The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a method to localize multiple sources using randomly distributed wireless sensor nodes. The principle of maximum power collection is used to obtain the beamforming weights which add the source signal constructively at the sensor outputs. The beamforming weights give the time difference of arrival (TDOA) for each of the sources from which the source location is subsequently...
Our paper focuses on two aspects of certifying a cloud-based network system: i) metrics to quantify the dependability of cloud-based applications; and ii) identifying techniques to measure these metrics prior to deployment of applications. We treat system dependability as an application-level QoS for management purposes, and advocate a probabilistic evaluation of dependability. Our approach is corroborated...
We outline the methods for autonomic management of device replication in a voting-based data collection system to deal with situations where the available network bandwidth may fluctuate and/or the device fault parameters may change unpredictably. We model the voting system as a ‘black-box’ with prescriptive I/O behaviors, wherein a management module exercises a macroscopic control of the voting box...
In this paper, we formulate a framework that solves the offline physical layer impairment-routing and wavelength assignment (PLI-RWA) issue in translucent networks. The novelty of the work lies in (1) applying the innovative PLI-signal quality and delay aware RWA (PLI-SQDARWA) algorithm, and (2) a delay analysis proposal that justifies the concept of latency awareness in translucent networks. The...
When the Internet emerged more than two decades ago, it changed everything. But the Internet of Everything makes that pale in comparison. After two decades of networking and communication, 99% of things are still not networked. The Internet of Everything will disrupt several industries. That means new opportunities, businesses, experiences, and services, and big opportunities for people, companies,...
3GPP has introduced LTE Femto cells to handle the traffic for indoor users and to reduce the load on the Macro cells. However, the current LTE Femto based system is not able to utilize the spectrum efficiently. Hence, we propose a new spectrum allocation method which dynamically allocates the spectrum between Macro and Femto cells and dynamically inside Femto regions based on user traffic demands...
Public goods game has been defined as a standard of experimental economics. As the game is defined, the players secretly choose how many of their private tokens to put into a public pot. The tokens in this pot are multiplied by a factor (>1) and this "public good" payoff is evenly divided among players. In addition to the payoff, each player also keeps the tokens they do not contribute,...
In a heterogeneous networking environment vertical handover decision plays a very crucial role in the overall handover process as wrongly selected network spoils the overall purpose of Always Best Connected (ABC). For it many decision models, based on diverse parameters and techniques, have been proposed. In this paper, following two requirements which most of such models require are emphasized: a)...
In 2010 Anil k Sarje et al.[2] shown that Xu et al. [1] scheme is vulnerable to forgery attack and proposed an improved scheme. In this paper we will show that Anil k Sarje et al. scheme cannot prevent any of the attacks they claimed that their scheme will prevent. We then present our improved scheme to overcome the vulnerabilities stated in Anil K Sarje et al. scheme and various other dynamic Identity...
Construction of the smart grid network infrastructure is in the process of being laid out worldwide with the goal of energy efficiency from power generation to distribution. Making a smart grid work requires an array of enabling technologies, one of them being an integrated communications system. Smart meter plays a vital role in this communication system. Apart from sending and receiving regular...
In this paper, we propose a novel positioning methodology for a moving observer vehicle to estimate the location of a target vehicle without having to rely on fixed roadside infrastructure units (RSU) as reference nodes. It also enables the moving observer vehicle to verify the GPS assisted location claims by the target vehicle. The proposed method exploits the periodic retransmission of beacons as...
We outline the design of a system to exploit the TV whitespaces for dynamically gathering video feeds from public buses in a city. The system consists of the following components: (1) A FPGA based SDR board to be fixed on buses to collect the video feed from inside the bus and transmit it to the central location, (2) An open source software (GNU-radio) to configure and control the hardware and, (3)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.