The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security module. Through analyzing the overall survivability of storage systems, and importing survivable requirement into the design phase of storage systems, security and other attributes is easily...
While Performance Enhancement Proxy (PEP) is a promising solution for TCP's performance issues over satellite links, it has a serious constraint in terms of a translation table limit of 500 entries that proved to be detrimental when a large number of TCP sessions need to be maintained between endpoints. We experienced one of these cases in Saudi Aramco where web-based drilling applications were establishing...
Multimedia communication networks, such as the Internet, are heterogeneous in their nature due to the usage of different methods for content distribution. The efficiency of multimedia distribution depends on the variety of communication protocols that are simultaneously running (composed) over different network hosts in order to resolve packet conflicts. A very natural question that arises in such...
Underwater wireless sensor networks (UWSNs) are prone to message loss due to their poor link condition with high bit error rate (BER). Retransmission-based mechanisms such as ARQ can be used for the reliability, however, they are not suitable for UWSNs due to the inherent long propagation delay of UWSNs. Therefore, a forward error correction (FEC) mechanism might be an alternative in order to guarantee...
Dealing with life threatening situations demands efficiency and effectiveness of operations including optimizing the emergency response time, and utilizing resources and personnel as best appropriate for each incident. In this paper, we look at the efforts of the regional Emergency Medical Department (EMD) of Crete to introduce new technologies for optimizing emergency response, including the computerization...
Recent advances in wireless sensor networks have led to many new routing protocols where energy awareness and reliability are the important consideration. The paper analyzes the cluster-based and gradient-based routing protocol in wireless sensor network. The advantages and limitations of protocols have been found. For improving the ability of protocol, an improved clustering routing protocol is proposed...
Lifetime of a wireless sensor network is affected by key factors such as network architecture, network size, sensor node population model, data generation rate, initial battery budget, and communication protocols. We investigate accurate lifetime estimation of large sensor networks using discrete event simulation. Our experimental networks are large IEEE 802.15.4 compliant wireless sensor networks...
In this paper, a structure health monitor (SHM) system for the bridge is introduced, of which wireless communication and embedding techniques are deployed. After summing up the wireless communication techniques and time synchronization requirements in practical application, a data transfer protocol based on clock synchronization and reliability in wireless sensor networks is proposed, and then its...
Reliability as well as fault-tolerance is a fundamental issue for the development of robust mobile agent system. A number of research works is done in these areas. Some researchers adopt the use of spatial replication based approach since it can reduce blocking possibility of mobile agent execution. Unfortunately, this fault-tolerance scheme is not cost effective because it incurs great costs of time...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. While peer-to-peer (P2P) networks are capable of recruiting a large number of participants, reliable anonymous communication in these architectures, with low bandwidth usage, still needs further investigation. This paper presents...
Modular voltage source converter has drawn great interest in high power applications. To achieve higher system control reliability and multi-functionality, a modular digital controller architecture is proposed in this paper that will facilitate the concept of modular converter. It can be reconfigured to multiple-node high power converter applications. A hybrid multitap bus and inverse-star structure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.