The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deploying nurses based on fixed shift could mitigatescarce availability during peak now of patients. but idletime should be resolved. This paper presents the llllalysis ofnurses scheduling for minimal cost and reduced patientwaiting time. An acute care unit of a local hospital is thecase study. The main sources to collect the data arehistorical data of paticn ts' medical records as well as staffactivity...
Although numerous solutions have been proposed to the sensor area localization problem, most of them are aimed at two-dimensional (2D) planes rather than the three-dimensional (3D) scenarios in real world applications. This study presents a novel approach to indoor localization of a mobile object that is equipped with sensors and cameras by utilizing Building Information Modeling (BIM) and 3D stereo...
Scalability of a multi-tier enterprise system is limited by the presence of software and hardware resource bottlenecks. These bottlenecks typically occur at larger number of users. It would help enterprise applications significantly if these bottlenecks are known a-priori during the performance testing itself. This paper deals with predicting the performance of such systems and models an application...
This paper proposes a method for optimizing bandwidth usage in Software Defined Networks (SDNs) based on OpenFlow. Flows of small packets presenting a high overhead, as the ones generated by emerging services, can be identified by the SDN controller, in order to remove header fields that are common to any packet in the flow, only during their way through the SDN. At the same time, several packets...
Commodity hardware can be used to build a software router that is capable of high-speed packet processing while being programmable and extensible. Therefore, software routers provide a cost-efficient alternative to expensive, special hardware routers. The efficiency of packet processing in resource-constrained nodes (e.g. software routers) can be strongly increased through parallel processing with...
The Domain Name System belongs to the core services of the Internet infrastructure. Hence, DNS availability and performance is essential for the operation of the Internet and replication and load balancing is used for the root and top level name servers. This paper proposes an architecture for credit based server load balancing (SLB) for DNS. Compared to traditional load balancing algorithms like...
Terminal-to-terminal communication technology has been studied to make communication and information distribution possible in an area, where communication infrastructure has been damaged or is not present, such as disaster area or rural area. Since mobile communication devices have short transmission range and high mobility owing to it bringing held by human beings, the network consisting of those...
One of the most common types of attacks on reputation systems is made by reporting unfair ratings. They can be performed by the individual malicious members or by a group of agents forming a coalition and cooperating together in order to achieve particular purpose (e.g., to gain higher position in the community or to discredit the competition). Due to the fact, that such attacks are performed often...
In simulating large parallel systems, bottom-up approaches exercise detailed hardware models with effects from simplified software models or traces, whereas top-down approaches evaluate the timing and functionality of detailed software models over coarse hardware models. Here, we focus on the top-down approach and significantly advance the scale of the simulated parallel programs. Via the direct execution...
This paper proposes a QoE (Quality of Experience) assessment model which can estimate voice and video quality. Based on the proposed model, speech or video quality is calculated with regard to policies applied for packet processing by routers and to the level of total network utilization. The contribution of this paper lies in designing a new computational model capable of predicting the quality of...
Ad-hoc networks allow nodes communication without an infrastructure, so they can be used in many environments. This lack of infrastructure introduces many security threats to the nodes in the network. Communication between nodes must be reliable, and protocols for MANETs need to make it possible. Due to the wireless channel and to the possible malicious behavior of nodes, it is necessary to introduce...
In this paper, we design a simulator using Matlab/Simulink that evaluates the anti-jamming capability of a tactical data link (TDL) system, called Link-16. We analyze the BER performance of the Link-16 simulator over partial-band noise jamming. Especially, we consider a TDL system with the cognitive anti-jamming capability that senses the jamming signal and opportunistically avoids the jamming spectrum...
The performance of wireless sensor networks (WSNs) in industrial applications may be degraded due to harsh radio signal propagation conditions. Mobile heavy machines and large metal and concrete surfaces usually worsen the signal fading effects resulting in deep fades. We have studied the effects of certain industrial environmental disturbances on the quality of the transmitted signals in real-life...
The prominence of cloud computing that provides resources on demand to various types of users including enterprises as well as engineering and scientific institutions is growing rapidly. An effective resource management middleware is necessary to harness the power of the underlying distributed hardware in a cloud. The resource manager needs to be able to effectively perform mapping (matchmaking and...
The popularity of clouds is growing rapidly. Research on cloud computing has stared considering Service Level Agreement (SLA) characterized by an earliest start time, runtime and a deadline for completion with a request for job execution submitted to the cloud. Estimates of request runtimes provided by users are often error prone. Both overestimation and underestimation of request runtimes are detrimental...
Nowadays one of the hot themes in wireless environment research is the application of the newest technologies to road security problems. The interest of companies and researchers, with the cooperation of car manufactures, brought to life and promoted the Vehicular Ad-Hoc Network (VANET) technology. In this work an innovative security system based on VANET architecture is proposed. The system is capable...
In the last years, the interest on vehicular networking has incredibly increased in the scientific and industrial community, due to the enormous potentialities that this emerging technology offers. In this context, routing protocols become fundamental for enhancing QoS, related to the different services offered to final users. The implementation of new routing protocols becomes challenging in VANETs...
A multi-frame Neighbor Discovery Protocol over a DTN network with RFID Devices is proposed. This protocol is based on a Sift-distribution (s-Persistent) in order to differentiate the access probability to slots among RFID devices. Moreover, our approach has been considered in a mono-frame and multi-frame scenario. Our s-Persistent approach is applied in a simulated test and in a real test-bed in order...
When designing new Vehicular Network (VN) pro-tocols, the cost and time required for deploying real prototypes to run tests and evaluate new proposals becomes excessive. Consequently, simulation plays a key role in Vehicular Networks development. Simulation models and tools have been improved to better mimic the different factors that affect communications in real world scenarios. In terms of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.