Search results for "Work Performance"
showing 10 items of 71 documents
Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case
2009
Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…
Toward Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names
2021
Malware detection is a problem that has become particularly challenging over the last decade. A common strategy for detecting malware is to scan network traffic for malicious connections between infected devices and their command and control (C&C) servers. However, malware developers are aware of this detection method and begin to incorporate new strategies to go unnoticed. In particular, they generate domain names instead of using static Internet Protocol addresses or regular domain names pointing to their C&C servers. By using a domain generation algorithm, the effectiveness of the blacklisting of domains is reduced, as the large number of domain names that must be blocked g…
Deploying Virtual MAC Protocols Over a Shared Access Infrastructure Using MAClets
2013
Network virtualization has been extensively researched in the last years as a key enabler for improving the network performance. However, virtualization in wireless networks pose some unique challenges: first, the usual over-provisioning approach for providing isolation between multiple virtual entities is not viable; second, the partitioning criteria are often ambiguous, since the actual resources perceived by each entity depend on many external (and time-varying) factors. In this demo, we show an effective virtualization solution for wireless local area networks, solving the problem of isolation and flexible resource paritioning, based on the concept of MAClets. MAClets are software progr…
Using a hazard-independent approach to understand road-network robustness to multiple disruption scenarios
2021
Abstract A range of predictable and unpredictable events can cause road perturbations, disrupting traffic flows and more generally the functioning of society. To manage this threat, stakeholders need to understand the potential impact of a multitude of predictable and unpredictable events. The present paper adopts a hazard-independent approach to assess the robustness (ability to maintain functionality despite disturbances) of the Sioux Falls network to all possible disruptions. This approach allows understanding the impact of a wide range of disruptive events, including random, localised, and targeted link failures. The paper also investigates the predictability of the link combinations wh…
Performance analysis of user-centric SBS deployment with load balancing in heterogeneous cellular networks: A Thomas cluster process approach
2020
Abstract In conventional heterogeneous cellular networks (HCNets), the locations of user equipments (UEs) and base stations (BSs) are modeled randomly using two different homogeneous Poisson point processes (PPPs). However, this might not be a suitable assumption in case of UE distribution because UE density is not uniform everywhere in HCNets. Keeping in view the existence of nonuniform UEs, the small base stations (SBSs) are assumed to be deployed in the areas with high UE density, which results in correlation between UEs and BS locations. In this paper, we analyse the performance of HCNets with nonuniform UE deployment containing a union of clustered and uniform UE sets. The clustered UE…
Industrial video sequences for network performance evaluation
2005
The analysis of video traffic characteristics plays a fundamental role in the evaluation of network performance or schedule design. However, the majority of these analyses are based on the study of traffic characteristics generated with different codifiers on typical general purpose films or sequences. These are generally made using asymmetric codifiers which are not usable in live real-time multimedia transmission systems. Moreover, the properties of these sequences are not necessarily equivalent to those obtained in an industrial environment. In this paper industrial monitoring video sequences are presented, describing their various characteristics, from the point of view of the source as…
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology
2017
International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…
SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation
2009
The interconnection network is one of the most important multicomputer components, since it has a great impact on global system performance. Many models and simulators have been proposed to evaluate network performance. This paper presents SimuRed, an event-driven flit-level, cycle-accurate simulator to evaluate different orthogonal network configurations. The core of the simulator has been designed to be expandable and portable to different situations. Some of the advantages of this simulator over other similar tools are its visual interface, its fast execution and its simplicity. Moreover, it is multiplatform and its source code versions (C++ and Java) are freely available under GNU open-…
Pumps as turbines (PATs) in water distribution networks affected by intermittent service
2013
A hydraulic model was developed in order to evaluate the potential energy recovery from the use of centrifugal pumps as turbines (PATs) in a water distribution network characterized by the presence of private tanks. The model integrates the Global Gradient Algorithm (GGA), with a pressure-driven model that permits a more realistic representation of the influence on the network behaviour of the private tanks filling and emptying. The model was applied to a real case study: a District Metered Area in Palermo (Italy). Three different scenarios were analysed and compared with a baseline scenario (Scenario 0 – no PAT installed) to identify the system configuration with added PATs that permits th…
A Communication-Aware Topological Mapping Technique for NoCs
2008
Networks---on---Chip (NoCs) have been proposed as a promising solution to the complex on-chip communication problems derived from the increasing number of processor cores. The design of NoCs involves several key issues, being the topological mapping (the mapping of the Intellectual Properties (IPs) to network nodes) one of them. Several proposals have been focused on topological mapping last years, but they require the experimental validation of each mapping considered. In this paper, we propose a communication-aware topological mapping technique for NoCs. This technique is based on the experimental correlation of the network model with the actual network performance, thus avoiding the need…