The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problems associated with multipath routing in Border Gateway Protocol (BGP) for Autonomous Systems (ASes) can be solved with some model or control systems from the Software Defined Networking (SDN). The SdN controller could be used to solve the inconsistencies in the scalability and latency of the Routing Information Base (RIB) of ASes. Also, a set of modules for Inter-AS routing and Brokering...
This paper proposed a solution of Multi-frequency band 6LoWPAN accessing to IPv6 Internet based on the research of wireless sensor network, 6LoWPAN standard and IPv6 network. Furthermore, combining with the multiplexing technology and the TUN/TAP technology, this paper proposed a uplink and downlink packet scheduling mechanism oriented to the multi-packet concurrency problem and realized it in the...
Internet of Things (IoT) has revolutionized the traditional Internet where only human-centric services were offered. It has enabled objects to have the ability to connect and communicate through the Internet. IoT has several applications such as smart water management systems. However, they require high energy-efficient sensor nodes that are able to communicate across long distance. This motivates...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
In this paper, we present a novel method to classify directions of capital flows in Internet finance. Our method is different from previous text classification methods in that extracts key sentences which may directly reflect the semantics of input text before classification. We use the Bi-LSTM model as a classifier to process input sentences. In this paper, we represent the matrix of key sentences...
Despite the modern gas equipment, combustible gas leakage related emergency situations still take place and lead to building demolitions and human losses. Leak integrity failures because of anthropogenic and natural factors make impossible to prevent such emergency in other ways except providing continuous monitoring of combustible gas concentration and notification for people and special services...
In this paper we discuss the Internet of Things (IoT) by exploring aspects which go beyond the proliferation of devices and information enabled by: the growth of the Internet, increased miniaturization, prolonged battery life and an IT literate user base. We highlight the role of feedback mechanisms and illustrate this with reference to implemented computer enabled factory control systems. As the...
This paper presents an IoT (Internet of Things) system designed to allow the monitoring and control of parameters of the users' vehicles, anytime and anywhere in the world, through the Internet. The system prototype was developed and tested using an electric vehicle (EV) and the respective sensor systems. The main components of the proposed IoT system are: a Bluetooth Low Energy (BLE) intra-vehicular...
Tor is an anonymous Internet communication system based on the second generation of onion routing network protocol. Using Tor is really difficult to trace the users Internet activity: this is the reason why the usage of Tor is intended in order to protect the privacy of users, their freedom and the ability to conduct confidential communications without being monitored. Tor is even more used by cyber...
Consumers frequently get Internet access through a single home gateway. Gateways using conventional FIFO queue management can introduce hundreds or even thousands of milliseconds of additional delay when congested by bulk TCP data transfers. This delay impacts negatively on any latency-sensitive interactive traffic (such as Voice over IP, or First Person Shooter games). Such applications prefer network...
Multimedia streaming is a significant source of Internet traffic, with Netflix and YouTube accounting for more than 50% of North American fixed network peak download traffic in 2016. Dynamic Adaptive Streaming over HTTP (DASH) is a recent standard for live and on-demand video streaming services, where clients adapt the video quality on-the-fly to match the network capacity by requesting multi-rate...
Ongoing emphasis on the fourth industrial revolution requires further focus on the Internet of Things (IoT) as a means to integrate all relevant entities within a single technological system. In the integration process, a gateway to relay the raw data to an IoT endpoint is essential so that a joint interface among the heterogeneous domains can be provided. This work describes the development of a...
Internet of Things (IoT) solutions are increasingly being deployed for smart applications. To provide good communication for the increasing number of smart applications, there is a need for low cost and long range Low Power Wide Area Network (LPWAN) technologies. LoRaWAN is an energy efficient and inexpensive LPWAN solution that is rapidly being adopted all around the world. However, LoRaWAN does...
With the growing popularity of smart things and the omnipresence of wireless communications, the Internet continues to revolutionize from the Internet of hosts, the Internet of People, to the Internet of Things (IoT). Intelligent and scalable orchestration of massive IoT objects using a multitier architecture are critical to embrace the vision of IoT. This paper presents our vision and our initial...
This paper presents an economic e-Learning prototype for boosting up agricultural knowledge in rural regions of Thailand. The proposed prototype is designed on low-resource and mobility concepts. An e-Learning service is utilized for local self-learning and local staff to instruct contents. Due to the limitations and problems of ICT infrastructure, we design our system to function in two modes which...
the widespread availability of high-speed broadband Internet access brings online-enabled revenue model to gaming industry. However, Today’s Internet does not guarantee a quality level beyond best effort for the majority of applications used by home users. As a consequence, data flows transferred over the Internet can experience bandwidth constraints. At homes, this bandwidth constraint becomes more...
Information Centric Networks (ICN) is very promising for Internet of Things (IoT) deployment, where the data-centric approach is useful in reducing the data retrieval latency as well as the network traffic for IoT services. Also, the innetwork caching capabilities in ICN limits the massive data access to the data producers and so relaxes the need of continuous connectivity E2E connectivity between...
Citizens develop Wireless Mesh Networks (WMN) in many areas as an alternative or their only way for local interconnection and access to the Internet. This access is often achieved through the use of several shared web proxy gateways. These network infrastructures consist of heterogeneous technologies and combine diverse routing protocols. Network-aware state-of-art proxy selection schemes for WMNs...
The emerging Internet of Things (IoT) involves integrating and forwarding data generated by heterogeneous sensing devices (IoT devices). The data is sent using various wireless technologies to application servers present in the IoT cloud via intermediate gateways. Using traditional routing techniques to connect millions of IoT devices to the Internet result in congestion and overloading of gateways...
The Internet of Things (IoT) enables several heterogeneous devices, sensors, wearables, appliances and many other objects to inter-communicate and provide support for heterogeneous services. An IoT network needs to enable exchange diverse data types including multimedia and sensor data and be capable of handling a large number of IoT objects offering services at high quality levels. This paper proposes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.