Showing 41 - 60 results of 80 for search 'Router (computing)', query time: 0.12s Refine Results
  1. 41
  2. 42
  3. 43

    Application of Dual Net-interface Card for Inverter Measuring System by XIE Chen-gang, CHEN Ming-kui, LI Xiao-wen, TAN Li-hong, LIU Wei-liang

    Published 2013-01-01
    “…Dual net-interface card technology for solving LAN communication problems in inverter testing system was introduced in this paper. Replacing router by dual net-interface card, this method successfully achieved network communication among industrial control computer, control enclosure and measured DCU. …”
    Get full text
    Article
  4. 44
  5. 45

    Pre-authentication and group management based secure handover for space-earth integration network by Jia-nan HONG, Shao-hua LI, Kai-ping XUE, Pei-lin HONG

    Published 2016-07-01
    “…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
    Get full text
    Article
  6. 46
  7. 47
  8. 48
  9. 49

    Data Deduplication in Wireless Multimedia Monitoring Network by Yitao Yang, Xiaolin Qin, Guozi Sun, Yong Xu, Zhongxue Yang, Zhiyue Zu

    Published 2013-12-01
    “…However, data aggregation technologies need highly efficient router algorithm, and compression algorithms might consume more computation time and memory because of the high complexity. …”
    Get full text
    Article
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55

    Enhancing Passive WiFi Device Localization Through Packet Timing Analysis by Omar Dhawahir, Murat Torlak

    Published 2025-01-01
    “…Subsequently, the properties of the identified cluster (e.g., coarse RTT/fine RTT) are utilized as a more precise RTT estimate for localization computations. Simulations and experiments conducted under diverse multipath conditions demonstrate the algorithm’s accuracy in 2-D positioning, achieving an average accuracy of as low as 0.24 m in simulations and 1.18 m in experiments when the Wi-Fi router and device are separated by distances of up to 18 m. …”
    Get full text
    Article
  16. 56

    Sensor Monitoring of Conveyor Working Operation with Oscillating Trough Movement by Leopold Hrabovský, Štěpán Pravda, Martin Fries

    Published 2025-04-01
    “…Digital signals were recorded using the DEWESoft SIRIUSi measuring apparatus, which carries information about the magnitude of acting vibrations, which can be remotely transmitted from their place of action via a WI-FI router to the operating station, where they are subjected to a detailed computer-based analysis. …”
    Get full text
    Article
  17. 57
  18. 58

    Development of an ISOBUS-compliant communication node for multiple machine vision systems on wide boom sprayers for nozzle control in spot application schemes by Mozammel Bin Motalab, Ahmad Al-Mallahi, Alex Martynenko, Karama Al-Tamimi, Dimitrios S. Paraforos

    Published 2025-03-01
    “…The MVN consists of an electronic control unit (ECU) built around a single-board computer, equipped with a 2-channel CAN hat and an Ethernet router. …”
    Get full text
    Article
  19. 59
  20. 60

    A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things by Saddam Hussain, Syed Sajid Ullah, Abdu Gumaei, Mabrook Al-Rakhami, Ijaz Ahmad, Syed Muhammad Arif

    Published 2021-01-01
    “…Unfortunately, none of the existing proposals work effectively when malicious attackers compromise the caches of NDN routers. To prevent this, we proposed a certificateless signature scheme for the preservation of CPA in NDN-based IoT networks. …”
    Get full text
    Article