The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) communications in JXTA-Overlay platform considering as a new parameter the peer congestion situation. In our system, we considered four input parameters: Data Download Speed (DDS), Peer Congestion Situation (PCS), Number of Interactions (NI) and Packet Loss (PL) to decide the Peer Reliability (PR). We...
With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In our previous work, we implemented a simulation system based on Simulated Annealing (SA) for solving node placement problem in wireless mesh networks, called WMN-SA. Also, we implemented...
Deep Learning also called Deep Neural Network (DNN) has a deep hierarchy that connect multiple internal layers for feature detection and recognition learning. DNNs are emerging fast and will continue to grow together with feature detection methods. In previous work, we applied deep learning for vegetable object recognition and explored the Convolutional Neural Network (CNN). In this paper, we propose...
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum and multimedia traffic characteristics. In this paper, we implement a Fuzzy Call Admission Control Sysytem considering Security and Priority parameters. We call this...
In this paper, we present the application of Neural Networks (NNs) for user identification in Tor networks. We used the Back-propagation NN and constructed a Tor server, a Deep Web browser (Tor client) and a Surface Web browser. Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then used the Back-propagation NN...
In this paper, we evaluate and compare the performanceof four different routing protocols in a many-to-onecommunication opportunistic network. Seven groups with threestationary sensor nodes sense the temperature, humidity andwind speed and send these data to a stationary destination nodethat collect them for statistical and data analysis purposes. Vehicles moving in Tirana city roads during the opportunisticcontacts...
In this paper, we evaluate the performance of two WMN architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3. We compare the performance for two architectures considering transmission rate and OLSR protocol. The simulation results show that for transmission rate 600 and 1200 [kbps], the throughput of Hybrid WMN is higher than I/B WMN. For transmission...
In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance for Transmission Control Protocol (TCP) Tahoe, Reno and NewReno for uniform distribution of mesh clients...
In this paper, we evaluate the performance of WMN using our WMN-GA simulation system considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3 and Optimized Link State Routing (OLSR). We compare the performance of Distributed Coordination Function (DCF) and Enhanced Distributed Channel Access (EDCA) for exponential distribution of mesh clients by sending multiple...
In Wireless Sensor and Actor Networks (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary amongsensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we...
In this paper, a conflict-graph basedpower control scheme for spectrum underlay incognitive radio networks is proposed, which helpsavoiding the interference and saving power whenthe primary and secondary users share the samechannel simultaneously. Simulations results usingthe OMNet++ simulator are provided, showing theeffectiveness of the proposed approach in terms ofnumber of users in the network,...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using OpenWRT OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor environment considering Line-of-Sight...
The emergence of the Big Data as a disruptive technology for next generation of intelligent systems, has brought many issues of how to extract and make use of the knowledge obtained from the data within short times, limited budget and under high rates of data generation. The foremost challenge identified here is the data processing, and especially, mining and analysis for knowledge extraction. As...
In our previous work, we proposed a method of Enhanced Message Suppression Controller (EMSC) considering Vehicle-to-Vehicle (V2V) communication. In this paper, we improve EMSC by considering delayed acknowledgment for Vehicular-Delay/Disruption Tolerant Networking (V-DTN). The simulations for a scenario is conducted considering persist timer to control the delayed acknowledgment, where EMSC embedded...
A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
Wireless Sensor and Actuator Networks (WSANs) have emerged as a variation of wireless sensor networks. WSANs have great potential for improving many current applications, such as environmental monitoring/surveillance, life science and rescue/support operations. In previous work, we proposed a fuzzy-based WSAN testbed that based on data provided by sensors and actuators select an appropriate actuator...
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.