Network Monitoring Applications Based on IoT System Andrej Kos, Urban Sedlar, Janez Sterle, Mojca Volk, Janez Bešter Laboratory for Telecommunications Faculty of Electrical Engineering, University of Ljubljana Ljubljana, Slovenia andrej.kos@fe.uni-lj.si Abstract— We present applications for network monitoring based on intelligent communication platform that can also be used to support various usage scenarios related to future internet of things. Applications presented include real time
Words: 3070 - Pages: 13
INVITED PAPER Overlapping Communities Explain Core–Periphery Organization of Networks The paper presents a new paradigm for uncovering the modular structure of complex networks. By Jaewon Yang and Jure Leskovec ABSTRACT | Networks provide a powerful way to study food web networks have a single central dominant core while complex systems of interacting objects. Detecting network communities in protein–protein interaction (PPI) as well as communitiesVgroups of objects
Words: 7671 - Pages: 31
Internet of Things: Perspectives, Challenges and Opportunities Antonio Marcos Alberti Dhananjay Singh Instituto Nacional de Telecomunicações - Inatel P.O. Box 05 - 37540-000 Santa Rita do Sapucaí, Minas Gerais, Brazil alberti@inatel.br Department of Electronics Engineering Hankuk (Korea) University of Foreign studies Global Campus: Yongin, South Korea dsingh@hufs.ac.kr Abstract – The Internet of things can be defined as to make the “things” belong to the Internet. However, many
Words: 4683 - Pages: 19
Routing in Wireless Sensor Networks: application on Fire Detection Abstract: this paper is about fire detection in building using a modified APTEEN routing protocol. Here we design a system called iFireControl which is a smart detection system for buildings, which is more water efficient than many current systems, while keeping its robustness. introduction A Wireless Sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions,
Words: 4845 - Pages: 20
138 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 1, FEBRUARY 2012 A Fusion Approach for Efficient Human Skin Detection Wei Ren Tan, Chee Seng Chan, Member, IEEE, Pratheepan Yogarajah, and Joan Condell Abstract—A reliable human skin detection method that is adaptable to different human skin colors and illumination conditions is essential for better human skin segmentation. Even though different human skin-color detection solutions have been successfully applied, they are prone
Words: 5432 - Pages: 22
NETW-561-11244 2013 GSM: The New Wave to the future Wireless Technologies Professor Raef Yassin Anthony Garcia Table of Contents Introduction3 Strategic Business Assessment4 Technology5-7 Design a Wireless System8-10 Compatability Plans11-12 Planned Competitive Improvements13-14 Other Competitive Technological Solutions15 Upgrading to Next Generation16-17 Summary18 Work Cited19 Tiered Cell Tower20 3G vs 4G Chart21 Introduction In today’s society there are many different
Words: 6006 - Pages: 25
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS
Words: 18072 - Pages: 73
On-Chip Networks from a Networking Perspective: Congestion and Scalability in Many-Core Interconnects George Nychis†, Chris Fallin†, Thomas Moscibroda§, Onur Mutlu†, Srinivasan Seshan† † Carnegie Mellon University {gnychis,cfallin,onur,srini}@cmu.edu moscitho@microsoft.com § Microsoft Research Asia ABSTRACT In this paper, we present network-on-chip (NoC) design and contrast it to traditional network design, highlighting similarities and differences between the two. As an initial case
Words: 13410 - Pages: 54
On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 6 IP source address spoofing has plagued the Internet for many years. Attackers spoof source addresses to mount attacks and redirect blame. Researchers have proposed many mechanisms to defend against spoofing, with varying levels of success. With the defense mechanisms available today, where do we stand? How do the various defense mechanisms compare? This article first looks into the current state of IP spoofing
Words: 14721 - Pages: 59
1 Twitter mood predicts the stock market. Johan Bollen1, ,Huina Mao1, ,Xiao-Jun Zeng2 . : authors made equal contributions. arXiv:1010.3003v1 [cs.CE] 14 Oct 2010 Abstract—Behavioral economics tells us that emotions can profoundly affect individual behavior and decision-making. Does this also apply to societies at large, i.e. can societies experience mood states that affect their collective decision making? By extension is the public mood correlated or even predictive of economic indicators
Words: 6988 - Pages: 28