The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes bed posture classification by using a Neural Network model for elderly care. Data collected from a sensor panel (composed of piezoelectric sensors and pressure sensors), which is placed under a mattress in the thoracic area, we use Neural Network for posture classification. Bayesian approach is used for estimating the likelihood of consecutive postures. The sensing data are normalized...
This paper presents the design and implementation of an authorization mechanism for MQTT-based Internet of Things (IoT). The design is based on OAuth 1.0a, which is an open authorization standard for web applications. Some redesign and modification have been made to the based framework to fit it within the MQTT environment. Several considerations are taken into account, including limited node resources,...
With the prevalence of Network Address Translation (NAT), identifying a number of Internet users becomes a challenging task because many users share the same public IP address. This paper proposes a passive technique for estimating a number of Internet hosts sharing the same IP address, i.e., NATted hosts. Previous work by Bellovin [1] counted NATted hosts by observing a sequence of IPID fields in...
Mobile IPv6 protocol allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. One of these extensions, Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for devices...
There are two popular ways to distribute software in Linux world, by distributing source code or pre-compiled binary. Source-code distribution is suitable for open-source software. However, for close-source software pre-compiled binary is the only option. Unlike Windows, there are many versions of Linux distributions, such as Ubuntu, Red Hat, CentOS, and Debian. Different Linux distributions require...
Due to the complexity of nowadays networks and the inadequate of existing open-source software features, network administrators usually have to integrate several tools to build up the monitoring environments that meet their requirements. Nagios is one of those tools that have been widely used by experienced network administrators. Because of the flexible modular architecture, Nagios allows users to...
We implement a new IP address auto-configuration mechanism for MANET. The proposed mechanism lets any nodes in a MANET distribute address pools to a new node. The proposed algorithm can guarantee address uniqueness and achieve fast address assignment. The protocol is implemented on the Optimized Link State Routing protocol and supports both IPv4 and IPv6. This paper extends the previous work [6] by...
Although new applications and services in next-generation networks will lead to the offering of end-to-end QoS guarantees, relatively few studies have explicitly considered the concept of load balancing under the condition of guaranteed end-to-end QoS in an inter-domain network. The load-balanced path-classification (LBPC) scheme described in this paper provides end-to-end QoS guarantees across inter-domain...
This paper presents a road-traffic evaluation system from image processing data using manually tuned fuzzy logic and adaptive neuro-fuzzy techniques. The system is designed to emulate human’s expertise on specifying three levels of traffic congestion within Bangkok Metropolitan Area. The traffic information comes from a vehicle detection and tracking software, which takes a road-traffic video signal...
Traditional works in traffic classification usually measure usage of mail applications by monitoring only SMTP, IMAP, and POP3 traffic. The shortcoming of such measurement is that it does not take into account Web-based email usage (Webmail) since the Webmail traffic is usually classified collectively as HTTP or Web traffic. The simple way to identify Webmail traffic is mapping source or destination...
Due to the autonomous nature of ISPs, the service level agreement (SLA) offering is currently confined to within a single provider network. In this work, we examine some methods of extending the SLA offering across ISP boundaries. We introduce three policies to coordinate the end-to-end performance guarantee in multiple ISP networks: the least-effort, the most-effort, and the equal-distribution policies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.