Showing 601 - 620 results of 809 for search '"Internet Protocol"', query time: 0.17s Refine Results
  1. 601

    Enhanced Bit Repair IP Fast Reroute Mechanism for Rapid Network Recovery by Jozef Papan, Pavel Segec, Michal Kvet

    Published 2021-04-01
    “…In such situations, communication is typically interrupted for a period that is difficult to predict, and which can lead to significant financial losses and other negative effects. Internet Protocol Fast Reroute (IP FRR) technology was developed for these reasons. …”
    Get full text
    Article
  2. 602

    New strategies for planning and performance evaluation of wireless networks: case studies based on the cross-layer approach by Jasmine Araújo, Josiane Rodrigues, Simone Fraiha, Hermínio Gomes, João C W A Costa, Gervásio Cavalcante, Carlos Francês

    “…This work presents strategies for planning and performance evaluation through an empirical study of the QoS parameters of a voice over Internet Protocol (VoIP) application in an interference network, as well as the relevance in the design of wireless networks to determine the coverage area of an access point, taking into account several parameters such as power, jitter, packet loss, delay, and PMOS. …”
    Get full text
    Article
  3. 603

    CASPaR: Congestion avoidance shortest path routing for delay tolerant networks by Michael Stewart, Rajgopal Kannan, Amit Dvir, Bhaskar Krishnamachari

    Published 2017-11-01
    “…Unlike traditional transmission control protocol/Internet protocol–based networks, delay/disruption tolerant networks may experience connectivity disruptions and guarantee no end-to-end connectivity between source and destination. …”
    Get full text
    Article
  4. 604

    Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches by Innocent Mbona, Jan H. P. Eloff

    Published 2022-01-01
    “…The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. …”
    Get full text
    Article
  5. 605

    Study on feeding behavior and biological sound of Sebastes schlegelii by Mingyuan Song, Dehua Gong, Xiaojie Cui, Xiaoming Yu, Pengxiang Xu, Binbin Xing, Leiming Yin

    Published 2023-03-01
    “…The high-definition internet protocol camera was used to monitor the behavior change of S. schlegelii. …”
    Get full text
    Article
  6. 606

    Development of a Dynamic Oriented Rehabilitative Integrated System (DORIS) and Preliminary Tests by Susanna Summa, Riccardo Gori, Luigi Freda, Enrico Castelli, Maurizio Petrarca

    Published 2019-08-01
    “…Transmission Control Protocol/Internet Protocol (TCP/IP) guarantees the communication between the platform and other systems. …”
    Get full text
    Article
  7. 607

    Named Data Networking: A Survey on Routing Strategies by Farhan Ahmed Karim, Azana Hafizah Mohd Aman, Rosilah Hassan, Kashif Nisar, Mueen Uddin

    Published 2022-01-01
    “…As data traffic increases exponentially, NDN offers three main advantages over current Transmission Control Protocol and Internet Protocol-based networks. These advantages are in-network caching, smooth mobility, and robust content dissemination. …”
    Get full text
    Article
  8. 608

    Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization by Hassan A. Alterazi, Pravin R. Kshirsagar, Hariprasath Manoharan, Shitharth Selvarajan, Nawaf Alhebaishi, Gautam Srivastava, Jerry Chun-Wei Lin

    Published 2022-08-01
    “…The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). …”
    Get full text
    Article
  9. 609

    Protokol L2TP dan IPsec Sebagai Keamanan Jaringan Pada Dinas Kominfotik Sumatera Barat by Ridho Laksamana, Emil Naf'an, Eka Praja Wiyata Mandala

    Published 2022-10-01
    “…</em> Salah satu solusi untuk mengatasi masalah tersebut ialah dengan menggunakan teknologi keamanan jaringan <em>VPN (Virtual Private Network)</em> dengan metode <em>L2TP (Layer 2 Tunneling Protocol)</em> dan metode <em>IPSec (Internet Protocol Security)</em> yang akan digunakan sebagai alternatif keamanan jaringan untuk meningkatkan keamanan pertukaran data perusahaan. …”
    Get full text
    Article
  10. 610

    A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters by Mariano Basile, Gianluca Dini, Filippo Vernia, Luigi Lamoglie

    Published 2020-11-01
    “…In today Smart Grid’s context, PV plants feature clusters of cooperating smart string inverters that exchange information in a multicast fashion (typically) over the Internet Protocol (IP). However, IP multicast does not provide any mechanism to limit the access to multicast data to authorized subjects only. …”
    Get full text
    Article
  11. 611

    A Reliable Scheme for Synchronizing Multimedia Data Streams under Multicasting Environment by Rab Nawaz Jadoon, WuYang Zhou, Faizan ul Haq, Jawad Shafi, Iftikhar Ahmed Khan, Waqas Jadoon

    Published 2018-04-01
    “…Most multimedia applications use real-time transport protocol/real-time control protocol (RTP/RTCP) to transport multimedia data over the internet. Internet Protocol (IP) network incurs a loss and/or delay of media packets resulting in distortions at receivers that can be perceived by the user. …”
    Get full text
    Article
  12. 612

    An enhanced handover authentication solution for 6LoWPAN networks by Zhang, Lyuye, Ma, Maode, Qiu, Yue

    Published 2022
    “…The rapidly increasing scale of the Internet Protocol version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN) and the limitation of communication range emphasized the importance of handovers. …”
    Get full text
    Journal Article
  13. 613

    Development of a network intrusion detection system (IDS) by Yeoh, Alexander Weil Tine

    Published 2017
    “…In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. …”
    Get full text
    Final Year Project (FYP)
  14. 614

    CAKUPAN KOREKSI DATA STREAMING CORS GMU1 DENGAN MENGGUNAKAN RECEIVER GNSS LEICA VIVA GS08 by , IRFANI INDRA NUR R., , Bilal Ma�ruf, S.T., M.T.

    Published 2014
    “…One of the services provided by CORS is RTK NTRIP (Real Time Kinematic Networked Transport of RTCM via Internet Protocol) observation method. The definitive coordinates of this method can be determined in real time by sending GNSS data correction in RTCM (Radio Technical Commission for Maritime Service) format via internet. …”
    Thesis
  15. 615

    SIMULASI VLAN DAN ETHERCHANNEL DENGAN MENERAPKAN PROTOKOL INTERNET VERSI 6 (IPV6) by , IKA RUSSINTA, , Sri Suning Kusumawardani, S.T., M.T.

    Published 2014
    “…The research was conducted by designing the topology of the apparent corporate LAN called Good Oil using different VLAN for each department according do its function and implementation of Internet Protocol version 6 addresses (IPv6). VLAN technology used because its function of switches network. …”
    Thesis
  16. 616

    Development of analytical approach to evaluate (diffServ-MIPv6) scheme by Hussien, Loay F., Hassan Abdalla Hashim, Aisha, Habaebi, Mohamed Hadi, Khalifa, Othman Omran, Hameed, Shihab A.

    Published 2014
    “…Nonetheless, it does not provide QoS guaranteed to its users same as the traditional Internet protocol IP. It merely can provide Best-Effort (BE) service to all its applications despite of the application requirements. …”
    Get full text
    Get full text
    Article
  17. 617

    Performance evaluation of route optimization management of producer mobility in information-centric networking by Xian, Wee Low, Leau, Yu-Beng, Zhiwei Yan, Yong, Jin Park, Mohammed Anba

    Published 2022
    “…This architecture is expected to solve many issues that are currently faced by transmission control protocol/internet protocol (TCP/IP) architecture, such as scalability, robustness, mobility, security, and etcetera. …”
    Get full text
    Get full text
    Article
  18. 618

    The rapid vertical handover for efficient IPv6 mobility support in heterogeneous wireless network by Abdullah, Radhwan Mohammed, Abdullah, Azizol, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Subramaniam, Shamala

    Published 2014
    “…The management techniques employed for Fast Mobile Internet Protocol version 6 (FMIPv6) and Media Independent Handover services between different wireless technologies are very important for completing the handover operations with the least possible delay. …”
    Article
  19. 619

    Quality-improved and secure multicast delivery method in mobile IPv6 networks by Mehdizadeh, Abbas, Hashim, Fazirulhisyam, Raja Abdullah, Raja Syamsul Azmir, Mohd Ali, Borhanuddin, Othman, Mohamed

    Published 2011
    “…The latter problem can be addressed by utilizing Internet Protocol version 6 (IPv6) which provides significantly more address space compare to existing IPv4. …”
    Get full text
    Conference or Workshop Item
  20. 620

    Improved fast handover method for multiple node by using mobile nodes guide by M. Abdullah, Radhwan, Ahmad Zukarnain, Zuriati, Iqbal, Rizwan

    Published 2017
    “…The fast mobile internet protocol version 6 (FMIPv6) was suggested as a fast handover mechanism over the mobile wireless Internets in order to reduce the handover latency of a mobile node (MN). …”
    Get full text
    Article