Computer Communications
1,125 Followers
Recent papers in Computer Communications
Over the last few years, IEEE 802.16 has been established as one of the most promising solutions for broadband wireless metropolitan area networks. In 2007, the standard was included as one of the radio access technologies for IMT-2000.... more
X-ray image might be corrupted by noise or blurring because of signal transmission or the bad Xray lens. This paper presents a two-stage shock filter based on Partial Differential Equations (PDE) to restore noisy blurred X-ray image.... more
• to make continuing use of the work in teaching and project work and, consequently, to propagate knowledge of this relatively new field.
Electronic banking has provision networks that replaces and replicated various activities currently executing by the bank. Hence e-banking now plays a vital role to carry out the individual as well as corporate financial activities... more
In a today's internet end system, the congestion and flow control of every TCP connection is done separately. This means that every TCP sender of the TCP connections of an end system has to determine current information about the network... more
Monitoring and understanding the changes in mangrove ecosystems and their surroundings are required to determine how mangrove ecosystems are constantly changing while influenced by anthropogenic, and natural drivers. Consistency in high... more
This paper provides an overview of cellular networks and wireless Internet. It focuses on the problems of providing multimedia services over these networks, and highlights the latest developments in the area. This is done by providing... more
The emergence of Voice over IP (VoIP) has offered numerous advantages for end users and providers alike, but simultaneously has introduced security threats, vulnerabilities and attacks not previously encountered in networks with a closed... more
The power consumption of wireless access networks will become an important issue in the coming years. In this paper, the power consumption of base stations for mobile WiMAX, fixed WiMAX, UMTS, HSPA, and LTE is modelled and related to the... more
The AS-level topology of the Internet has been quite a hot research topic in the last few years. However, only a small number of studies have been developed that give a structural interpretation of this graph. Such an interpretation is... more
Communication between institutions, or domains, residing in the Internet requires a route to be created between the routing domains. Each of these domains is controlled by a single administrative authority, and is referred to as an... more
Providing seamless mobility support is one of the most challenging problems towards the system integration of fourth generation (4G) wireless networks. Because of the transparency to the lower layer characteristics, application-layer... more
The bene ts of using caches for reducing tra c in backbone trunk links and for improving web access times are well-known. However, there are some known problems with traditional web caching, namely, maintaining freshness of web objects,... more
The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The... more
In modern textile industry, Tissue online Automatic Inspection (TAI) is becoming an attractive alternative to Human Vision Inspection (HVI). HVI needs a high level of attention nevertheless leading to low performance in terms of tissue... more
The dramatic development of radio solutions for wireless communications tends to blur the wider use that can be made of infrared transmissions in a room, a workshop or even a building. For some local applications for which a wireless part... more
This paper proposes the Mobility-Aware Resource Reservation Protocol (MARSVP) in which mobility and QoS signaling are performed as a single functional block. The key concept of MARSVP is to convey mobility-specific information (binding... more
Mobile Agents (MA) have been proposed as a solution for distributed Network Management (NM). However, most MA-based infrastructures exhibit scalability limitations when data intensive management applications are considered. Therefore, we... more
Underwater Wireless Sensor Networks (UWSNs) are different in many aspects as compared to terrestrial sensor networks. Other than long propagation delays and high error probability, continuous node movement makes it hard to manage the... more
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce.... more
Since its inception almost 40 years ago, the Internet has evolved and changed immensely. New technology solutions are desired to keep up with this unprecedented growth. Besides the traditional computing devices, different types of mobile... more
Network planning for realtime services in traditional systems is normally performed based on a fixed traffic demand. Realtime services such as voice and video are currently being widely deployed over packet-based IP networks. Due to the... more
The paper deals with a model of collaboration between academia and industry in the area of information and communication technology. It shows the collaboration in the field of Telecommunications and Informatics at the University of... more
Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches.... more
In recent years, there has been a growing interest in wireless sensor networks. One of the major issues in wireless sensor network is developing an energy-efficient clustering protocol. Hierarchical clustering algorithms are very... more
The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific... more
To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized... more
Advances in low power VLSI design, along with the potentially low duty cycle of wireless sensor nodes open up the possibility of powering small wireless computing devices from scavenged ambient power. A broad review of potential power... more
In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterprises are migrating to... more
This paper presents Java Fast Sockets (JFS), an optimized Java socket implementation on clusters for high performance computing. Current socket libraries do not efficiently support high-speed cluster interconnects and impose substantial... more
Packet buffers in a smart network interface card are managed in a way to reduce any packet losses from high-speed burst incoming data. Currently, two types of packet buffer management techniques are used. They are static buffer management... more
Networking research funding agencies in the USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet.... more
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing... more
Vulnerabilities are extremely important for network security. IT management must identify and assess vulnerabilities across many disparate hardware and software platforms to prioritize these vulnerabilities and remediate those that pose... more
Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also... more
The increasing computing and communication power of new terminals in mobile networks has converted these smart phones into Internet hosts. They can be used for traditional services, such as browsing or e-mailing, but also as platforms for... more
The use of personal protective equipment (PPEs) in the construction industry is necessary to guarantee the safety of the workers. However, this equipment is not usually worn properly. Nowadays, the only control performed over the use of... more
Location and environment awareness are two prominent features of cognitive radios and networks enabling them to interact with and learn the operating environment. A cognitive radio architecture with location and environment awareness... more
The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The... more
Distributed multimedia applications will be an important part of tomorrow's application mix and require appropriate operating system (OS) support. Neither hard real-time solutions nor best-effort solutions are directly well suited for... more
Evolved Universal Terrestrial Radio Access (EUTRA), known as the Long Term Evolution (LTE) technology, brings cellular communication to the fourth generation (4G) era. In this article, we discuss the most important characteristics of LTE;... more
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an... more
Last decade observed a significant research effort directed towards indoor localization utilizing location fingerprinting techniques. Fingerprinting solutions generally require a pre-deployment site survey proce-27 dure during which a... more