The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Networks (WMNs) consist of several Access Points (APs) of Wireless Local Area Networks (WLANs) interconnected through wireless link. It is necessary to monitor the networks in order to properly operate WMNs. However, it is very difficult to always monitor WMNs. Though several researches for visualization system of WMNs were done, there are some problems such as lack of dynamic information...
In developing countries, disaster areas, and other places where communication infrastructure is unstable, people need a system that allows them to easily install a network in any location. In this paper, we propose the mesh network named Adaptive Multi-Gateway Mesh Network (AMGMN). AMGMN supports wired and wireless LANs. The combination of wired and wireless LANs prevents radio interference and ensures...
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. As a solution for solving the above problem, there is the approach of Policy-based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control of every user...
The Internet threat monitoring systems are developed to grasp malicious activities on the Internet. Those systems consist of a data center and sensors deployed on the Internet. Sensors capture malicious packets and report to the data center. The data center investigates the latest trend of attacks by analyzing those packets and the result is open to the public. To publish precise monitored results,...
In an office or laboratory, the informal communication that suddenly occurs in a face-to-face meeting sometimes takes the form of a heated discussion or important information sharing. Visual information, such as pictures and graphs, facilitates the fast and accurate communication of an intention between people. Therefore, visual information should be shown quickly in this situation so that the conversation...
The purpose of this study is making clear factors of what affects the contents of software reviews posted by customers at electronic commerce (e-Commerce) websites. Frequent referring to such reviews helps people to buy something. However, it is considered difficult to judge the quality of contents with reviews completely, because conditions for each software, such as, published data, categories,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.