Results 31 to 40 of about 36,043 (85)

Cloud/VPN-Based Remote Control of a Modular Production System Assisted by a Mobile Cyber–Physical Robotic System—Digital Twin Approach

open access: yesItalian National Conference on Sensors
This paper deals with a “digital twin” (DT) approach for processing, reprocessing, and scrapping (P/R/S) technology running on a modular production system (MPS) assisted by a mobile cyber–physical robotic system (MCPRS).
Georgian Simion   +3 more
semanticscholar   +1 more source

Healthcare PANs: Personal Area Networks for trauma care and home care [PDF]

open access: yes, 2001
The first hour following the trauma is of crucial importance in trauma care. The sooner treatment begins, the better the ultimate outcome for the patient.
Bults, R.G.A.   +3 more
core   +2 more sources

Analyzing power for the proton elastic scattering from neutron-rich 6He nucleus

open access: yes, 2010
Vector analyzing power for the proton-6He elastic scattering at 71 MeV/nucleon has been measured for the first time, with a newly developed polarized proton solid target working at low magnetic field of 0.09 T.
A. Tamii   +37 more
core   +1 more source

RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP) DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA

open access: yes, 2018
File Transfer Protocol (FTP) server merupakan jenis sistem yang menghubungkan hak pengakses (client) dan penyedia (server) dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di ...
Devi Ruwaida, D. Kurnia
semanticscholar   +1 more source

Leveraging an open source VPN technology to end user. [PDF]

open access: yes, 2009
Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment.
Azmat, Farok   +2 more
core  

Systemization of Pluggable Transports for Censorship Resistance [PDF]

open access: yes, 2016
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano   +2 more
core  

Coupled normal fluid and superfluid profiles of turbulent helium II in channels

open access: yes, 2015
We perform fully coupled two--dimensional numerical simulations of plane channel helium II counterflows with vortex--line density typical of experiments.
Barenghi, Carlo F.   +2 more
core   +1 more source

Automated Negotiation for Provisioning Virtual Private Networks Using FIPA-Compliant Agents

open access: yes, 2000
This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA-OS agent ...
Buckle, P.   +3 more
core   +2 more sources

Design and Implementation of IPsec VPN IoT Gateway System in National Secret Algorithm

open access: yesJournal of Cyber Security and Mobility
With the development of Internet of Things technology, the security threats faced by the industrial control field are increasing, and strengthening the security protection capabilities of intelligent systems on IoT highways is becoming increasingly ...
Yan Jiang   +3 more
semanticscholar   +1 more source

Using a nested virtualization tool for teaching VPN fundamentals

open access: yesCluster Computing
A common problem of undergraduate courses about security and computer networks is the difficulty of providing practical exercises to students. Although different approaches have been followed to solve this problem, it is still an open issue. In this work,
J. Orduña, Carlos Pérez
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy