their interaction. We introduce a simulation-based...
The traffic explosion and the variety of applications have complicated network management by exhausting network resources and diversifying SLAs. We propose NMS that optimizes paths to accommodate more traffics and maps logical and physical resources to realize virtual networks of different qualities. Simulation results showed the NMS doubled accommodated traffics.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.