Results 21 to 30 of about 3,766,161 (380)

STCP: A Novel Approach for Congestion Control in IoT Environment [PDF]

open access: yesJournal of Information Technology Management, 2022
The main idea of IoT is to connect several objects to each other through Internet. In the field of Computer Network the main problem identified by researchers is network congestion.
Ajay Kumar Gupta   +3 more
doaj   +1 more source

An alternative hyper-Poisson integer-valued GARCH model with application to polio, internet protocol and COVID-19 data

open access: yesAIMS Mathematics, 2023
Time series of counts are observed widely in actuarial science, finance, epidemiology and biology. These time series may exhibit over-, equi- and under-dispersion.
Kee Wah Fo   +3 more
doaj   +1 more source

An Internet without the Internet protocol [PDF]

open access: yesComputer Networks, 2010
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses understood by the routers, is frequently the target of cache poisoning attacks.
Craig A. Shue, Minaxi Gupta
openaire   +2 more sources

Implementasi Tunnel GRE pada Jaringan Ring dan Mesh Perangkat Metro-E Nokia

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2021
Tunnel merupakan teknik membangun jalur komunikasi lokal antara dua atau lebih router menggunakan jaringan IP publik. Permasalahan yang dihadapi pada sistem tunneling saat ini adalah belum adanya pedoman untuk memilih teknik yang tepat sesuai topologi ...
R. Muhammad Arifin   +2 more
doaj   +1 more source

DETEKSI PENYUSUPAN PADA SERVER MENGGUNAKAN METODE INTRUSION DETECTION SYSTEM (IDS) BERBASIS SNORT

open access: yesJurnal Sisfokom, 2020
Permasalahan yang ada diwarnet cyber terletak pada belum terdapatnya sistem keamanan server warnet, oleh karena itu beberapa kali server warnet cyber mengalami permasalahan karena adanya penyerangan yang dilakukan oleh pihak lain seperti ping flood ...
Benny Wijaya, Arie Pratama
doaj   +1 more source

IPv6 in Virtualization Environments

open access: yesJournal of Telecommunications and Information Technology, 2023
The primary network layer protocol on which theoperation of most computer networks is based, including the Internet is the Internet protocol version 4 (IPv4).
Krzysztof Chudzik, Jan Kwiatkowski
doaj   +1 more source

New enhanced authentication protocol for Internet of Things

open access: yesBig Data Mining and Analytics, 2021
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.
Mourade Azrour   +3 more
semanticscholar   +1 more source

Connectable Internet Address Object Point using the Active Accessibility [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2007
This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities.
Mohammed Hasan, Manar Ahmed
doaj   +1 more source

Fault classification and location identification in a smart DN using ANN and AMI with real-time data

open access: yesThe Journal of Engineering, 2019
This paper presents a real-time fault classification and location identification method for a smart distribution network (DN) using artificial neural networks (ANNs) and advanced metering infrastructure (AMI).
Muhammad Usama Usman   +3 more
doaj   +1 more source

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care

open access: yesIEEE Internet of Things Journal, 2020
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the doctors to remotely diagnose the patients, control the medical equipment, and monitor the quarantined patients through their digital devices.
Mehedi Masud   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy