The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we evaluate the performance of two WMN architectures (infrastructure/backbone WMNs (I/B WMNs) and Hybrid WMN architectures) considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3 and optimized link state routing. We compare the performance of distributed coordination function and enhanced distributed channel access (EDCA) for exponential and...
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor...
A Wireless Sensor and Actor Network (WSAN) is a group of wireless devices with the ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), based on the sensed data shared by sensors. This paper presents design and implementation of a simulation system based on Deep Q-Network (DQN) for mobile actor node control in WSANs. DQN is a deep neural network structure...
In this paper, we evaluate the performance of two WMN architectures considering throughput, delay and fairness index metrics. For simulations, we used ns-3. We compare the performance for two architectures considering different transmission rates and OLSR protocol. The simulation results show that for 100 [kbps] transmission rate, the throughput of Hybrid WMN is higher than I/B WMN. But, for transmission...
Wireless Mesh Networks (WMNs) have many advantages such as low cost and increased high speed wireless Internet connectivity, therefore WMNs are becoming an important networking infrastructure. In our previous work, we implemented a Particle Swarm Optimization (PSO) based simulation system, called WMN-PSO. Also, we implemented a simulation system based on Simulated Annealing (SA) for solving node placement...
In our previous work, we implemented WMN-GA system which is based on Genetic Algorithms (GAs) and used it for node placement problem in WMNs. In this paper, we evaluate the performance of two different distributions of mesh clients for two WMN architectures considering PDR, throughput, delay, fairness index and energy metrics. For simulations, we used ns-3, Hybrid Wireless Mesh Protocol (HWMP) and...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
The Internet is dramatically evolving and creating various connectivity methodologies. The Internet of Things (IoT) is one of these methodologies which transform current Internet communication to Machine-to-Machine (M2M) basis. The IoT can seamlessly connect the real world and cyberspace via physical objects that are embeded with various types of intelligent sensors. The opportunistic networks are...
In this paper, we present the application of Neural Networks (NNs) for user identification in Tor networks. We used the Back-propagation NN and constructed a Tor server, a Deep Web browser (Tor client) and a Surface Web browser. Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then used the Back-propagation NN...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using OpenWRT OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor environment considering Line-of-Sight...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using Raspbian OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor environment considering Transmission...
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect or identify the bad...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.