Results 61 to 70 of about 3,896 (237)
Impact of communication latency on distributed optimal power flow performance
In this work, we study the performance of a distributed optimal power flow control algorithm with respect to realistic communication quality of service.
Clemens Korner +4 more
doaj +1 more source
Peer‐Assisted Content Delivery to Reduce the Bandwidth of TSTV Service in IPTV System
With great technologies, emerge new needs and requirements. The progress achieved in Access broadband rates accentuated the demand on IPTV (Internet Protocol Television) services specially Video on Demand (VOD) and Time Shift TV (TSTV) which led subsequently to a great need for efficiency in the use of bandwidth consumed by those services. Optimization
El Hassane Khabbiza +3 more
wiley +1 more source
Microgrid Power Sharing Framework for Software Defined Networking and Cybersecurity Analysis
Hierarchical control is a widely used strategy that can increase resilience and improve the reliability of the electrical network based on microgrid global variables.
Ricardo E. Perez Guzman +5 more
doaj +1 more source
Software‐Defined Virtual Testbed for IoT Systems
The Internet of Things concept has found applications in a wide range of solutions, including smart homes, smart cities, enterprise systems, and others. Due to the limited resources available on physical devices and the intermittent availability of wireless networks, IoT may hugely benefit from Mobile Cloud Computing as it may provide the necessary ...
Joanna Sendorek +3 more
wiley +1 more source
Analisis Trafik Jaringan Wifi dan Simulasi GNS3
AbstrakPerkembangan teknologi komunikasi Wireless untuk saat ini mengarah kepada teknologi berbasis jaringan IP (Internet Protocol). Sedangkan Access Point merupakan suatu perangkat dari Wireless Router. Access point itu sendiri membentuk hostspot, sedangkan Wireless Router berfungsi untuk mengatur lalu lintas data.
Dinda Noorfaidah Aeni +2 more
openaire +1 more source
An Approach for Internal Network Security Metric Based on Attack Probability
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has
Chun Shan +5 more
wiley +1 more source
Topology Analysis of iBGP Confederation Case : Indonesia Research and Education Network (IdREN)
Implementation of the BGP Confederation topology scenario, found a number of new facts that influence the final decision making for BGP network managers.
Irwin Wijaya Lahusen +2 more
doaj +1 more source
An Analysis of Neighbor Discovery Protocol Attacks
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on ...
Firas Najjar +2 more
doaj +1 more source
Gravity Modeling of Lunar Lava Tubes: Insights From a Terrestrial Analog
Abstract The exploration of lunar lava tubes can address challenges of human habitation on the Moon by identifying natural shelters against radiation, temperature extremes, and micrometeoroid impacts. This study shows the feasibility of detecting lunar lava tubes with gravimetry using Ape Cave in Washington State, USA, as a terrestrial analog. Ape Cave'
Sarai Montañez Muñoz +4 more
wiley +1 more source
LISP Optimisation of Mobile Data Streaming in Connected Societies
Mobility mechanisms are key elements of “always connected” smart environments. Since the first mobile IPv4 protocols, the IP mobility solutions have evolved from host mobility to network mobility and migration to IPv6, but there are still use‐cases to be covered, especially for redundant multihomed scenarios.
T. Balan +3 more
wiley +1 more source

