The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming to keep under control a particular system or environment or to ensure that it works as expected there is a need to know what-when-why happens there. Various conditions and environmental factors can lead to errors, unexpected behavior or loss of control. To pursue these factors manually is time consuming, error prone, slow and usually quite expensive. Monitoring is quite complex and challenging...
One of the major challenges in opportunistic networks is the correct identification of a transmission opportunity and its corresponding duration. In this work, recurrent neural network structures are investigated for transmission opportunity forecast. The proposed method is based on in-channel spectrum sensing and the use of Elman recurrent neural network to model the occupation of the channel. The...
Ensuring connectivity among mobile nodes is significantly important to the success of many critical applications, like military, where the loss of connectivity can lead to the failure of the mission and also proved to be challenging in particular when mobiles nodes have heterogeneous mobility pattern i.e., they are moving in several directions at different speeds. In this paper, we propose a new Heterogonous...
Recently, several works propose monitoring approaches for the emerged paradigm of Software-defined Networking. These provide a couple of ideas to retrieve various information about the network state leveraging new concepts for monitoring data collection at flow-level. As existing approaches reduce their scope to networks with a single controller, even sophisticated approaches ignore a potentially...
An architecture for a service-oriented open-source cloud-based software platform for the energy domain is developed based on an analysis of the results of the FIWARE-based FINESCE project. A proposal to incrementally develop the platform through a consortium of partners from utilities, ICT companies and service providers is outlined. This collaborative approach is considered to be sustainable because...
Minimizing energy-consumption is an important aspect in the creation of network stacks optimized for resource constrained embedded systems. In this abstract we present our approach of using a lightweight monitor inside the Contiki firmware to investigate energy consumption issues. We also present a first result that we obtained with this approach.
Despite recent emerging development in intrusion detection or network monitoring, malicious attacks and misbehavior remain a high-risk issue within network traffic. In this paper, we present a proactive solution called MMT (Montimage1 Monitoring Tool) that allows facilitating network security and performance monitoring and operation troubleshooting. We demonstrate the improvements of MMT in comparison...
The Cresco distributed agent-based framework is designed to address the challenges of edge computing. We present an actor-model implementation for the management of large numbers of geographically distributed services, comprised from heterogeneous resources and communication protocols, in support of low-latency realtime streaming applications. We present the purpose of our work, the basic methodology,...
Support Vector Machines (SVM) have been considered for real-life machine learning applications in various fields. Security concerns in modern industrial networks, also used in critical infrastructures, require novel monitoring techniques applicable for these constrained, real-time environments. Characteristics of these networks' traffic indicate that SVM can be a powerful tool for realizing a self-configuring...
Delay Tolerant Networks (DTN) are well adapted for situations where the network nodes suffer from intermittent communications due to the high mobility of the nodes and the constantly changing environment. Several research works tried to address this problem and lately, an ants-based protocol named GrAnt, has been proposed as one of the best solutions. In this paper we firstly assess GrAnt performance...
Commercial applications of wireless sensor networks, also known as machine-to-machine (M2M) communications, feature hundreds of thousands or even millions of devices. These M2M applications often rely on cellular networks like GSM that were not designed with such use cases in mind. Based on our first-hand experience at a large provider of M2M communications solutions, there is a need for soft real-time...
Internet is broken and there are several approaches to fix it. In order to validate the different attempts, they need to be evaluated within large-scale environments involving numerous heterogeneous resources. As a result, several testbeds have been established along with a number of competitive mechanisms to federate them. Since most of these protocols try to address similar issues, combining and...
Group Activity Recognition (GAR) is a challenging research area in context-aware computing which has attracted much attention recently. Many studies have been conducted in the field of activity recognition (AR) along with their applications in domains such as health, smart homes, daily living and life logging. However, still many open issues exist. Lack of an energy-efficient approach is one of the...
Telemedicine depends on Information and Communication Technology (ICT) to support remote treatment of patients. This dependency requires the telemedicine system design to be resilient for ICT performance degradation or subsystem failures. Nevertheless, using telemedicine systems create a dependency between medical and technological concerns. We propose a layering technique that links medical and technological...
Design and implementation of Wireless Sensor Networks (WSNs) is a challenging task because WSN research is usually application specific and each application requirement brings with it a different set of constraints and design objectives. Effective use of WSNs in large scale and long-term monitoring of industrial water pollution requires satisfying two inherently contradicting requirements particular...
The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provider...
With the development of Internet technologies, distributed and multimedia applications are more and more used. Because these applications have Quality of Service (QoS) expectations (bounded delay, guaranteed bandwidth, etc.), a set of QoS oriented protocols aimed at aiding end-to-end communications are proposed. Each one of these protocols offers one or several mechanisms. Selecting the best protocol...
This paper introduces reference metrics for performance assessment of context-based charging, based on a novel model in which the charging process is capable of adapting to the user context by handling context-change driven events. The proposed metrics correspond to the response time in the relevant signalling scenarios, derived from the Third Generation Partnership Project (3GPP) network standards,...
Two principles of enduring institutions for self-organising resource allocation are congruence of the allocation method to the resources available, and participation of those affected by the allocation (the appropriators) in selecting that method. However, the principles do not say anything explicitly about the fairness of the allocation method, or the outcomes. In this paper, we complement these...
Availability of low cost sensor nodes has made Wireless Sensor Networks (WSNs) a viable choice for monitoring critical infrastructure such as power grid, civil structures and others. There are quite a few approaches in the literature that use WSN to monitor pipelines (water, gas, oil, and various other types of pipelines). The primary goal of all these protocols is to detect device malfunctions such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.