Abstract: The power consumption of an Optical Packet Switch
equipped with SOA technology based Spanke switching fabric is
evaluated. Sophisticated analytical models are introduced to evaluate
the power consumption versus the offered traffic, the main
switch parameters, and the used device characteristics. The impact
of Amplifier Spontaneous Emission (ASE) noise generated by a
transmission system on the power consumption is investigated. As
a matter of example for 32×32 switches supporting 64 wavelengths
and offered traffic equal to 0,8, the average energy consumption per
bit is 5, 07 · 10-2 nJ/bit and increases if ASE noise introduced by
the transmission systems is increased.
Abstract: This paper describes the design and implementation of cyber video consultation systems(CVCS) using hybrid P2P for video consultation between remote sites. The proposed system is based on client-server and P2P(Peer to Peer) architecture, where client-server is used for communication with the MCU(Multipoint Control Unit) and P2P is used for the cyber video consultation. The developed video consultation system decreases server traffic, and cuts down network expenses, as the multimedia data decentralizes to the client by hybrid P2P architecture. Also the developed system is tested by the group-type video consultation system using communication protocol and application software through Ethernet networks.
Abstract: The purpose of this study is mainly to predict collision
frequency on the horizontal tangents combined with vertical curves
using artificial neural network methods. The proposed ANN models
are compared with existing regression models. First, the variables
that affect collision frequency were investigated. It was found that
only the annual average daily traffic, section length, access density,
the rate of vertical curvature, smaller curve radius before and after
the tangent were statistically significant according to related
combinations. Second, three statistical models (negative binomial,
zero inflated Poisson and zero inflated negative binomial) were
developed using the significant variables for three alignment
combinations. Third, ANN models are developed by applying the
same variables for each combination. The results clearly show that
the ANN models have the lowest mean square error value than those
of the statistical models. Similarly, the AIC values of the ANN
models are smaller to those of the regression models for all the
combinations. Consequently, the ANN models have better statistical
performances than statistical models for estimating collision
frequency. The ANN models presented in this paper are
recommended for evaluating the safety impacts 3D alignment
elements on horizontal tangents.
Abstract: A real time distributed computing has
heterogeneously networked computers to solve a single problem. So
coordination of activities among computers is a complex task and
deadlines make more complex. The performances depend on many
factors such as traffic workloads, database system architecture,
underlying processors, disks speeds, etc. Simulation study have been
performed to analyze the performance under different transaction
scheduling: different workloads, arrival rate, priority policies,
altering slack factors and Preemptive Policy. The performance metric
of the experiments is missed percent that is the percentage of
transaction that the system is unable to complete. The throughput of
the system is depends on the arrival rate of transaction. The
performance can be enhanced with altering the slack factor value.
Working on slack value for the transaction can helps to avoid some
of transactions from killing or aborts. Under the Preemptive Policy,
many extra executions of new transactions can be carried out.
Abstract: This paper presents initiatives of Knowledge
Management (KM) applied to Forensic Sciences field, especially
developed at the Forensic Science Institute of the Brazilian Federal
Police. Successful projects, related to knowledge sharing, drugs
analysis and environmental crimes, are reported in the KM
perspective. The described results are related to: a) the importance of
having an information repository, like a digital library, in such a
multidisciplinary organization; b) the fight against drug dealing and
environmental crimes, enabling the possibility to map the evolution
of crimes, drug trafficking flows, and the advance of deforestation in
Amazon rain forest. Perspectives of new KM projects under
development and studies are also presented, tracing an evolution line
of the KM view at the Forensic Science Institute.
Abstract: Mobile Ad hoc networks (MANETs) are collections
of wireless mobile nodes dynamically reconfiguring and collectively
forming a temporary network. These types of networks assume
existence of no fixed infrastructure and are often useful in battle-field
tactical operations or emergency search-and-rescue type of
operations where fixed infrastructure is neither feasible nor practical.
They also find use in ad hoc conferences, campus networks and
commercial recreational applications carrying multimedia traffic. All
of the above applications of MANETs require guaranteed levels of
performance as experienced by the end-user. This paper focuses on
key challenges in provisioning predetermined levels of such Quality
of Service (QoS). It also identifies functional areas where QoS
models are currently defined and used. Evolving functional areas
where performance and QoS provisioning may be applied are also
identified and some suggestions are provided for further research in
this area. Although each of the above functional areas have been
discussed separately in recent research studies, since these QoS
functional areas are highly correlated and interdependent, a
comprehensive and comparative analysis of these areas and their
interrelationships is desired. In this paper we have attempted to
provide such an overview.
Abstract: Eco-driving allows the driver to optimize his/her behaviour in order to achieve several types of benefits: reducing pollution emissions, increasing road safety, and fuel saving. One of the main rules for adopting eco-driving is to anticipate the traffic events by avoiding strong acceleration or braking and maintaining a steady speed when possible. Therefore, drivers have to comply with speed limits and time headway. The present study explored the role of three types of motivation and social norms in predicting French drivers- intentions to comply with speed limits and time headway as eco-driving practices as well as examine the variations according to gender and age. 1234 drivers with ages between 18 and 75 years old filled in a questionnaire which was presented as part of an online survey aiming to better understand the drivers- road habits. It included items assessing: a) behavioural intentions to comply with speed limits and time headway according to three types of motivation: reducing pollution emissions, increasing road safety, and fuel saving, b) subjective and descriptive social norms regarding the intention to comply with speed limits and time headway, and c) sociodemographical variables. Drivers expressed their intention to frequently comply with speed limits and time headway in the following 6 months; however, they showed more intention to comply with speed limits as compared to time headway regardless of the type of motivation. The subjective injunctive norms were significantly more important in predicting drivers- intentions to comply with speed limits and time headway as compared to the descriptive norms. In addition, the most frequently reported type of motivation for complying with speed limits and time headway was increasing road safety followed by fuel saving and reducing pollution emissions, hence underlining a low motivation to practice eco-driving. Practical implications of the results are discussed.
Abstract: European Rail Traffic Management System (ERTMS) is the European reference for interoperable and safer signaling systems to efficiently manage trains running. If implemented, it allows trains cross seamlessly intra-European national borders. ERTMS has defined a secure communication protocol, EURORADIO, based on open communication networks. Its RadioInfill function can improve the reaction of the signaling system to changes in line conditions, avoiding unnecessary braking: its advantages in terms of power saving and travel time has been analyzed. In this paper a software implementation of the EURORADIO protocol with RadioInfill for ERTMS Level 1 using GSM-R is illustrated as part of the SR-Secure Italian project. In this building-blocks architecture the EURORADIO layers communicates together through modular Application Programm Interfaces. Security coding rules and railway industry requirements specified by EN 50128 standard have been respected. The proposed implementation has successfully passed conformity tests and has been tested on a computer-based simulator.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: Collaborative working environments for distance
education can be considered as a more generic form of contemporary
remote labs. At present, the majority of existing real laboratories are
not constructed to allow the involved participants to collaborate in
real time. To make this revolutionary learning environment possible
we must allow the different users to carry out an experiment
simultaneously. In recent times, multi-user environments are
successfully applied in many applications such as air traffic control
systems, team-oriented military systems, chat-text tools, multi-player
games etc. Thus, understanding the ideas and techniques behind these
systems could be of great importance in the contribution of ideas to
our e-learning environment for collaborative working. In this
investigation, collaborative working environments from theoretical
and practical perspectives are considered in order to build an
effective collaborative real laboratory, which allows two students or
more to conduct remote experiments at the same time as a team. In
order to achieve this goal, we have implemented distributed system
architecture, enabling students to obtain an automated help by either
a human tutor or a rule-based e-tutor.
Abstract: From an economic standpoint the current and future
road traffic situation in urban areas is a cost factor. Traffic jams and
congestion prolong journey times and tie up resources in trucks and
personnel. Many discussions about imposing charges or tolls for
cities in Europe in order to reduce traffic congestion are currently in
progress. Both of these effects lead – directly or indirectly - to
additional costs for the urban distribution systems in retail
companies. One approach towards improving the efficiency of retail
distribution systems, and thus towards avoiding negative
environmental factors in urban areas, is horizontal collaboration for
deliveries to retail outlets – Urban Retail Logistics. This paper
presents a classification system to help reveal where cooperation
between retail companies is possible and makes sense for deliveries
to retail outlets in urban areas.
Abstract: Cellular networks provide voice and data services to the users with mobility. To deliver services to the mobile users, the cellular network is capable of tracking the locations of the users, and allowing user movement during the conversations. These capabilities are achieved by the location management. Location management in mobile communication systems is concerned with those network functions necessary to allow the users to be reached wherever they are in the network coverage area. In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to as cells. The cellular concept was introduced to reuse the radio frequency. Continued expansion of cellular networks, coupled with an increasingly restricted mobile spectrum, has established the reduction of communication overhead as a highly important issue. Much of this traffic is used in determining the precise location of individual users when relaying calls, with the field of location management aiming to reduce this overhead through prediction of user location. This paper describes and compares various location management schemes in the cellular networks.
Abstract: In Iran, due to abundance of energy resources, energy consumption is extraordinarily higher than international standards and transportation sector is considered to be one of the major consumers of energy. Moreover, air pollution in urban areas as a result of high dependence on private vehicle and lower standards of vehicles, high subsidies spent on fuel and time waste due to traffic congestion in urban areas all have led to speculations on new strategies and policies in order to control energy consumption in transportation sector. These strategies and policies will be introduced in this paper and their consequences will be analyzed with consideration to socio-economic factors affecting the urban society of Iran. Besides, the intention is to suggest and analyze new approaches such as broader application of public transportation system, demand management in transport sector, replacement of deteriorated vehicles, quality improvement in car manufacture and introduction of substitute fuels.
Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) which is a combination of path fingerprint and client puzzle concepts. In this each IP packet has a unique fingerprint is embedded that represents, the route a packet has traversed. The server maintains a mapping table which contains the client IP address and its corresponding fingerprint. In ingress router, client puzzle is placed. For each request, the puzzle issuer provides a puzzle which the source has to solve. Our design has the following advantages over prior approaches, 1) Reduce the network traffic, as we place a client puzzle at the ingress router. 2) Mapping table at the server is lightweight and moderate.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: In cognitive radio (CR) systems, the primary user (PU) signal would randomly depart or arrive during the sensing period of a CR user, which is referred to as the high traffic environment. In this paper, we propose a novel spectrum sensing scheme based
on the cyclostationarity of PU signals in high traffic environments. Specifically, we obtain a test statistic by applying an estimate of spectral autocoherence function of the PU signal to the generalized- likelihood ratio. From numerical results, it is confirmed that the proposed scheme provides a better spectrum sensing performance compared with the conventional spectrum sensing scheme based on the energy of the PU signals in high traffic environments.
Abstract: A design of communication area for infrared
electronic-toll-collection systems to provide an extended
communication interval in the vehicle traveling direction and
regular boundary between contiguous traffic lanes is proposed.
By utilizing two typical low-cost commercial infrared LEDs with
different half-intensity angles Φ1/2 = 22◦ and 10◦, the radiation
pattern of the emitter is designed to properly adjust the spatial
distribution of the signal power. The aforementioned purpose
can be achieved with an LED array in a three-piece structure
with appropriate mounting angles. With this emitter, the influence
of the mounting parameters, including the mounting height and
mounting angles of the on-board unit and road-side unit, on the
system performance in terms of the received signal strength and
communication area are investigated. The results reveal that, for
our emitter proposed in this paper, the ideal ”long-and-narrow”
characteristic of the communication area is very little affected by
these mounting parameters. An optimum mounting configuration is
also suggested.
Abstract: In this paper, we provide complete end-to-end delay analyses including the relay nodes for instant messages. Message Session Relay Protocol (MSRP) is used to provide congestion control for large messages in the Instant Messaging (IM) service. Large messages are broken into several chunks. These chunks may traverse through a maximum number of two relay nodes before reaching destination according to the IETF specification of the MSRP relay extensions. We discuss the current solutions of sending large instant messages and introduce a proposal to reduce message flows in the IM service. We consider virtual traffic parameter i.e., the relay nodes are stateless non-blocking for scalability purpose. This type of relay node is also assumed to have input rate at constant bit rate. We provide a new scheduling policy that schedules chunks according to their previous node?s delivery time stamp tags. Validation and analysis is shown for such scheduling policy. The performance analysis with the model introduced in this paper is simple and straight forward, which lead to reduced message flows in the IM service.
Abstract: In this paper, genetic algorithm (GA) is proposed for
the design of an optimization algorithm to achieve the bandwidth
allocation of ATM network. In Broadband ISDN, the ATM is a highbandwidth;
fast packet switching and multiplexing technique. Using
ATM it can be flexibly reconfigure the network and reassign the
bandwidth to meet the requirements of all types of services. By
dynamically routing the traffic and adjusting the bandwidth
assignment, the average packet delay of the whole network can be
reduced to a minimum. M/M/1 model can be used to analyze the
performance.
Abstract: Model-based approaches have been applied successfully
to a wide range of tasks such as specification, simulation, testing, and
diagnosis. But one bottleneck often prevents the introduction of these
ideas: Manual modeling is a non-trivial, time-consuming task.
Automatically deriving models by observing and analyzing running
systems is one possible way to amend this bottleneck. To
derive a model automatically, some a-priori knowledge about the
model structure–i.e. about the system–must exist. Such a model
formalism would be used as follows: (i) By observing the network
traffic, a model of the long-term system behavior could be generated
automatically, (ii) Test vectors can be generated from the model,
(iii) While the system is running, the model could be used to diagnose
non-normal system behavior.
The main contribution of this paper is the introduction of a model
formalism called 'probabilistic regression automaton' suitable for the
tasks mentioned above.