-
601
Enhanced Bit Repair IP Fast Reroute Mechanism for Rapid Network Recovery
Published 2021-04-01“…In such situations, communication is typically interrupted for a period that is difficult to predict, and which can lead to significant financial losses and other negative effects. Internet Protocol Fast Reroute (IP FRR) technology was developed for these reasons. …”
Get full text
Article -
602
New strategies for planning and performance evaluation of wireless networks: case studies based on the cross-layer approach
Get full text
Article -
603
CASPaR: Congestion avoidance shortest path routing for delay tolerant networks
Published 2017-11-01“…Unlike traditional transmission control protocol/Internet protocol–based networks, delay/disruption tolerant networks may experience connectivity disruptions and guarantee no end-to-end connectivity between source and destination. …”
Get full text
Article -
604
Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
Published 2022-01-01“…The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. …”
Get full text
Article -
605
Study on feeding behavior and biological sound of Sebastes schlegelii
Published 2023-03-01“…The high-definition internet protocol camera was used to monitor the behavior change of S. schlegelii. …”
Get full text
Article -
606
Development of a Dynamic Oriented Rehabilitative Integrated System (DORIS) and Preliminary Tests
Published 2019-08-01“…Transmission Control Protocol/Internet Protocol (TCP/IP) guarantees the communication between the platform and other systems. …”
Get full text
Article -
607
Named Data Networking: A Survey on Routing Strategies
Published 2022-01-01“…As data traffic increases exponentially, NDN offers three main advantages over current Transmission Control Protocol and Internet Protocol-based networks. These advantages are in-network caching, smooth mobility, and robust content dissemination. …”
Get full text
Article -
608
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization
Published 2022-08-01“…The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). …”
Get full text
Article -
609
Protokol L2TP dan IPsec Sebagai Keamanan Jaringan Pada Dinas Kominfotik Sumatera Barat
Published 2022-10-01“…</em> Salah satu solusi untuk mengatasi masalah tersebut ialah dengan menggunakan teknologi keamanan jaringan <em>VPN (Virtual Private Network)</em> dengan metode <em>L2TP (Layer 2 Tunneling Protocol)</em> dan metode <em>IPSec (Internet Protocol Security)</em> yang akan digunakan sebagai alternatif keamanan jaringan untuk meningkatkan keamanan pertukaran data perusahaan. …”
Get full text
Article -
610
A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters
Published 2020-11-01“…In today Smart Grid’s context, PV plants feature clusters of cooperating smart string inverters that exchange information in a multicast fashion (typically) over the Internet Protocol (IP). However, IP multicast does not provide any mechanism to limit the access to multicast data to authorized subjects only. …”
Get full text
Article -
611
A Reliable Scheme for Synchronizing Multimedia Data Streams under Multicasting Environment
Published 2018-04-01“…Most multimedia applications use real-time transport protocol/real-time control protocol (RTP/RTCP) to transport multimedia data over the internet. Internet Protocol (IP) network incurs a loss and/or delay of media packets resulting in distortions at receivers that can be perceived by the user. …”
Get full text
Article -
612
An enhanced handover authentication solution for 6LoWPAN networks
Published 2022“…The rapidly increasing scale of the Internet Protocol version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN) and the limitation of communication range emphasized the importance of handovers. …”
Get full text
Journal Article -
613
Development of a network intrusion detection system (IDS)
Published 2017“…In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. …”
Get full text
Final Year Project (FYP) -
614
CAKUPAN KOREKSI DATA STREAMING CORS GMU1 DENGAN MENGGUNAKAN RECEIVER GNSS LEICA VIVA GS08
Published 2014“…One of the services provided by CORS is RTK NTRIP (Real Time Kinematic Networked Transport of RTCM via Internet Protocol) observation method. The definitive coordinates of this method can be determined in real time by sending GNSS data correction in RTCM (Radio Technical Commission for Maritime Service) format via internet. …”
Thesis -
615
SIMULASI VLAN DAN ETHERCHANNEL DENGAN MENERAPKAN PROTOKOL INTERNET VERSI 6 (IPV6)
Published 2014“…The research was conducted by designing the topology of the apparent corporate LAN called Good Oil using different VLAN for each department according do its function and implementation of Internet Protocol version 6 addresses (IPv6). VLAN technology used because its function of switches network. …”
Thesis -
616
Development of analytical approach to evaluate (diffServ-MIPv6) scheme
Published 2014“…Nonetheless, it does not provide QoS guaranteed to its users same as the traditional Internet protocol IP. It merely can provide Best-Effort (BE) service to all its applications despite of the application requirements. …”
Get full text
Get full text
Article -
617
Performance evaluation of route optimization management of producer mobility in information-centric networking
Published 2022“…This architecture is expected to solve many issues that are currently faced by transmission control protocol/internet protocol (TCP/IP) architecture, such as scalability, robustness, mobility, security, and etcetera. …”
Get full text
Get full text
Article -
618
The rapid vertical handover for efficient IPv6 mobility support in heterogeneous wireless network
Published 2014“…The management techniques employed for Fast Mobile Internet Protocol version 6 (FMIPv6) and Media Independent Handover services between different wireless technologies are very important for completing the handover operations with the least possible delay. …”
Article -
619
Quality-improved and secure multicast delivery method in mobile IPv6 networks
Published 2011“…The latter problem can be addressed by utilizing Internet Protocol version 6 (IPv6) which provides significantly more address space compare to existing IPv4. …”
Get full text
Conference or Workshop Item -
620
Improved fast handover method for multiple node by using mobile nodes guide
Published 2017“…The fast mobile internet protocol version 6 (FMIPv6) was suggested as a fast handover mechanism over the mobile wireless Internets in order to reduce the handover latency of a mobile node (MN). …”
Get full text
Article