The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The variety of existing cloud services creates a challenge for service providers to enforce reasonable Software Level Agreements (SLA) stating the Quality of Service (QoS) and penalties in case QoS is not achieved. To avoid such penalties at the same time that the infrastructure operates with minimum energy and resource wastage, constant monitoring and adaptation of the infrastructure is needed. We...
Online or web advertisement(ad) is the prime source of income for search engines. Revenue generated through web advertisement depends on the number of times user clicks on ads. To increase revenue search engine selects best ad from pool of ads. So, ads of good quality score has more chances of getting selected by search engine. It is very difficult to calculate quality of new ads as they have no historic...
As recently seen in Google's Gmail, the messages in inbox are classified into primary, social and promotions, which makes it easy for the users to differentiate the messages which they are looking for from the bulk of messages. Similarly, a users wall in facebook is usually flooded with huge amount of data which makes it annoying for the users to view the important news feeds among the rest. Thus...
6LoWPAN being one among the enabling technologies of the vision, Internet of Things, brings forward the sensor networks into the world of Internet through the effective implementation of IPv6 on constrained devices. Even then, inorder to avail the numerous services provided by the sensor networks ubiquitously and with ease, there is a need to be cognizant of the available services, identity of nodes...
Community detection in social network is a prominent issue in the study of network system as it helps to understand the structure of a network. A member of a social network can be part of more than one group or community. As a member can be overlapped between more than one group, overlapping community detection technique need to be considered in order to identify the overlapping nodes. Clique percolation...
Social network is strongly expanding in all over the globe, it is being an indispensable part of the online world, so social network advertising is a potential market for the business propensity. Hence, researches on the adoption models of online advertising on social network are essential work. This study proposes a structural model of online advertising on social network adoption to overcome the...
International Telecommunication Union (ITU-T) has laid down broad principles for the convergence of packet and optical platforms through a series of Optical Transport Network (OTN) protocols. Convergence of multiple services in order to use a common transport layer has emerged as an attractive solution to bring down the capital expenditure and operational costs. In this paper an Integer Linear Programming...
Intrusion Detection and Prevention Systems (IDPSs) are used to detect malicious activities of intruders and also prevent from the same. These systems use signatures of known attacks to detect them. Signatures are identified through pattern matching algorithm which is the heart of IDPSs. Due to technological advancements, network speed is increasing day by day, so pattern matching algorithm to be used...
Cross-layer models are becoming popular in various wireless networking domains due to their realistic predictions and for fundamental understanding of the interaction between adjacent networking layers. A combined PHY/MAC layer energy consumption model is considered here for short range IEEE 802.15.4 networks for non-beacon-enable mode in case of dual hop transmission under Rayleigh fading channel...
An important factor that affects the performance of battery operated real-time and embedded systems is Energy. Various techniques have been employed to limit the energy dissipation. Dynamic voltage and frequency scaling (DVFS) is one of the most popular techniques for energy conservation in such systems and is a well researched area. This paper presents an energy conscious real-time scheduling algorithm...
Energy efficiency, fault tolerance, scalability, connectivity and reliability are major challenges in wireless sensor networks. Many clustering algorithm are proposed to handle these challenges. Heterogeneous schemes are similar to real situations. Many routing protocols have been proposed for clustering scheme based on heterogeneity. In this paper, an Energy Efficient Two Level Distributed Clustering...
All-to-all broadcast refers to the process by which every node inherently communicates to every other node in the network. The all-to-all broadcast problem seeks a broadcast tree scheme using minimum unique cast tree (MUCT) with minimum energy consumption. The “minimum all-to-all power broadcast problem is NP-Hard”. This work proposes an energy efficient heuristic to find minimum all-to-all power...
Networking together of hundreds to thousands of limited energy battery powered nodes derive a Wireless Sensor Network (WSN). The use and applicability of WSNs has increased in vivid areas like vehicular movement, weather monitoring, security and surveillance, industry applications etc. The limited powered nodes in WSNs sense the environment and send the desired information to a processing centre (base...
Free Space Optical (FSO) Wireless Sensor Networks (WSN) are immune to electromagnetic interference, license-free and are characterized by high bandwidth and ease of deployment. They face a major drawback in turbulent atmospheres. So, we consider hybrid FSO/RF energy-aware WSN with reliable data communication using ECC (Error Control Coding) methods. LT codes are a class of rateless codes used for...
With the advancement of technology, there is a growing desire to provide support for real time multimedia services over wireless ad hoc networks. These applications demand strict Quality-of-Service (QoS) guarantees by the underlying network in terms of delay, delay variance and packet loss. However, limited battery life of the nodes in a wireless network poses significant challenges in finding QoS...
One of the main challenges in Machine Type Communication (MTC) services in the 3GPP LTE networks is to improve device power efficiency for Machine to Machine (M2M) communication. We consider MTC application scenarios which consist of a number of devices connecting to the network concurrently. The methods considered in TR 37.868 involve Disjoint Allocation (DA) and Joint Allocation (JA). The DA scheme...
Quality of Service (QoS) is an important network performance parameter having significant impact on real time applications like VoIP, Interactive gaming and Video Streaming. Although IPv6 was designed to improve addressing, security and QoS in IPv4, services like Video Conferencing and VoIP with strong reliance and sensitivity towards delay and jitter pose a daunting challenge in today's packet based...
Packet classification is a well-researched field. However, none of the existing algorithms works well for very large rule-sets up to 128K rules. Further with the advent of IPv6, number of rule field bytes is going to increase from around 16 to 48. With higher number of field bytes, both memory usage and classification speed is affected badly. EQC16 attempts to solve this particular problem. It borrows...
RFC (Recursive Flow Classification) is one of the best packet classification algorithms. However, RFC has moderate to prohibitive high preprocessing time for rule-sets having more than 10K rules. RFC does not provide incremental update. Due to these essential missing features, RFC is used in limited scenarios. This paper attempts to add these essential features in RFC. Our algorithm uses various memory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.