The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks. However, previous work did not give much consideration to the negative effects that IP address mutation could bring to network performance. To be specific, there is a trade-off between network performance and security, which implies that when a...
We study in this work user impatience by adopting a realistic realization: a user gets impatient when its throughput falls below a certain threshold for a given patience duration. We model such a behavior in a cellular network, transporting elastic flows, for a realistic user configuration with random arrivals, following a Poisson process, and departure after a finite duration, either upon transfer...
In this paper, we propose Access Point Channel Capacity (ACC) as a Key Performance Indicator (KPI) for Radio Resource Management (RRM) algorithms in 802.11 Wireless Local Area Networks (WLANs). Introducing such a KPI is important especially for performance evaluation of 802.11 WLAN Self Organizing Networks (SON). ACC is a low complexity KPI that provides accurate per-AP estimate of the MAC layer potential...
In this paper, we propose solutions to the transmission mode selection and resource allocation problems for D2D unicast communications. We first formulate a joint mode selection and resource allocation problem, which we further decompose into separate mode selection and resource allocation problems, which are run at different timescales. Our mode selection algorithm determines the optimal transmission...
We consider a cognitive radio network of nodes with full duplex capability where Self-Interference Suppression (SIS) is not perfect. We have proposed a new scheme for sensing and transmission of Secondary Users (SUs) with two modes of operation; Cooperative Sensing (CS) mode and Full Duplex Transmit and Receive (FDTR) mode. Cooperative sensing is applied to reduce misdetection probability and to avoid...
Tools and applications for event stream processing and real-time analytics are getting a huge hype these days on a wide range of application scenarios, from the smallest Internet of Things (IoT) embedded sensor to the most popular Social Network feed. Unfortunately, dealing with this kind of input rises some issues that can easily mine the real-time analysis requirement due to an unexpected overload...
Data deduplication is a lossless compression technology that has been widely used in storage systems for space optimization. However, due to the removal of redundant data, the data deduplication has negative influences on data writing, data reading and data reliability. In this paper, we propose a multi-objective based performance evaluation framework to analyze the data deduplication performances...
In a multi-hop wireless network, a node can act as a candidate file provider to other nodes, if it has downloaded the file from the Internet. When another node requires the same file, all nodes which have already obtained the file can act as candidate file providers (sources) and transmit file together to the request node (destination). We form this as the multi-source transmission. As the multi-source...
This paper addresses the optimization of a multicell network where each cell needs to select precoding matrices for beamforming in a distributed way. A modified version of the adaptive min-sum algorithm that considers reduced-size messages in the message-passing procedure is proposed. The message-passing technique, where each message is reduced to convey only part of usual information, is applied...
This study introduces the concept of uncertainty analysis of Neutrosophic Theory in the sphere of Maintenance Operating System (MOS). The aim of this study is to underline the importance of uncertainties solving in Maintenance Operating System. In maintenance process appear ambiguous states that can't be assimilated neither true, nor false, meaning that the threshold state is a neutral one, being...
The growth in world trade is doubling every 5–7 years with a corresponding increase in cargo container movements most of which are handled by seaports. Moving more traffic through the limited area of a seaport can only be achieved by an increase in port performance. Ship owners, terminal operators and forwarding agents each have optimized their performance guided by values collected on key performance...
In today's data centers, storage hardware is getting virtualized and shared across multiple tenants. The storage virtualization is expected to significantly increase resource utilization, and consequently provide infrastructure providers with tremendous cost savings. In a shared environment, however, demanding tenants can severely impact the IO performance of co-located tenants. Therefore, in order...
This paper proposes a novel and highly scalable multistage packet-switch design based on Networks-on-Chip (NoC). In particular, we describe a three-stage Clos packet-switch fabric with a Round-Robin packets dispatching scheme where each central stage module is an Output-Queued Unidirectional NoC (OQ-UDN), instead of the conventional single-hop crossbar. We test the switch performance under different...
The paper presents a methodology proposal for testing and evaluation of communication systems in Smart Grids, especially for Power Line Communication (PLC) systems. The PLC technology is widely used in power grid as a part of Advanced Metering Infrastructure (AMI) allowing mainly data transfers between a management system at utility and customer-premises smart meters. However, the PLC technology on...
Dynamic adaptive video over HTTP (DASH) is fast becoming the protocol of choice for content providers for their online video streaming delivery. Concurrently, dependence on cellular Long Term Evolution (LTE) networks is growing to serve user demands for bandwidth-hungry applications, especially video. Each LTE base station's (eNodeB) scheduler assigns wireless resources to individual clients. Several...
This paper considers a problem of user and access point associations in heterogeneous wireless networks consisting of multiple radio access technologies. We propose a strategy for optimizing the problem that aims at maximizing the total minimal utility of users in the longer term. The minimal utilities can be obtained from bare essentials of the quality of experience and defined by considering different...
The rapid growth of high-speed transit systems, such as High Speed Rail (HSR), is putting considerable pressure on TCP-based data transmission. It is well known that TCP is suffering from severe throughput degradation in high-speed mobility scenarios. The root cause at the transport layer however remains unclear and largely undetermined to date. In this paper, we aim to pinpoint the throughput bottlenecks...
Electromagnetic spectrum is a scarce resource. Spectrum licensing is estimated to consume about 20% of cellular operators' capital expenditure (CAPEX). One important measure of spectrum use is “spectral efficiency” (SE), which is the amount of data bandwidth that a specific technology can extract from a certain amount of radio spectrum and is measured in bits per second per Hz (bps/Hz). Using data...
A large number of routing protocols for Cognitive radio networks (CRNs) have been proposed recently, each based on different design goals, and evaluated in different scenarios, under different assumptions. In our previous work, we conducted the first extensive empirical performance study of routing protocols for CRNs-Coolest Path, SAMER, and CRP — under the same realistic set of assumptions. Our study...
In this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider the scenario where a secondary transmitter sends confidential messages to a secondary receiver subject to an interference constraint set by the primary user. We design two transmission protocols under different channel knowledge assumptions at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.