Showing 401 - 420 results of 590 for search '"Deployment environment', query time: 0.05s Refine Results
  1. 401
  2. 402

    Application research on distributed Zabbix network monitoring system by Xiao-hui GUO, Run-zhi LI, Qian ZHANG, Zong-ming WANG

    Published 2013-09-01
    “…With the increasing number of server,to ensure the normal operation of the server and application services becomes more and more complex.The importance of server monitoring system in modern server management was explained.With Zabbix,a distributed monitoring and control system was deployed,realizing some important application services monitoring in Windows and Linux environment with distributed network monitor and control system.The principle and configuration of the monitoring of Web Server,Database and DNS Server were introduced.Finally,the use cases using in the network center were shown.…”
    Get full text
    Article
  3. 403

    GlobeSen:an interconnection framework of information-centric IoT by Bo CHEN, Liang LIU, Hua-dong MA

    Published 2017-09-01
    “…Interconnection framework of information-centric IoT:GlobeSen was proposed,which implemented the efficient interconnection of sensor networks and Internet.According to the characteristic of weak network elements,such as wireless sensor nodes,and the spatio-temporal relationship of sensory data,an information-centric network protocol for sensor networks NDNs was designed.Then,a protocol translation mechanism in the gateway was designed to interconnect NDNs and NDNx that running in Internet.A prototype by using the TelosB wireless sensor node and ARM board was implemented,and the proposed design by deploying the prototype in the environment was evaluated.…”
    Get full text
    Article
  4. 404

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. …”
    Get full text
    Article
  5. 405

    Balancing Profit and Cultural Heritage: Multi-Objective Dynamic Pricing for Hanfu Using Deep Deterministic Policy Gradient by Qingcong Zhao, Guanghui Mao, Shen Wang

    Published 2025-01-01
    “…MOHPSO-DDPG, Multi-Objective Particle Swarm Optimization (MOPSO), and Multi-Objective Hybrid Particle Swarm Optimization (MOHPSO) were each deployed to interact with the environment to explore the Pareto front of pricing decisions. …”
    Get full text
    Article
  6. 406

    End of the INF Treaty: Are We Entering a New Cold War Era? by Şafak OĞUZ, Mehmet Seyfettin EROL

    Published 2021-06-01
    “…The new environment, with regional and global crises and massive armament by the global powers, including missile defense systems and hypersonic missiles, would endanger possible cooperation.…”
    Get full text
    Article
  7. 407

    Automatic generating regular expression signatures for real network worms by Yong TANG, Jian-wei ZHUGE, Shu-hui CHEN, Xi-cheng LU

    Published 2013-03-01
    “…Based on the honeypot system Honeybow deployed in Internet, the method was implemented and evaluated by several in-wild worms under real Internet environment. …”
    Get full text
    Article
  8. 408

    Lite-CA based key pre-distribution scheme in wireless sensor network by PAN Yun1, WANG Li-cheng2, CAO Zhen-fu3, LI Jian2

    Published 2009-01-01
    “…Large-scale sensor nodes were usually deployed in potentially adverse or even hostile environment, so the security in these networks was very important.Due to its constraints on node cost, size and power dissipation, sensor’s energy and capabilities on computation, storage and communication were considerably weak compared with general computers.It leaded to many new challenges for designing of key management protocols in WSN.Therefore, a lite-CA based key pre-distribution scheme was suggested.The traits of CA-based authentication framework and identity-based authentication framework were combined by this scheme.Further, the scheme was efficiently implemented based on quadratic residue theory.…”
    Get full text
    Article
  9. 409

    Intrusion Detection Systems in Wireless Sensor Networks: A Review by Nabil Ali Alrajeh, S. Khan, Bilal Shams

    Published 2013-05-01
    “…Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. …”
    Get full text
    Article
  10. 410

    Research and implementation of pedestrian detection technology based on smart road by Yunpeng WANG, Quyuan LUO, Changle LI, Guoqiang MAO

    Published 2019-09-01
    “…Aiming at the problem of single detection function,higher cost and lower detection efficiency and reliability for current pedestrian detection,which was mostly realized by vehicle mounted equipment,a pedestrian detection technology based on smart road was proposed.By deploying a large number of low-cost,highly reliable Internet of things devices on the road,real-time detection of pedestrian information in the surrounding environment was realized.Early warning information can be provided to vehicles with very low latency wireless communication technology,which can improve road safety.At present,the prototype of the pedestrian detection system has been developed,and verified by field test,the pedestrian detection system can detect pedestrians effectively.Within the detection range of 4 meters,the accuracy of single device can reach 80%,and the accuracy of multiple cross-deployed devices can reach 100%.…”
    Get full text
    Article
  11. 411

    Secure localization scheme against wormhole attack for wireless sensor networks by Hong-long CHEN, Zhi-bo WANG, Zhi WANG, Jiang-ming XU, Yan-jun LI, Li-ping LIU

    Published 2015-03-01
    “…However, WSNs are often deployed in the hostile environment, in which the attackers can eas-ily disrupt the localization procedure of the nodes. …”
    Get full text
    Article
  12. 412

    Detecting Ground Level Enhancements Using Soil Moisture Sensor Networks by A. D. P. Hands, F. Baird, K. A. Ryden, C. S. Dyer, F. Lei, J. G. Evans, J. R. Wallbank, M. Szczykulska, D. Rylett, R. Rosolem, S. Fowler, D. Power, E. M. Henley

    Published 2021-08-01
    “…Abstract Ground level enhancements (GLEs) are space weather events that pose a potential hazard to the aviation environment through single event effects in avionics and increased dose to passengers and crew. …”
    Get full text
    Article
  13. 413

    Research of connectivity for wireless sensor networks by HUANG Xiao 1, CHENG Hong-bing 1, YANG Geng1

    Published 2009-01-01
    “…It was crucial to acquire the knowledge of nodes connectivity before management,application and research of wireless sensor networks when they had been deployed in the interest randomly.Under real environment there can be some nodes called unreachable node in interest,which could not communicate with base station for some reason,for ex-ample there are some nodes lie out of the radio range of base station or the interest range.A scheme to make those un-reachable nodes be able to communicate with base station was proposed.At the same time,a judgment algorithm for nodes connectivity based on a normal wireless sensor networks model was proposed.In simulation two-experiment scheme to test the proposed scheme and judgment algorithm were set.From the results of simulation conclude that the proposed scheme can improve nodes’ connectivity in the interest and the proposed algorithm can judge the connectivity efficiently and accurately.…”
    Get full text
    Article
  14. 414

    Research on active defense application based on honeypot by Dequan YANG, Weimin LIU, Zhou YU

    Published 2018-01-01
    “…Abstract:With the rapid development of financial information technology,cyber security events on the financial system have also increased greatly.Active defense plays an important role in improving the defense level of defined private network.How to quickly and effectively deploy and apply honeypot to capture and attack behavior,analyze the attack intention and raise the threshold of attack is the key to ensure the security of the defined private network.From the perspective of active defense,the advantage of honeypot active defense was analyzed,an active defense and defense filling passive defense integration was designed,and a honeypot within private network experimental environment was set up,the results show that the active defense technology can effectively improve the threshold of the attacker's attack,so as to improve the security level of the whole network.…”
    Get full text
    Article
  15. 415

    Cost-Effective Autonomous Drone Navigation Using Reinforcement Learning: Simulation and Real-World Validation by Tomasz Czarnecki, Marek Stawowy, Adam Kadłubowski

    Published 2024-12-01
    “…The motivation behind this study is the growing interest in deploying AI in public spaces, particularly in autonomous vehicles such as flying drones, to address challenges in navigation and control. …”
    Get full text
    Article
  16. 416

    Online energy-aware task dispatching with QoS guarantee in edge computing by Hao YUAN, Deke GUO, Guoming TANG, Lailong LUO

    Published 2021-06-01
    “…Edge computing can provide users with low-latency and high-bandwidth services by deploying many edge servers at the network edge.However, a large number of deployments also bring problems of high energy consumption.When dispatching tasks from end devices to different edge servers, different energy consumption and delays will occur due to the edge servers’ heterogeneity.Therefore, it is a challenge to select an optimal server among many edge servers for task dispatching so that energy consumption and delay are relatively low.An energy-aware task dispatching method with quality of service (QoS) guarantee based on online learning was proposed.It can obtain real-time information by interacting with the environment to ensure energy consumption was minimal while the QoS was acceptable when dispatching tasks.Experiments show that the proposed method can dispatch tasks efficiently to the optimal server compared with other methods, thereby reducing the edge computing network’s overall energy consumption significantly.…”
    Get full text
    Article
  17. 417

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…We implemented SC and deployed it on actual server environments hosting the existing cloud software. …”
    Get full text
    Article
  18. 418

    HistoNeXt: dual-mechanism feature pyramid network for cell nuclear segmentation and classification by Junxiao Chen, Ruixue Wang, Wei Dong, Hua He, Shiyong Wang

    Published 2025-01-01
    “…Its low computational complexity makes the model well suited for local deployment in resource-constrained environments, thereby supporting a broad spectrum of clinical and research applications. …”
    Get full text
    Article
  19. 419

    Le développement durable est-il bienvenu dans les organisations ? Cas de l’implantation d’un Système de Management Environnemental en Tunisie by Moez Ben Yedder, Mohamed Farhoud

    Published 2014-07-01
    “…Their engagement is materialised by deploying environment friendly practices such as environmental management system (EMS). …”
    Get full text
    Article
  20. 420

    Routing metric based on interference measurement for multi-radio multi-channel wireless mesh networks by Wen-jiang JI, Jian-feng MA, Jun-wei ZHANG, Zhuo MA

    Published 2013-04-01
    “…An interference sensing based(ISB)routing metric which mainly depend on the estimation of signal power was introduced for the multi-radio multi-channel wireless mesh networks.The existing metric such like WCETT and iAWARE all have their drawbacks were shown.As shown in the equations of iAWARE,it could be proved that worse background noise corresponds to a better metric value which was imprecise.The iAWARE to make it suited for the environment with background noise was improved,and the isotonic property was regained that the Bellman-Ford and Dijkstra algorithm could be deployed in ISB.The simulation results prove the novel algorithm takes the advantages of higher efficiency both in throughput and end to end delays,compared with the traditional ones HopCount,ETT,WCETT and iAWARE.…”
    Get full text
    Article