Netw. Protoc. Algorithms最新文献

筛选
英文 中文
ZigBee Based Optimal Scheduling System for Home Appliances in the United Arab Emirates 基于ZigBee的阿联酋家用电器优化调度系统
Netw. Protoc. Algorithms Pub Date : 2015-08-02 DOI: 10.5296/npa.v7i2.7676
Abrar Khameis, Shaikhah Rashed, A. Abou-Elnour, M. Tarique
{"title":"ZigBee Based Optimal Scheduling System for Home Appliances in the United Arab Emirates","authors":"Abrar Khameis, Shaikhah Rashed, A. Abou-Elnour, M. Tarique","doi":"10.5296/npa.v7i2.7676","DOIUrl":"https://doi.org/10.5296/npa.v7i2.7676","url":null,"abstract":"In this paper a smart energy management system for home appliances has been presented. Based on hourly load data the system sets an optimal schedule for the operation of the home appliances. The paper is presented in two parts. In the first part a cost function has been derived based on practical data provided by two utility companies. In the second part an optimal scheduling system has been proposed for the home appliances based on the derived cost function.  A wireless system based on ZigBee and LabVIEW has been integrated with the proposed system so that the home appliances can be controlled and monitored according to the proposed optimal scheduling. The simulation results show that energy consumption in a household can be reduced by 30% by using the proposed system. In addition, the system is designed with enough flexibility so that it can support users’ own cost functions.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security and Surveillance System for Drivers Based on User Profile and learning systems for Face Recognition 基于用户档案的驾驶员安全监控系统及人脸识别学习系统
Netw. Protoc. Algorithms Pub Date : 2015-04-30 DOI: 10.5296/npa.v7i1.7151
L. Cherrat, M. Ezziyyani, Annas E. L. Mouden, M. Hassar
{"title":"Security and Surveillance System for Drivers Based on User Profile and learning systems for Face Recognition","authors":"L. Cherrat, M. Ezziyyani, Annas E. L. Mouden, M. Hassar","doi":"10.5296/npa.v7i1.7151","DOIUrl":"https://doi.org/10.5296/npa.v7i1.7151","url":null,"abstract":"Despite the large and spectacular development in the field of vehicle safety, particularly in the context of driver safety needs, solutions remain insufficient and independent. In this paper, we propose a new system that has been dubbed 3SD \"Security and Surveillance System for Drivers\". It is a multifunction system as a complete package based on intelligent sensors and cameras that constantly monitor the vehicle's environment and the behavior of the driver to detect early so potentially dangerous situations. In critical driving situations, these systems alert and actively help the driver; if necessary, they automatically intervene to prevent or mitigate the consequences of an accident. The package proposed includes an application comprising a set of pre-registered drivers in a specialized social network interconnected to a geolocation server for distributed real-time sharing of information and data useful for security and traffic. The system is based mainly on learning systems for face recognition based on advanced algorithms Viola and Jones, PCA and management of drivers profiles based on preferences to provide the following features: early detection of sleep, unconsciousness and poor driver behavior, security against theft of vehicles, driver comfort and control and sharing of traffic information in real time between the conductors.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131105542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Bloom Filter with the Integrated Hash Table Using an Additional Hashing Function 使用附加哈希函数的集成哈希表的布隆过滤器
Netw. Protoc. Algorithms Pub Date : 2015-04-30 DOI: 10.5296/npa.v7i1.6240
M. Ahmadi, Reza Pourian
{"title":"A Bloom Filter with the Integrated Hash Table Using an Additional Hashing Function","authors":"M. Ahmadi, Reza Pourian","doi":"10.5296/npa.v7i1.6240","DOIUrl":"https://doi.org/10.5296/npa.v7i1.6240","url":null,"abstract":"A Bloom filter is a simple space-efficient randomized data structure for representing a set in order to support membership queries. In recent years, Bloom filters have increased in popularity in database and networking applications. A Bloom filter has two steps that called programming and membership query. In this paper, we introduce a new approach to integrate a hash table with Bloom filter to decrease the hash table access time. This means that when a Bloom filter for an incoming item is programmed, the incoming item simultaneously is stored in a hash table. In addition in the membership query step, if the query is successful, simultaneously the address of item in the hash table is generated. Furthermore, we analyze the average bucket size, maximum search length and number of collisions for the proposed approach and compare to the fast hash table (FHT) approach. We implemented our approach in a software packet classifier based on tuple space search with the $H3$ class of universal hashing functions. Our results show that our approach is able to reduce the average bucket size, maximum search length and number of collisions when compared to a FHT.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131372542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive MAC Protocol for Throughput Enhancement in Multihop Wireless Networks 提高多跳无线网络吞吐量的自适应MAC协议
Netw. Protoc. Algorithms Pub Date : 2015-04-30 DOI: 10.5296/npa.v7i1.6877
Nam Pham, Jong-Hoon Youn
{"title":"Adaptive MAC Protocol for Throughput Enhancement in Multihop Wireless Networks","authors":"Nam Pham, Jong-Hoon Youn","doi":"10.5296/npa.v7i1.6877","DOIUrl":"https://doi.org/10.5296/npa.v7i1.6877","url":null,"abstract":"In the paper, by combining a fixed scheduling scheme with a simple p -persistent approach, we propose a dynamic transmission scheduling protocol for multi-hop wireless networks. In a fixed scheduling scheme, a predetermined schedule is assigned to each wireless node before transmitting data, and this schedule will be used permanently. However, in the proposed protocol, an adaptive probability-based approach is used in order to reduce the number of collisions. When a node is ready to send, it calculates the transmission probability p new , using a successful transmission ratio, a previous transmission probability p old , and a queue utilization ratio. The transmission probability p new determines whether or not a node can transmit. Our simulation study shows that the new MAC scheduling scheme improves the network throughput and reduces the number of collisions considerably.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing Protocols for Structural Health Monitoring of Bridges Using Wireless Sensor Networks 基于无线传感器网络的桥梁结构健康监测路由协议
Netw. Protoc. Algorithms Pub Date : 2015-04-30 DOI: 10.5296/npa.v7i1.7264
M. Atto, C. Guy
{"title":"Routing Protocols for Structural Health Monitoring of Bridges Using Wireless Sensor Networks","authors":"M. Atto, C. Guy","doi":"10.5296/npa.v7i1.7264","DOIUrl":"https://doi.org/10.5296/npa.v7i1.7264","url":null,"abstract":"Monitoring older bridges using Wireless Sensor Networks (WSNs) has had a lot of  attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making are done by a remote server. A Structural Health Monitoring (SHM) application using WSNs to provide the data collection necessary for rapid structural assessment after an event such as a natural disaster has been simulated in this paper. Efficient MAC and routing protocols must be designed for the proposed application to offer a guarantee for the reliability of the data delivered from source nodes to a sink. The number of delivered reports, delay and the lifetime of the network are considered in the proposed application. As a result, a new cross layer based protocol was designed and simulated for this application using different scenarios and results are presented in this paper. Simulation results show that the cross layer based protocol can increase performance for the proposed application for a range of different scenarios","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124135113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments 智能环境下保持亲密和信任的认证模型设计
Netw. Protoc. Algorithms Pub Date : 2015-04-30 DOI: 10.5296/npa.v7i1.7208
Benchaa Djellali, Abdallah Chouarfia, Kheira Belarbi, P. Lorenz
{"title":"Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments","authors":"Benchaa Djellali, Abdallah Chouarfia, Kheira Belarbi, P. Lorenz","doi":"10.5296/npa.v7i1.7208","DOIUrl":"https://doi.org/10.5296/npa.v7i1.7208","url":null,"abstract":"With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing. The intelligent home network environment is thing which invisible device that is not shown linked mutually through network so that user may use device always is been pervasive. Smart devices are interconnected and collaborate as a global distributed system to infuse intelligence into systems and processes. This kind of environment provides various smart services and makes consequently an offer of convenient, pleasant, and blessed lives to people. However, the risk is high as long as the offer is pleasant and convenient. In such context, security is stil very fragile and there is often a violation of user privacy and service interference. For this, a special interest in ubiquitous network security is going up. Safety lies primarily in the authentication of users accessing the network. It guarantees that only legitimate users can login and access to services indoor the network. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs. In an environment based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), the proposed authentication protocol combines both network authentication technique based on symmetric keys and single sign-on mechanisms. The authentication protocol is simple and secure, protects the privacy of user and aims to satisfy the security requirements.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123018807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a New Approach for Modelling Interactive Real Time Systems Based on Collaborative Decisions Network 基于协同决策网络的交互式实时系统建模新方法
Netw. Protoc. Algorithms Pub Date : 2015-04-30 DOI: 10.5296/npa.v7i1.7257
Soumaya El Mamoune, M. Ezziyyani, Jaime Lloret
{"title":"Towards a New Approach for Modelling Interactive Real Time Systems Based on Collaborative Decisions Network","authors":"Soumaya El Mamoune, M. Ezziyyani, Jaime Lloret","doi":"10.5296/npa.v7i1.7257","DOIUrl":"https://doi.org/10.5296/npa.v7i1.7257","url":null,"abstract":"Adaptive systems are being used in many research fields such as e-Learning, switching in the telephone network and for organizing contents on the Web. Each field requires a particular adaptation system which is not generally applicable to the other contexts. The lack of several criteria like the interaction with the environment, the self-improvement and the evaluation pushed us to look further and suggest a generalized solution for any context. In this article, we present a new approach for the adaptation of the interactive systems of decision-making to offer suitable services to a given situation based on the interaction with the environment, the auto-improvement and the evolution of the system. The approach suggested is a graphic modelling called decisions network which will serve the design and construction of the dynamic operation of the core of the adaptive systems of decision-making. The service offered by such system is an adaptive final decision of the core which is a result got by the combination of the nodes of the decisions network and its iterative interactions via the environmental data. This work has two objectives: on the one hand, to present the new approach with its components and its importance by reporting existing work and, on the other hand, to present the approach with the chart and the formalization in order to model the dynamic behavior of the system via the search for a final decision in the form of adjacent elementary decisions.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Study of Scheduling Algorithms with Friedman Test in WiMAX Networks 基于Friedman测试的WiMAX网络调度算法研究
Netw. Protoc. Algorithms Pub Date : 2014-12-27 DOI: 10.5296/npa.v6i4.6582
Mohamed-el-Amine Brahmia, A. Syarif, A. Abouaissa, L. Idoumghar, P. Lorenz
{"title":"An Efficient Study of Scheduling Algorithms with Friedman Test in WiMAX Networks","authors":"Mohamed-el-Amine Brahmia, A. Syarif, A. Abouaissa, L. Idoumghar, P. Lorenz","doi":"10.5296/npa.v6i4.6582","DOIUrl":"https://doi.org/10.5296/npa.v6i4.6582","url":null,"abstract":"In this paper, we propose a scheduling strategy for various IPTV services traffic (HD-TV, SD-TV, Web-TV and Mobile-TV) over 802.16j networks. Our scheme adapts dynamically the scheduler operation to according queue load and QoS constraints. In particular, the proposed mechanism gives more priority to HD-TV and SD-TV traffics by using two schedulers. The proposed scheduling algorithm has been simulated using the QualNet network simulator. The Friedman test has been used to address some significant issues of the analysis to compare the proposed scheme with the others scheme. The experimental result and analysis show that the proposed scheduler schemes outperform the traditional scheduling techniques for rtPS traffic, that allows ensuring QoS requirements for IPTV application.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RSSI Prediction in WiFi Considering Realistic Heterogeneous Restrictions 考虑现实异构限制的WiFi RSSI预测
Netw. Protoc. Algorithms Pub Date : 2014-12-27 DOI: 10.5296/npa.v6i4.6066
Álvaro Suárez Sarmiento, Jose Aurelio Santana, E. Macías, Vicente E. Mena, J. M. Canino-Rodríguez, Domingo Marrero
{"title":"RSSI Prediction in WiFi Considering Realistic Heterogeneous Restrictions","authors":"Álvaro Suárez Sarmiento, Jose Aurelio Santana, E. Macías, Vicente E. Mena, J. M. Canino-Rodríguez, Domingo Marrero","doi":"10.5296/npa.v6i4.6066","DOIUrl":"https://doi.org/10.5296/npa.v6i4.6066","url":null,"abstract":"Received Signal Strength Indicator is an indication of power level being received by a wireless device. This parameter for Wireless Fidelity has never been standardized, so any manufacturer implements it measuring as best they know how. This is a problem because different scenarios can be found based in several elements like: the particular Wireless Fidelity Network Interface Card implementation, the driver, the operating system and software monitoring implementation. This makes the utilization of the Received Signal Strength Indicator to implement higher level functions in wireless networks (like roaming management or localization of terminals) be a headache in realistic scenarios. This heterogeneity of devices, drivers… makes that the application of the Received Signal Strength Indicator be not general. In this paper we present the comparison of our new model of Received Signal Strength Indicator prediction in several realistic and heterogeneous scenarios. The experimental results indicate that we obtain in general, better results than the other models.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Time-aware Software Defined Networking for OpenFlow-based Datacenter Optical Networks 基于openflow的数据中心光网络的时间感知软件定义网络
Netw. Protoc. Algorithms Pub Date : 2014-12-27 DOI: 10.5296/npa.v6i4.5922
Hui Yang, Jie Zhang, Yongli Zhao, Yuefeng Ji, Jianrui Han, Yi Lin, Shaofeng Qiu, Young Lee
{"title":"Time-aware Software Defined Networking for OpenFlow-based Datacenter Optical Networks","authors":"Hui Yang, Jie Zhang, Yongli Zhao, Yuefeng Ji, Jianrui Han, Yi Lin, Shaofeng Qiu, Young Lee","doi":"10.5296/npa.v6i4.5922","DOIUrl":"https://doi.org/10.5296/npa.v6i4.5922","url":null,"abstract":"Data center networks are considered to make use of the computing and storage resources in data centers, which include intra-datacenter and inter-datacenter networks. Both of them will depend on the optical networking due to its advantages, such as low latency, high bandwidth, and low energy consumption. Data center interconnected by flexi-grid optical networks is a promising scenario to allocate spectral resources for applications in a dynamic, tunable and efficient control manner. Due to the high burstiness and high-bandwidth characteristics of the services, optical interconnect in intra-datacenter networks has attracted much attention compared with inter-datacenter network. Many datacenter applications in the environment require lower delay and higher availability with the end-to-end guaranteed quality of service. In this paper, we propose a novel time-aware software defined networking (TaSDN) architecture for OpenFlow-based datacenter optical networks, by introducing a time-aware service scheduling (TaSS) strategy. TaSDN can arrange and accommodate the applications with required QoS considering the time factor, and enhance the responsiveness to quickly provide for datacenter demand. The overall feasibility and efficiency of the proposed architecture are experimentally verified on our testbed with OpenFlow-based intra-datacenter and inter-datacenter optical networks.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信