Showing 81 - 100 results of 319 for search '"IP address"', query time: 0.09s Refine Results
  1. 81

    An ethics framework for research into heterogeneous systems by Happa, J, Nurse, J, Goldsmith, M, Creese, S, Williams, R

    Published 2018
    “…Any device with an IP address can potentially collect, process, store and share data and make automated decisions in unpredictable ways. …”
    Conference item
  2. 82

    IP based network public address for intelligent building environment by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran

    Published 2014
    “…The network PA works very much similarly to computer networks where packets of data are transmitted from one node to another with each of them having a unique IP address in the network system. The nodes will then only pick up the packets that solely addressed to them. …”
    Article
  3. 83

    Multi-agent crawling systems (MACS) architecture for effective web retrieval by Ibrahim, Siti Nurkhadijah Aishah, Selamat, Ali

    Published 2007
    “…Thus, it makes users refuses to allow crawlers exploring web pages and even worst if they block the crawler’s IP address during entering the web pages. In order to achieve higher accuracy rate, we propose the architecture of multi-agent system in web crawling known as Multi-Agent Crawling System (MACS). …”
    Conference or Workshop Item
  4. 84

    Address book builder for network monitoring by Paraman, Norlina

    Published 2005
    “…A Python script running as a daemon, analyses the packets to produce output like usernames, MAC (Media Access Protocol) addresses and IP (Internet Protocol) addresses. MAC address and IP address will be matched automatically on the MySQL database table according to the staff username which are in the database. …”
    Get full text
    Thesis
  5. 85

    Data quality in online human-subjects research: Comparisons between MTurk, Prolific, CloudResearch, Qualtrics, and SONA. by Benjamin D Douglas, Patrick J Ewell, Markus Brauer

    Published 2023-01-01
    “…We found that compared to MTurk, Qualtrics, or an undergraduate student sample (i.e., SONA), participants on Prolific and CloudResearch were more likely to pass various attention checks, provide meaningful answers, follow instructions, remember previously presented information, have a unique IP address and geolocation, and work slowly enough to be able to read all the items. …”
    Get full text
    Article
  6. 86

    Research on automatic processing system of gas outburst parameters in coal mine by TAN Guowen, LI Binghang, LI Mingjian

    Published 2018-01-01
    “…WiFi wireless communication module was add to WTC gas outburst parameter meter to make it automatically obtain underground IP address and access wireless network, so as to automatically upload gas outburst parameters. …”
    Get full text
    Article
  7. 87

    Inferring router ownership based on the classification of intra- and inter-domain links by Yan Liu, Yi Zhao, Xiaoyu Guo, Lian Liu

    Published 2023-03-01
    “…In this method, the differentiating Internet Protocol (IP) address vector distance feature, the autonomous system relationship feature of the IP link, and the fan-in and fan-out features are designed to support the discrimination of IP link types. …”
    Get full text
    Article
  8. 88

    Sistem Pengukur Suhu dan Kelembaban Ruang Server by Muhammad Fahmi Awaj, Adian Fatchur Rochim, Eko Didik Widianto

    Published 2014-01-01
    “…Data suhu dan kelembaban ditampilkan juga ke dalam website dengan menggunakan IP address tertentu yang sebelumnya board arduino telah terhubung dengan ethernet shield. …”
    Get full text
    Article
  9. 89

    Conversion of the manual generator to the automatic generator and its remote monitoring by Nihat DALDAL, İbrahim ŞEREMET

    Published 2019-09-01
    “…In order to emotely monitor these values, the IP address to be received on the modem and the information on the local network were monitored, then a user account was created on a website called ThingSpeak, which is the integration of Mathswork, and remote monitoring of the generator and network values has been carried out and successfully implemented.…”
    Get full text
    Article
  10. 90

    A Novel Global Key-Value Storage System Based on Kinetic Drives by Xiang Cao, Cheng Li

    Published 2020-09-01
    “…Users can directly access data with a Kinetic Drive via its IP address without going through a storage server/layer. …”
    Get full text
    Article
  11. 91

    An Empirical Study on Darknet Visualization Based on Topological Data Analysis by Masaki Narita

    Published 2021-01-01
    “…This system monitors and analyzes malicious packets in the unused IP address space and provides security related information to both network administrators and ordinary users. …”
    Get full text
    Article
  12. 92

    Sensor data monitoring software in android by Su, Rong

    Published 2016
    “…To achieve data conveying, both the devices have to be under the same network, namely, the same Wi-Fi, to get the same IP address.…”
    Get full text
    Thesis
  13. 93

    Lower risk of DDoS with DNSSEC implementation by Pek, Jonathan Xiang Sheng

    Published 2019
    “…Its main objective is to translate human-friendly domain names into a computer-friendly numerical IP address. Unfortunately, DNS cache poisoning attacks are one of the many devastating attacks that DNS suffers from. …”
    Get full text
    Final Year Project (FYP)
  14. 94

    PURWARUPA JARINGAN SENSOR MENGGUNAKAN KABEL UTP UNTUK PEMANTAUAN SUHU DAN KELEMBABAN RUANGAN by , WAHYU ADI INDRA GUNAWAN, , Alrosyid, S.Si

    Published 2014
    “…The design of this system is divided into several stages, namely the design of the sensor as a data DHT11 temperature and humidity, the design of the RTC DS1307 data of time and IP Address in the room design. The results of temperature and humidity measurements in the room are stored in a file *.txt. …”
    Thesis
  15. 95

    ANALISIS FORENSIK JARINGAN STUDI KASUS SERANGAN SQL INJECTION PADA SERVER UNIVERSITAS GADJAH MADA by , Resi Utami Putri, , Prof. Drs. Jazi Eko Istiyanto, M.Sc. PhD.

    Published 2012
    “…Based on the research, there are 68 IP address was that did illegal action, SQL injection, on server www.ugm.ac.id. …”
    Thesis
  16. 96

    Developing a web-based packet monitoring tool / Hamsiah Mohamed Said by Mohamed Said, Hamsiah

    Published 2006
    “…This system was developed to have the feature that can show packet traffic in detail such as source and destination IP address, source and destination port number, total number of packets transferred, session and other data. …”
    Student Project
  17. 97

    Performance evaluation of an adaptive forwarding strategy in Named Data Networking by Raja Mahmood, Raja Azlina, Jemangin, Nor Faizah, Hussin, Masnida

    Published 2019
    “…Named Data Networking (NDN) is an envisioned Internet architecture that uses named data to locate the data of interest as opposed to the IP address of the stored data. The forwarding strategy is critical in this network to ensure the data is well received in a timely manner. …”
    Get full text
    Article
  18. 98

    Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver by Choo, S. H, H. M. Amin, Shamsudin, Fisal, Norsheila, Yeong, C. F., Abu Bakar, J.

    Published 2003
    “…Computer based mobile robot provide operating system that enabled development of wireless connection via IP address. …”
    Get full text
    Article
  19. 99

    Evaluation of nested network mobility approaches by Ali, M. B., Hashim, A. H. A., Hassan, W. H.

    Published 2015
    “…The Internet Engineering Task Force (IETF) has developed Mobile IP, which allows Mobile node to be connected while it is moving as well as functioning in foreign mobile network zone using its original IP address. IETF also in order to manage mobility of an entire network as single unit, they developed NEMO Basic Support Protocol (NEMO BS), which allows Mobile Router to move and change their point of attachment. …”
    Conference or Workshop Item
  20. 100

    Overview of IoT: ethical, social and political issues by Chan, Meng Shen, Wong, Doris Hooi Ten, Mohamad, Ahmad Razif, ‘Abid Shamsul, Khairul, Chee, Chong Meng, Ibrahim, Roslina

    Published 2018
    “…Internet of Things (IoT) is a technology which encompasses the network of objects that features a specific IP address within internet connection, then the communication occurs between the objects and other Internet-based devices and systems. …”
    Article