The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Mobile data traffic is growing daily and this presents a significant challenge as the broadcast nature of wireless channels makes it extremely vulnerable to security breaches. A recent report of NSF has estimated 78% of large organisation and 63% of small business are attacked annually, and these figures will continue to increase making the wireless security concerns worldwide. As a consequence, security...
Recent research and development of hardware architectures and technologies over MHz-through-THz frequency range have generated a significant momentum for future wireless applications. This leap forward is being propelled by the organic fusion of multiple functional and multiple dimensional transceiver integration based on multiple technologies through heterogeneous materials and innovative processes...
Data traffic volume including video transmission is increasing exponentially over the past decade. The demand for ultra-high speed wired and wireless communication systems is also growing in an unprecedented pace. In providing ultra-high data transmission rate as well as reliable communications, error correction codes are playing an ever important role. They can ensure received data being highly reliable...
In this paper, we analyze the TCP Cubic throughput performance over a Nakagami-m slow-fading wireless channel with impacts of adaptive modulation and coding (AMC) schemes. The loss event, which includes a transport-layer congestion loss and physical-layer random packet loss is first analyzed thanks to corresponding finite-state Markov models. The average normalized throughput can be, thus, calculated...
One-class support vector machines (OCSVM) have been recently applied to detect anomalies in wireless sensor networks (WSNs). Typically, OCSVM is kernelized by radial bais functions (RBF, or Gausian kernel) whereas selecting Gaussian kernel hyperparameter is based upon availability of anomalies, which is rarely applicable in practice. This article investigates the application of OCSVM to detect anomalies...
In this paper, we have investigated the impact of optical regeneration on elastic optical networks that are capable of providing dynamically optical paths with flexible bandwidths. We have evaluated and compared the performance, in terms of the overall blocking probability and the total accommodated traffic volume, of three possible network scenarios with regeneration capability including 1) no regeneration,...
OpenFlow/Software-Defined Networking (SDN) is a new networking paradigm that virtualizes network infrastructure by decoupling the control and data plane logic of traditional network devices. The controller of SDN has the overall look about network topology and hence provides flexibility to network operators to implement its own routing approaches. However, it could not control the way client works...
The increasing use of high-quality Cloud-based services makes Cloud providers provide their customers with a higher quality for every service. In which, Service Level Agreements (SLAs) between users and Cloud providers become a key factor which is carefully considered before running any service or application. Thus, Cloud providers always deal with the challenge of quality of service (QoS), especially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.