Results 11 to 20 of about 3,084,416 (309)

STCP: A Novel Approach for Congestion Control in IoT Environment [PDF]

open access: yesJournal of Information Technology Management, 2022
The main idea of IoT is to connect several objects to each other through Internet. In the field of Computer Network the main problem identified by researchers is network congestion.
Ajay Kumar Gupta   +3 more
doaj   +1 more source

Aplikasi Metode Consistent Fuzzy Preference Relations Dalam Evaluasi Model Pentarifan Interkoneksi Berbasis Internet Protokol

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2021
Transparansi pelayanan telekomunikasi merupakan amanat yang tertuang dalam Undang-Undang Nomor 36 tahun 1999. Pentarifan interkoneksi bukan lagi hanya terpaku pada layanan voice dan sms saja, karena karakteristik pengguna layanan saat ini bergerak ke ...
Ridwan Pandiya, Ade Wahyudin
doaj   +1 more source

Factors modulating 99mTc‐MAA planar lung dosimetry for 90Y radioembolization

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose To investigate the accuracy and biases of predicted lung shunt fraction (LSF) and lung dose (LD) calculations via 99mTc‐macro‐aggregated albumin (99mTc‐MAA) planar imaging for treatment planning of 90Y‐microsphere radioembolization.
Benjamin P. Lopez   +4 more
wiley   +1 more source

Implementasi Tunnel GRE pada Jaringan Ring dan Mesh Perangkat Metro-E Nokia

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2021
Tunnel merupakan teknik membangun jalur komunikasi lokal antara dua atau lebih router menggunakan jaringan IP publik. Permasalahan yang dihadapi pada sistem tunneling saat ini adalah belum adanya pedoman untuk memilih teknik yang tepat sesuai topologi ...
R. Muhammad Arifin   +2 more
doaj   +1 more source

An Internet without the Internet protocol [PDF]

open access: yesComputer Networks, 2010
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses understood by the routers, is frequently the target of cache poisoning attacks.
Craig A. Shue, Minaxi Gupta
openaire   +2 more sources

IPv6 in Virtualization Environments

open access: yesJournal of Telecommunications and Information Technology, 2023
The primary network layer protocol on which theoperation of most computer networks is based, including the Internet is the Internet protocol version 4 (IPv4).
Krzysztof Chudzik, Jan Kwiatkowski
doaj   +1 more source

The Quantum Internet: Enhancing Classical Internet Services one Qubit at a Time [PDF]

open access: yesIEEE Network 36 (5), 6-12 (2022), 2022
Nowadays, the classical Internet has mainly envisioned as the underlying communication infrastructure of the Quantum Internet, aimed at providing services such as signaling and coordination messages. However, the interplay between classical and Quantum Internet is complex and its understanding is pivotal for an effective design of the Quantum Internet ...
arxiv   +1 more source

Connectable Internet Address Object Point using the Active Accessibility [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2007
This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities.
Mohammed Hasan, Manar Ahmed
doaj   +1 more source

DETEKSI PENYUSUPAN PADA SERVER MENGGUNAKAN METODE INTRUSION DETECTION SYSTEM (IDS) BERBASIS SNORT

open access: yesJurnal Sisfokom, 2020
Permasalahan yang ada diwarnet cyber terletak pada belum terdapatnya sistem keamanan server warnet, oleh karena itu beberapa kali server warnet cyber mengalami permasalahan karena adanya penyerangan yang dilakukan oleh pihak lain seperti ping flood ...
Benny Wijaya, Arie Pratama
doaj   +1 more source

IPv6 Convergence for IoT Cyber–Physical Systems

open access: yesInformation, 2018
We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation.
Keith Nolan, Mark Kelly
doaj   +1 more source

Home - About - Disclaimer - Privacy