• Title/Summary/Keyword: network-sensitive applications

Search Result 98, Processing Time 0.026 seconds

Load Balancing for Zone Routing Protocol to Support QoS in Ad Hoc Network

  • Chimmanee, Sanon;Wipusitwarakun, Komwut;Runggeratigul, Suwan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1685-1688
    • /
    • 2002
  • Application Routing Load Balancing (ARLB) is a novel load balancing mode that combines QoS routing and load balancing in per application to support QoS far real-time application based on wired network. Zone Routing Protocol (ZRP) is a recent hybrid proactive/reactive routing approach in an attempt to achieve scalability of ad-hoc network. This routing approach has the potential to be efficient in the generation of control traffic than traditional routing schemes. Up to now, without proper load balancing tools, the ZRP can actually guarantee QoS for delay-sensitive applications when congestion occurred in ad-hoc network. In this paper, we propose the ARLB to improve QoS fur delay-sensitive applications based on ZRP in ad-hoc network when congestion occurred and to be forwarding mechanism fur route coupling to support QoS for real-time applications. The critical point is that the routing metric of ARLB is originally designed for wired network environment. Therefore, we study and present an appropriate metric or cost computation routing of ARLB for recently proposed ZRP over ad-hoc network environment.

  • PDF

A Delay-guaranteed Overlay Network for P2P Streaming Service (P2P 스트리밍 서비스를 위한 지연시간 보장 오버레이 네트워크)

  • Park, Seung-Chul
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.83-93
    • /
    • 2010
  • P2P streaming technology has advantages of scalability and availability comparing to the popular IP multicast. This paper proposes an approach to apply the P2P streaming technology to the delay-sensitive multimedia multicast applications. In order for the P2P streaming to be applied to the delay-sensitive applications, prior construction of delay-guaranteed overlay network is necessarily required. Moreover, the delay-guaranteed overlay network should be able to be kept even when the hand-overs occur owing to the departures of the intermediate P2P peers. This paper proposes a delay-guaranteed overlay network construction method by using the bandwidth and end-to-end delay based admission control and the backup peer based hand-over control mechanism.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

Playout synchronization mechanism for delay-sensitive multimedia applications (지연에 민감한 멀티미디어 응용을 위한 재생 동기화 메카니즘)

  • 유상신;이성근;김덕진
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.4
    • /
    • pp.57-67
    • /
    • 1996
  • This paper aims to support delay-sensitive multimedia applications by suggesting a mechanism in which maintains almost constant end-to-end delay thus providing the optimum playout synchronization. For this task the sum of network delay and buffering delay is entiredly managed and to eliminate little delay fluctuations and instantaneous delays at a buffer and a network, a low pass filter is used. Furthermore the correction function, which is used for maintaining the buffering level ot a reference value, is a non-linear step function, unlike the existing linear and continuous function. it has a different step sizes adapting to a traffic characteristics of a network congestion. the proposed mechanism has been confirmed of it sefficiency through SLAM-II netowrk.

  • PDF

A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications

  • Mohammad Y. Khanafseh;Ola M. Surakhi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.79-88
    • /
    • 2024
  • The information retrieval domain deals with the retrieval of unstructured data such as text documents. Searching documents is a main component of the modern information retrieval system. Locality Sensitive Hashing (LSH) is one of the most popular methods used in searching for documents in a high-dimensional space. The main benefit of LSH is its theoretical guarantee of query accuracy in a multi-dimensional space. More enhancement can be achieved to LSH by adding a bit to its steps. In this paper, a new Dynamic Locality Sensitive Hashing (DLSH) algorithm is proposed as an improved version of the LSH algorithm, which relies on employing the hierarchal selection of LSH parameters (number of bands, number of shingles, and number of permutation lists) based on the similarity achieved by the algorithm to optimize searching accuracy and increasing its score. Using several tampered file structures, the technique was applied, and the performance is evaluated. In some circumstances, the accuracy of matching with DLSH exceeds 95% with the optimal parameter value selected for the number of bands, the number of shingles, and the number of permutations lists of the DLSH algorithm. The result makes DLSH algorithm suitable to be applied in many critical applications that depend on accurate searching such as forensics technology.

A study on Advanced Load-Balanced Ad hoc Routing Protocol

  • Lee, Joo-Yeon;Lee, Cheong-Jae;Kim, Yong-Woo;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1433-1436
    • /
    • 2004
  • The ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure of centralized administration. Load-Balanced Ad hoc Routing(LBAR) protocol is an on-demand routing protocol intended for delay-sensitive applications where users are most concern with packet transmission delay. Although LBAR mechanism is a novel load balancing routing protocol for ad hoc network, it has own limitation in route path maintenance phase. Therefore, in this paper, we propose Advanced Load-Balanced Ad hoc Routing(A-LBAR) that is delay-sensitive and has an efficient path maintenance scheme. The robust path maintenance scheme is maintained by considering about nodal loads all over network and misbehavior of overloaded or selfish nodes. The proposed scheme provides good performance over DSR and AODV in terms of packet delay and packet loss rate when some misbehaving nodes exist in the network.

  • PDF

MATE: Memory- and Retraining-Free Error Correction for Convolutional Neural Network Weights

  • Jang, Myeungjae;Hong, Jeongkyu
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.1
    • /
    • pp.22-28
    • /
    • 2021
  • Convolutional neural networks (CNNs) are one of the most frequently used artificial intelligence techniques. Among CNN-based applications, small and timing-sensitive applications have emerged, which must be reliable to prevent severe accidents. However, as the small and timing-sensitive systems do not have sufficient system resources, they do not possess proper error protection schemes. In this paper, we propose MATE, which is a low-cost CNN weight error correction technique. Based on the observation that all mantissa bits are not closely related to the accuracy, MATE replaces some mantissa bits in the weight with error correction codes. Therefore, MATE can provide high data protection without requiring additional memory space or modifying the memory architecture. The experimental results demonstrate that MATE retains nearly the same accuracy as the ideal error-free case on erroneous DRAM and has approximately 60% accuracy, even with extremely high bit error rates.

Light intensity controlled wrinkling patterns in photo-thermal sensitive hydrogels

  • Toh, William;Ding, Zhiwei;Ng, Teng Yong;Liu, Zishun
    • Coupled systems mechanics
    • /
    • v.5 no.4
    • /
    • pp.315-327
    • /
    • 2016
  • Undergoing large volumetric changes upon incremental environmental stimulation, hydrogels are interesting materials which hold immense potentials for utilization in a wide array of applications in diverse industries. Owing to the large magnitudes of deformation it undergoes, swelling induced instability is a commonly observed sight in all types of gels. In this work, we investigate the instability of photo-thermal sensitive hydrogels, produced by impregnating light absorbing nano-particles into the polymer network of a temperature sensitive hydrogel, such as PNIPAM. Earlier works have shown that by using lights of different intensities, these hydrogels follow different swelling trends. We investigate the possibility of utilizing this fact for remote switching applications. The analysis is built on a thermodynamic framework of inhomogeneous large deformation of hydrogels and implemented via commercial finite element software, ABAQUS. Various examples of swelling induced instabilities, and its corresponding dependence on light intensity, will be investigated. We show that the instabilities that arise have their morphologies dependent on the light intensity.

Trajectory-prediction based relay scheme for time-sensitive data communication in VANETs

  • Jin, Zilong;Xu, Yuxin;Zhang, Xiaorui;Wang, Jin;Zhang, Lejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3399-3419
    • /
    • 2020
  • In the Vehicular Ad-hoc Network (VANET), the data transmission of time-sensitive applications requires low latency, such as accident warnings, driving guidance, etc. However, frequent changes of topology in VANET will result in data transmission failures. In order to improve the efficiency of VANETs data transmission and increase the timeliness of data, this paper proposes a relay scheme based on Recurrent Neural Network (RNN) trajectory prediction, which can be used to select the optimal relay vehicle to transmit data. The proposed scheme learns vehicle trajectory in a distributed manner and calculates the predicted trajectory, and then the optimal vehicle can be selected to complete the data transmission, which ensures the timeliness of the data. Finally, we carry out a set of simulations to demonstrate the performance of the algorithm. Simulation results show that the proposed scheme enhances the timeliness of the data and the accuracy of the predicted driving trajectory.