The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
Extensive use of computer network and huge amount of data had led several works to focus on intrusion detection system, which are based on single dataset or to combine multiple detection techniques to analyze detection rate and false positive flag.
Strict Priority Queuing (SPQ) is a widely used queuing method for applying preferential service on edge networks. SPQ, in presence of persistent high priority traffic, is known to behave in a very hostile manner toward low priority flows, causing them to experience poor TCP performance. This often leads to substantial packet losses, which consequently results in aggressive reduction in the congestion...
The security of industrial control systems has been a big topic by the Stuxnet case in 2010. As a solution which can solve these requirements, data diode has emerged. A data diode is a computer security device that restricts the communication along a network connection between two computers so that data can only be transmitted in one direction. This enables a more sensitive or highly classified computer...
This paper argues that the decentralization feature of Peer-to-Peer (P2P) overlay is more suitable for Volunteer Computing (VC), compared to the centralized master/worker structure in terms of performance bottleneck and single point of failure. Based on the P2P overlay Chord, this paper focused on the design of a workload balancing protocol to coordinate VC. The goal of the protocol was to maximize...
In this paper, the main idea is to establish IoT structure for ubiquitous communications. This structure has been made by data type modelling. Type modeling is useful to construct homogeneous computational pattern. A design cycle has been introduced here. This cycle is a wizard to cluster and insert computational nodes. For IoT intentions, data that should be transmitted to the higher protocol layer,...
We present a new affective-behavioral-cognitive (ABC) framework to measure the usual cognitive self-report information and behavioral information, together with affective information while a customer makes repeated selections in a random-outcome two-option decision task to obtain their preferred product. The affective information consists of human-labeled facial expression valence taken from two contexts:...
This paper proposes a new offline TTP-based fair exchange protocol. The protocol will allow customers to buy physical products (such as computers, furniture, and so forth) from merchants online. The protocol will ensure fairness for both customer and merchant. That is, the customer will get the physical product and the merchant will get the payment or neither does. Only six messages to be exchanged...
NS-2 is the most famous simulator among other network simulators. Most of researchers use NS-2 to evaluate their new protocols/architectures. Although NS-2 has much resource and many available tools to generate different characteristics and network scenarios, source codes created on NS-2 is not able to be reused for real implementation. The releasing of NS-3 changes the way researchers work. NS-3...
This paper describes the implementation of serial communication between the PLC and the host-computer in the control system of waste water pump, gives a detailed introduction to the communication protocols and parameters setting and also gives part of the serial-communication program based on visual basic 6.0. Pratice shows that this control system meets the requirements as expected, attains management...
Sensor networks are composed of many sensors usually far from the region is available. Routing in wireless sensor networks for the transfer of information from sensor nodes to base station is especially important. Optimum consumption of energy is important requirements in wireless sensor networks because sensor systems typically use battery power. In this paper with a routing algorithm to determine...
The size of friction torque and the overall performance of clutch depend on the qualities of disk drives' end runout and radial runout. For the unceasingly increased requirements on detection technology in the domestic auto industry, a detection system which is used for automatic detection on line and automatic data storage has been designed, combined computer technology with the specific requirements...
The method of designing the monitoring system of high-power three-phase inverter based on CAN bus was well introduced. It can monitor remotely and control real-timely the operating parameters and status of high-power three-phase inverter. With experiments testified, it is low-cost, and of good real-time nature and high reliability.
WiDom is a previously proposed prioritized medium access control protocol for wireless channels. We present a modification to this protocol in order to improve its reliability. This modification has similarities with cooperative relaying schemes, but, in our protocol, all nodes can relay a carrier wave. The preliminary evaluation shows that, under transmission errors, a significant reduction on the...
In this paper, we design a improved FTP search engine model which is introduced on the basis of customer feedback information and made server reliability, practical resources, customer neighboring degrees weighted standard in order to ensure that when the search results are too large, in front of the display is always excellent resources.
Chimney-like directory agent service location Protocol and mesh-connection directory agent mesh service location protocol are the two main hybrid service discovery mechanisms. However, it is reasonable to improve network performance by optimizing local unit size from the opinion of both sociology and network optimization. Based on the theory of "small-world network" of Watts and Strogatz,...
Application-level gossip-based broadcast protocols are gaining significant popularity as an interesting alternative to deterministic broadcast algorithms for reliable propagation by providing an attractive tradeoff between reliability and scalability. In addition, many distributed applications require scalable, reliable and causally ordered delivery of broadcast messages to a large number of processes...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
In this paper, we introduce and evaluate ScaleMesh, a scalable miniaturized dual-radio wireless mesh testbed based on IEEE 802.11b/g technology- ScaleMesh can emulate large-scale mesh networks within a miniaturized experimentation area by adaptively shrinking the transmission range of mesh nodes by means of variable signal attenuators. To this end, we derive a theoretical formula for approximating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.