The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose classical control theory to look at the end-to-end congestion control algorithm used by the Transmission Control Protocol/Internet Protocol (TCP/IP). By using this approach we show that classical control modeling using Laplace transforms and Smith's principle give a simple and rigorous model of the role played by congestion window and advertised window variables in today's...
This paper describes Myokit, an open source framework for simulation and analysis of models of cellular cardiac electrophysiology. It is designed to be lightweight, with a focus on model development and model use. The framework consists of a model definition language and a set of tools to manipulate models, run simulations and post-process the results. Single-cell and parallelized multi-cell simulation...
Existing algorithms for orienting sensors in directional sensor networks have primarily concerned themselves with the problem of maximizing the number of covered targets, assuming that target identification as a non-issue. Such an assumption however, does not hold true in all situations. In this paper, a distributed heuristic algorithm for choosing active sensors and orienting them with the goal of...
Self-pruning broadcasting algorithm exploits neighbor knowledge to reduce redundant retransmissions in mobile ad hoc wireless networks (MANETs). Although in self-pruning, only a subset of nodes forward the message based on certain forwarding rule, it belongs to one of the reliable broadcasting algorithm category where a broadcast message is guaranteed (at least algorithmically) to reach all the nodes...
Efficient resource utilization is one of the main concerns of cloud providers, as it has a direct impact on energy costs and thus their revenue. Virtual machine (VM) consolidation is one the common techniques, used by infrastructure providers to efficiently utilize their resources. However, when it comes to large-scale infrastructures, consolidation decisions become computationally complex, since...
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme...
Wireless sensor network (WSN) consists of resource constraint sensor nodes where nodes (sensors) send data to the base station/sink node and communicate with each other by either forming a cluster or without forming a cluster. Data aggregation in WSN takes place at the responsible nodes (aggregators) in a cluster before sending data to the base station, based on the query that is received from the...
Radio Frequency Identification (RFID) technology brings a revolutionary change in warehouse management by automatically monitoring and tracking. Considering the misplaced and newly added tags, fast identifying such unknown tags is of paramount importance, especially in large-scale RFID systems. Unlike existing work, this paper proposes a fast Physical-layer Unknown Tag Identification (PUTI) protocol...
Advances in process technology has enabled the integration of many cores on a single die. The advent of many core systems has led to a commensurate increase in cache coherence complexity. As a solution to this problem, researches have proposed directory based protocols, which are scalable alternatives to snoop-based protocols. Although write-invalidation based directory protocols enhance the performance...
In this paper consensus in second-order multi-agent systems with a non-periodic sampled-data exchange among agents is investigated. The sampling is random with bounded inter-sampling intervals. It is assumed that each agent has exact knowledge of its own state at any time instant. The considered local interaction rule is PD-type. Sufficient conditions for stability of the consensus protocol to a time-invariant...
Peer-To-Peer (P2P) file-sharing protocols have been widely used for distributing massive data over the Internet. To satisfy the requirement of P2P platforms, like BitTorrent, edge devices have to be powered on continuously to either download files or assist other peers to download files, which could lead to the wasted energy, especially for those time-insensitive files such as online games or high-definition...
Several protocols have recently been defined for smart grids that enable the communication between electric devices and energy management systems. While these protocols and architectures can already be applied in different fields of micro grids, it is still not clear how the distributed resources and constraints of such electrical grids can be managed in an optimum way. In order to achieve a reduction...
Power-line communications are becoming a key component in home networking. The dominant MAC protocol for high data-rate power-line communications, IEEE 1901, employs a CSMA/CA mechanism similar to the back off process of 802.11. Existing performance evaluation studies of this protocol assume that the back off processes of the stations are independent (the so-called decoupling assumption). However,...
Threshold load control is one of the key tools in preventing overload in telecommunication networks. Its implementation as hysteretic control mechanism is used for detecting and mitigating congestion in Next Generation Networks, where session initiation protocol is the main signalling protocol. In this paper single-server finite capacity queuing system with constant service time, poisson input flows...
The models of peer to peer protocols are presented with the help of one-step processes. On the basis of this presentation and the method of randomization of one-step processes, it is described method for constructing models of peer to peer protocols. The models of FastTrack and Bittorrent protocols are studied by means of proposed method.
In the last few years, Wireless Sensor Network (WSN) emerges and appears as an essential platform for prominent concept of Internet of Things (IoT). Their application ranges from so-called “smart cities”, “smart homes” over environmental monitoring. The connectivity in IoT mainly relies on RPL (IPv6 Routing Protocol for Low Power and Lossy Network) - a routing algorithm that constructs and maintains...
This paper gives the insights of energy efficiency of sector coded transmission (SCT) protocol for cognitive radio networks. SCT is a cluster head rotation based protocol used for cooperative spectrum sensing in cognitive radio networks. A modified transmission and reception radio model based on SCT is proposed for cognitive radio networks. Further the paper evaluates the effect of number of users,...
The security of a system cannot be certified unless there are formal methods of admission control. Many techniques and protocol have been proposed that try to provide security yet do not focus on the most important question about who has access to the system. When considering group communications it is more important to understand this problem as the security of the system is dependent upon having...
A Secret Handshake protocol provides a method of mutual authentication and key agreement which preserves users' anonymity, and prevents any information leakage to an unauthorized participant as well. Although in recent studies some schemes with desirable properties of “Unlinkability” and “Revocability” were proposed, in most of them unlinkability of revoked credentials or co-called “Backward Unlinkability”...
A Wireless Sensor Network (WSN) consists of thousands number of sensor nodes which have constraints on computation, energy and memory resources. Limited energy resource affects the lifetime of the WSNs. Hence many protocols have been proposed to reduce energy consumption. LEACH is one of the most popular clustering protocols with the aim of maintaining the energy efficiency of sensor nodes. Almost...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.