-
Article
Prioritization and offloading in P4 switch integrated with NFV
The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data p...
-
Article
Analyzing vertical and horizontal offloading in federated cloud and edge computing systems
Mobile Edge Computing architecture is one of the most promising architectures that can satisfy different quality of Services required by various applications. In this paper, we model mobile edge computing arch...
-
Article
Dielectric Properties and DC Bias Characteristics of BaTi1-mZrmO3-x mol.% MgO-4.5 mol.% Gd2O3-2 mol.% SiO2 Ceramics
In this study, BaTi1-mZrmO3-4.5 mol.% Gd2O3-2.0 mol.% SiO2 ceramics with different Zr/Ti ratios and MgO contents were prepared via solid-state reaction. The MgO addition decreased the densification temperatures o...
-
Article
Two-tier dynamic load balancing in SDN-enabled Wi-Fi networks
This work proposes a Software Defined Networking (SDN) solution to address Wi-Fi congestion due to an unevenly distributed load among access points (APs). The conventional methods generally let client stations...
-
Article
Wi-Fi offloading between LTE and WLAN with combined UE and BS information
With the increasing popularity of mobile devices, cellular networks are suffering the consequences of a mobile data traffic explosion. Operators and standard development organizations have adopted Heterogeneou...
-
Chapter and Conference Paper
Accurate Traffic Flow Estimation in Urban Roads with Considering the Traffic Signals
The traffic condition can be improved with the real-time traffic information that is obtained from vehicle detectors (VDs) or probe vehicles (PVs). Using PVs has a lower cost and a broader coverage, but canno...
-
Chapter and Conference Paper
A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks
IEEE 802.11p/1609 standards divide the radio spectrum into one control channel (CCH) and six service channels (SCH) for emergent/management frame exchange and service dissemination, respectively. Previous sche...
-
Article
Open AccessA semi-blocking algorithm on adaptive query splitting for RFID tag identification
Radio frequency identification (RFID) is a promising wireless technology for using tiny, remotely powered chips as identifiers. The number of RFID applications is rapidly increasing because RFID technology is ...
-
Article
Open AccessTwo-dimensional downlink burst construction in IEEE 802.16 networks
Several burst construction algorithms for orthogonal frequency division multiple access were proposed. However, these algorithms did not meet the downlink burst characteristics specified in the IEEE 802.16 sta...
-
Chapter
Dynamic Bandwidth Allocation for 802.16E-2005 MAC
The IEEE 802.16e-2005 is designed to support high bandwidth for the wireless metropolitan area network. However, the link quality is likely to degrade drastically due to the unstable wireless links, bringing o...
-
Chapter and Conference Paper
Robust TCP Vegas in Wireless Networks
Since wireless applications have been widely studied over the recent years, the utilization of TCP under wireless environments is also an important issue. TCP design focuses on whether the wired networks perfo...
-
Chapter and Conference Paper
Achieving Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Link
Many algorithms for providing proportional delay differentiation and proportional loss differentiation have been proposed under wired networks. However, these algorithms suffer from low performance at encounte...
-
Chapter and Conference Paper
Dynamic Backoff Time Adjustment with Considering Channel Condition for IEEE 802.11e EDCA
Many enhanced schemes of IEEE 802.11e have been proposed to meet the increasing demand for Quality of Service (QoS). Most of them adjust the parameters, such as Contention Window (CW), according to whether the...
-
Chapter and Conference Paper
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags
How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and grou**-proof techniques to address t...
-
Chapter and Conference Paper
An Early Decision Algorithm to Accelerate Web Content Filtering
Real-time content analysis can be a bottleneck in Web filtering. This work presents a simple, but effective early decision algorithm to accelerate the filtering process by examining only part of the Web conten...
-
Chapter and Conference Paper
Request Scheduling for Differentiated QoS at Website Gateway
With the explosive growth of Web traffic, the load on a Web server becomes heavier, leading to the longer user-perceived latency. Website operators would like to employ service differentiation to offer better ...
-
Chapter and Conference Paper
A Novel TCP-Friendly Congestion Control with Virtual Reno and Slack Term
In this paper, a novel TCP-friendly congestion control with Virtual Reno and Slack Term, VRST for short, was proposed. The design objective of VRST is to maintain a smoother sending rate and to be friendly to ...
-
Chapter and Conference Paper
A Look-Ahead Scheduler to Provide Proportional Delay Differentiation in Wireless Network with a Multi-state Link
The Proportional Delay Differentiated Model was proposed to provide predictable and controllable queueing delay for different classes of connections. However, most of related works focused on providing this mo...
-
Chapter and Conference Paper
Some Improvements of TCP Congestion Control
Many TCP enhanced versions, such as NewReno, SACK, FACK, and Rate-Halving, were proposed to estimate the more accurate number of the outstanding packets during fast recovery phase. In this paper, we focus on t...
-
Chapter and Conference Paper
Performance Analysis of Wireless TCP
TCP performs reasonably well over Internet where packet losses are mainly due to network congestion. However, TCP originally targeted on the wire networks is inapplicable for the wireless networks where packet...