Showing 261 - 280 results of 380 for search '"Computer network"', query time: 0.06s Refine Results
  1. 261

    QoS rerouting mechanism for SON by Long-fei WANG, Xing-wei WANG, Min HUANG

    Published 2012-11-01
    “…Along with the development of computer network,SON(self-organizing network)has attracted wide attention with its flexibility,adaptability,robustness.On the basis of OSPFv3,the interactive message of QoS state was defined to establish the information table of neighbors,store the link QoS information,judge the triggering of rerouting,and then the biological behaviors,such as hibernation and awakening,were introduced to the routing nodes.A hybrid rerouting mechanism was adopted to make the corresponding treatment under various network failure situations,so that the application QoS support could be provided when the network state was changing.Simulation results show that the proposed mechanism has better performance.…”
    Get full text
    Article
  2. 262

    EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET by Do Van Khoa, Tran Ngo Nhu Khanh

    Published 2021-02-01
    “…Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. …”
    Get full text
    Article
  3. 263
  4. 264

    Privacy in the Internet: Myth or reality by Mikarić Bratislav, Marković Marija, Trajković Dušan

    Published 2016-01-01
    “…What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.…”
    Get full text
    Article
  5. 265

    Recurrence Relations and Hilbert Series of the Monoid Associated with Star Topology by Jiang-Hua Tang, Zaffar Iqbal, Abdul Rauf Nizami, Mobeen Munir, Faiza Azam, Jia-Bao Liu

    Published 2020-01-01
    “…Star network is one of the most common in computer network topologies. In this work, we study star topology Sn and associate a Coxeter structure of affine type on it. …”
    Get full text
    Article
  6. 266

    System detecting network anomaly with visualization techniques by Haocheng ZHANG, Xiaojie WU, Xiang TANG, Runxuan SHU, Tianchen DING, Xiaoju DONG

    Published 2018-02-01
    “…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
    Get full text
    Article
  7. 267

    Des cités hallucinées à la grille invisible, William Gibson et les métamorphoses du cyberespace by Henri Desbois

    Published 2017-11-01
    “…In his first novels, cyberspace is at the same time a narrative trick to depict a global computer network and an element of a more global investigation of the relationship between geographic space and technology. …”
    Get full text
    Article
  8. 268

    Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm by Qingyang Zhang

    Published 2022-01-01
    “…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
    Get full text
    Article
  9. 269

    Botnets’ similarity analysis based on communication features and D-S evidence theory by ZANG Tian-ning1, YUN Xiao-chun1, ZHANG Yong-zheng2, MEN Chao-guang1, CUI Xiang2

    Published 2011-01-01
    “…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
    Get full text
    Article
  10. 270

    Influence of Psychological Stress and Moderate Physical Activity in Cardiovascular Reactivity by Milagros Lisset León Regal, Yandy García Álvarez, Rosmari Álvarez Hernández, Cynthia Morales Pérez, Víctor Manuel Regal Cuesta, Hermes David González León

    Published 2018-09-01
    “…For that a total of 30 bibliographic sources, among them 2 books and a number of articles from scientific journals, accessed through the main managers the computer network. It was concluded that psychological stress and aerobic physical exercises influence antagonistically on cardiovascular reactivity.…”
    Get full text
    Article
  11. 271

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…With the development of information technology, computer networks have become a part of people’s lives and work. …”
    Get full text
    Article
  12. 272

    Network Anomaly Detection System with Optimized DS Evidence Theory by Yuan Liu, Xiaofeng Wang, Kaiyu Liu

    Published 2014-01-01
    “…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
    Get full text
    Article
  13. 273
  14. 274

    Implementation of lightweight intrusion detection model for security of smart green house and vertical farm by Jun-Ho Huh

    Published 2018-04-01
    “…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
    Get full text
    Article
  15. 275

    Development and Application of UAV VR Panoramic Display System for Datengxia Water Project by ZHANG Yao, HUANG Pengjia, ZHU Changfu

    Published 2021-01-01
    “…With the rapid development of computer network technology,panoramic technology has been widely applied in many fields such as tourism,real estate,engineering construction,and virtual education.It realizes the all-round interactive viewing and browsing in real scenes,with the sense of the scene and interaction.This paper obtains the panoramic images by the UAV aerial photography and image stitching technology,develops the UAV VR panoramic display system of Datengxia Water Project based on krpano engine and geographic information technology for realizing many functions including panoramic data storage management,online editing,releasing,etc.After the system is applied to the panoramic data management of Datengxia,there are lots of good feedback,and the work efficiency is greatly improved.In addition,this panoramic system provides data support for the virtual monitoring of the Datengxia Water Project construction,promotes the classification and efficient retrieval of panoramic data in the project,improves the efficiency of users in making panoramic projects and managing panoramic data,and offers an operation platform for building the Datengxia Water Project exhibition site and the VR display project of the Datengxia Museum.…”
    Get full text
    Article
  16. 276

    Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT by Sepehr Sharifi, Soulmaz Gheisari

    Published 2024-02-01
    “…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
    Get full text
    Article
  17. 277
  18. 278

    Inflammatory Acute Response. Biochemical and Cellular Considerations by Milagros Lisset León Regal, Ania Alvarado Borges, José Omar de Armas García, Luciano Miranda Alvarado, Javier Antonio Varens Cedeño, José Ángel Cuesta del Sol

    Published 2015-02-01
    “…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
    Get full text
    Article
  19. 279

    On Fault-Tolerant Resolving Sets of Some Families of Ladder Networks by Hua Wang, Muhammad Azeem, Muhammad Faisal Nadeem, Ata Ur-Rehman, Adnan Aslam

    Published 2021-01-01
    “…In computer networks, vertices represent hosts or servers, and edges represent as the connecting medium between them. …”
    Get full text
    Article
  20. 280

    The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
    Get full text
    Article