Showing 4,281 - 4,300 results of 19,848 for search 'Alternet~', query time: 2.82s Refine Results
  1. 4281

    Security of the deployment of SDN-based IoT using blockchain by Ping XIE, Xiaosong LIU

    Published 2020-12-01
    “…Compared with the traditional internet,the SDN-based internet of things (IoT) has a wider coverage,more connected devices,more complex data transmission.There are many security technical challenges.The security challenges of SDN-based IoT deployment were firstly analyzed,and then the advantages of blockchain technology in solving those security issues were introduced.Finally,to add a blockchain-based security layer was proposed,which acted as a security gateway,data entering the IoT was verified accurately one time.Each security gateway was added to the blockchain system as an equal blockchain node,combined with the traceability and non-tampering of the blockchain system,the security performance and efficiency of SDN-based IoT deployments was improved.…”
    Get full text
    Article
  2. 4282

    Content Distribution Mecbanisms of Named Data Networking by Kai Lei, Jie Yuan

    Published 2014-09-01
    “…Future internet architecture research is one of the major strategic needs of science and technology development. …”
    Get full text
    Article
  3. 4283

    Quantum-based wireless sensor networks: A review and open questions by Mario E Rivero-Angeles

    Published 2021-10-01
    “…Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. However, the use of quantum technology in wireless sensor networks has not been thoroughly investigated just yet. …”
    Get full text
    Article
  4. 4284

    Study on BGP route leak by Jia JIA, Zhi-wei YAN, Guang-gang GENG, Jian JIN

    Published 2016-08-01
    “…With the rapid expansion of the scale of Internet,BGP plays a more and more important role in the Inter domain routing system.BGP has a lot of security risks,which result in prefix hijacking,AS_PATH hijacking and route leak attacks occuring frequently,causing serious threats to the Internet.In currently,the content introduction and security research mechanism were little,so a detailed study of BGP route leak was carried out.The BGP proto-col,route policy and established rules were introduced,six types of major route leak security incidents were analy-sised,the current security mechanisms and methods were summarized and compared to solve and detect route leak.In the last,a new prospect for the security and protection mechanism of route leak was proposed.…”
    Get full text
    Article
  5. 4285

    Researcb on tbe Arcbitecture of Reconfigurable Fundamental Information Communication Network by Julong Lan, Gang Xiong, Yuxiang Hu, Shiran Liu, Dongnian Cheng

    Published 2015-04-01
    “…With the enlargement of network scale and deployment of various new business,it is becoming more and more obvious that the statical and rigid architecture of the IP network is deficient in business adaptability,transport ability,security and controllability and so on.This fact makes the clean-slate design of future internet architecture be a hot research topic.Against this background,new ideas and methods for the internet development based on the advantage of reconfigurable technology with flexibility,scalability and adaptability were provided.The practice shows that the research results of the project have given solutions for some fundamental problems of network,and produced important influences on related fields at home and abroad.…”
    Get full text
    Article
  6. 4286

    Data provision for IoT searches:an auction approach by Li-hua YIN, Yun-chuan GUO, Hui-bing ZHANG

    Published 2015-12-01
    “…Getting accurate data was one of keys problems in the IoTs search.Different from the Web searches that use the crawlers to collect data on the Internet,the IoT searches require that owners offer data proactively because their data were not simply released to the Internet.However,due to some reasons(privacy concerns),data owners were unwilling to provide their data to the IoT searches without enough incentives.As a result,effectively motivating owners to provided data becomes a key problem for he development of IoT searches.To address this problem,a multi-attribute auction that maximizes cost-effectiveness ratio was proposed.This mechanism can prevent hostile bids and avoid the problem that the winner provide data inconsistent with the promised quality.It was also proved that in the auction,the optimal quality was independent from its quotation and other bidders’ quality and their price.…”
    Get full text
    Article
  7. 4287

    Prediction and modeling of connectivity probability in vehicular Ad Hoc networks by Huimin WANG, Haitao ZHAO

    Published 2016-03-01
    “…Recently,with the rapid development of vehicular communication technology,IoV(internet of vehicles)as one of the applications of IoT(internet of things),is attracting more and more attention as well as its basic applications.The algorithm of predicting the connectivity probability based on highway model was proposed.Also,the joint distribution of vehicles on highway was studied,and the equation calculating the boundaries of connectivity probability on one road segment was analyzed quantitatively.The diagram presenting the relationship between the connectivity probability on one road segment and the average number of vehicles in each tuple was depicted by Rstudio.As a consequence,the model of connectivity probability on one path was achieved by calculating the products of the connectivity probability on all road segments along one path.The analysis result shows that the connectivity probability on one path can be improved by increasing the communication range or the density of vehicles.…”
    Get full text
    Article
  8. 4288

    Design and Analysis of Interactive Multimedia Online Physical Education Platform considering Moving Object Segmentation Algorithm by Yanle Hu, Jing Zhou, Bin Gao

    Published 2021-01-01
    “…With the development of Internet technology, Internet plus education has become a new mode of changing traditional education methods. …”
    Get full text
    Article
  9. 4289
  10. 4290

    Research on mobile stroke unit based on 5G network technology by Yu SHENG, Zhiheng LIU, Liya SHAN, Yi FENG

    Published 2020-01-01
    “…The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.…”
    Get full text
    Article
  11. 4291

    The differences of B2C and B2B workflow exception handling by Dovilė Vojevodina, Genadijus Kulvietis

    Published 2005-12-01
    “…The medium for these applications is Internet and it is not always reliable through all the engagement process. …”
    Get full text
    Article
  12. 4292

    Design and implementation of user-customizing oriented multipath inter-domain routing system by Dong-hong QIN, Jia-hai YANG, Yang YANG, Hui ZHANG

    Published 2013-09-01
    “…With the rapid growth of Internet applications,the routing flexibility and quality of the inter-domain routing system face some significant challenges.Multipath routing is an important method of improving the reliability and robustness of the Internet.Based on previous researches,orienting user customizing routing service,a multi-path inter-domain routing system named UMIR was developed.The routing system includes three service functions of controlling and management center,route discovery and computing protocol and routing incentive,and it is made of control and management subsystem,routing protocol subsystem and routing incentive subsystems.Based on the Emulab network test platform of University of Utah,the UMIR routing system was deployed and tested.The experimental results show that the routing system is running correctly to achieve our design goals.…”
    Get full text
    Article
  13. 4293

    Discussion on the Solutions to Difficult Problems of DS-Lite Technology Deployed in the Existing Network by Xi Tang, Rong Li, Jianming Yang

    Published 2014-04-01
    “…With the rapid development of internet, IPv6 as the next generation internet protocol has been widely concerned. …”
    Get full text
    Article
  14. 4294

    QL-STCT: an intelligent routing convergence method for SDN link failure by Chuanhuang LI, Yangting CHEN, Jingjing TANG, Jiali LOU, Renhua XIE, Chuntao FANG, Weiming WANG, Chao CHEN

    Published 2022-02-01
    “…Aiming at the problem of routing convergence when SDN link failure occurs, a Q-Learning sub-topological convergence technique (QL-STCT) was proposed to realize intelligent route convergence when SDN links fail.Firstly, some nodes were selected in the network as hub nodes and divides the hub domains according to the hub nodes, and the regional features were constructed with the hub domain as the unit.Secondly, the reinforcement learning agent exploration strategy was proposed by using the features to accelerate the convergence of reinforcement learning.Finally, a sub-topology network was constructed through reinforcement learning to plan the alternate path and ensure the performance of the alternate path in the periodic window.Experimental simulation results show that the proposed method effectively improves the convergence speed and performance of the link failure network.…”
    Get full text
    Article
  15. 4295

    Quality analysis method of Web browsing based on big data by Weihua CHENG, Xiaorong HE

    Published 2020-11-01
    “…The traditional network operation and maintenance often focuses on the operation status of the network and equipment,which is difficult to solve the user's subjective perception.It is urgent to establish an end-to-end Internet application awareness management system.Focusing on the quality analysis of web browsing,the quality analysis framework and method of user perceived data based on big data technology was studied,a quality analysis system framework based on big data technology was designed and proposed,which was used to realize the quality analysis of Internet business.Taking an international website as an example,a diagnosis method of "two looks and five cuts" was proposed to delimit and trace the cause,which improves the efficiency of manual analysis and verifies the effectiveness of the proposed method.…”
    Get full text
    Article
  16. 4296

    The Playing Session: Enhanced Playability for Mobile Gamers in Massive Metaverses by S. Cacciaguerra, G. D'Angelo

    Published 2008-01-01
    “…Internet ubiquity and the success of mobile gaming devices are increasing the interest in wireless access to virtual environments. …”
    Get full text
    Article
  17. 4297

    Carrier-grade NTP clock synchronization scheme of SD-WAN network by Qiangen ZHAO, Yu WANG, Ling TANG, Yongming YAN

    Published 2022-08-01
    “…SD-WAN is developing rapidly, and telecom operators and Internet companies are constantly expanding their layout.As a technology with diverse forms, SD-WAN has not made a clear specification for clock synchronization.The importance of clock synchronization to SD-WAN technology implementation and business running was analyzed.The advantages and disadvantages of the clock synchronization scheme of Internet public NTP service widely used in SD-WAN realizations were sketched.Thus the clock synchronization scheme of self-built NTP service in different scenarios was discussed.Furthermore, a clock synchronization method using management tunnel to transmit encrypted NTP synchronization data was designed, which made SD-WAN platform and devices obtain higher security and stability in time synchronization.…”
    Get full text
    Article
  18. 4298

    The electronic commerce development in retail of high-tech consumer goods by A. V. Veretyokhin

    Published 2019-09-01
    “…The influence of the digital technologies progress, competition strengthens, legal environment, market capacity, advanced technologies application, customer behavior on the Internet High-Tech trading development has been established. …”
    Get full text
    Article
  19. 4299

    Implementasi VPN Antar Cabang Menggunakan Teknologi SDWAN dengan Metode Load Balance (Studi Kasus: PT. Mitra Solusi Infokom) by Muhammad Fikri, Muhammad Rifqi

    Published 2023-02-01
    “…Hasil dari penelitian ini, traffic antar site dapat terbagi antara jalur MPLS jalur internet, jalur internet mampu menghandle traffic yang telah di load balance dan membackup apabila koneksi MPLS down, sistem failover menggunakan teknologi SDWAN mampu mengurangi downtime sebesar 95%, Sehingga mengurangi tingkat kegagalan jaringan. …”
    Get full text
    Article
  20. 4300