Results 21 to 30 of about 3,871,840 (378)

Fault classification and location identification in a smart DN using ANN and AMI with real-time data

open access: yesThe Journal of Engineering, 2019
This paper presents a real-time fault classification and location identification method for a smart distribution network (DN) using artificial neural networks (ANNs) and advanced metering infrastructure (AMI).
Muhammad Usama Usman   +3 more
doaj   +1 more source

Survey on IETF 6TiSCH Industrial Internet of Things: Standards, Key Technologies and Platforms

open access: yesJisuanji kexue yu tansuo, 2020
The Internet engineering task force (IETF) is developing an IPv6-based low-power industrial Internet of things (IIoT) protocol stack called 6TiSCH, which is mainly used in complex industrial process control and automation.
YANG Wei, WANG Hao, WAN Yadong, CAO Yuanlong, LIU Qinghua
doaj   +1 more source

Why is IPv6 Deployment Important for the Internet Evolution?

open access: yesJournal of Telecommunications and Information Technology, 2023
Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in ...
Jordi Mongay Batalla   +17 more
doaj   +1 more source

Voice quality estimation in combined radio-VoIP networks for dispatching systems [PDF]

open access: yes, 2016
The voice quality modelling assessment and planning field is deeply and widely theoretically and practically mastered for common voice communication systems, especially for the public fixed and mobile telephone networks including Next Generation Networks
Kučerák, Ján, Vodrážka, Jiří
core   +1 more source

Dovetail: Stronger Anonymity in Next-Generation Internet Routing [PDF]

open access: yes, 2014
Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher
A. Acquisti   +5 more
core   +3 more sources

Analisis Quality of Services Jaringan VoIP pada VPN menggunakan InterAsteriks Exchange dan Session Initiation Protocol

open access: yesTechno.Com, 2020
Di dalam komunikasi Voice over Internet Protocol (VoIP) mengenal beberapa macam protocol tambahan selain protocol standar internet Transfer Control Protocol/Internet Protocol (TCP/IP), beberapa diantaranya adalah protocol Session Initation Protocol (SIP),
Agus Heriyanto   +2 more
doaj   +1 more source

WISE: MQTT-based Protocol for IP Device Provisioning and Abstraction in IoT Solutions

open access: yesElektronika ir Elektrotechnika, 2021
Although numerous consumer devices use Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack to connect and communicate over the Internet, their integration into a single Internet of Things (IoT) solution represents a challenge ...
Istvan Papp   +2 more
doaj   +1 more source

Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security

open access: yesIEEE Security and Privacy, 2019
Internet of Things (IoT) deployments expand as IoT security lags. This article surveys IoT security protocols standardized by the Internet Engineering Task Force and discusses remaining gaps.
H. Tschofenig, E. Baccelli
semanticscholar   +1 more source

Smart Grid Applications for a Practical Implementation of IP over Narrowband Power Line Communications

open access: yesEnergies, 2017
Currently, Advanced Metering Infrastructure (AMI) systems have equipped the low voltage section with a communication system that is being used mainly for metering purposes, but it can be further employed for additional applications related to the Smart ...
Noelia Uribe-Pérez   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy