Results 11 to 20 of about 373 (129)
CR-LDP as the signaling protocol at networking multiprotocol label switching
This paper reports raised events and results from the use of CR-LDP as a possible protocol of signal point MPLS, in order determine whether QoS warranties the desired quality for intensive bandwidth applications.
Danilo López +2 more
doaj +3 more sources
The up to this time known networks with the IP protocol have worked as connection-less and they have not guaranteed the quality of services. Implementing the MPLS protocol, an overlay connection-oriented network with guaranteed quality of services QoS is
Ladislav Schwartz +2 more
doaj +1 more source
Automatic Parking System Based on Improved Neural Network Algorithm and Intelligent Image Analysis.
This research designs an intelligent parking system including service application layer, perception layer, data analysis layer, and management layer. The network system adopts opm15 system, and the parking space recognition adopts improved convolution neural networks (CNNs) algorithm and image recognition technology.
Guo Y, Shi H.
europepmc +2 more sources
Performance evaluation of software‐defined wide area network based on queueing theory
Abstract Software‐defined wide area network (SD‐WAN) is part of wider technologies of software‐defined networking (SDN). SDN is one of the pivotal network management approaches that abstracts the underlying network infrastructure away from its applications. SDN allows for the centralisation of network intelligence. That allows higher network automation,
Samaa Adel Ibrahim Hussein +2 more
wiley +1 more source
Mathematical model for forwarding packets in communication network
Abstract The software‐defined networking (SDN) represents the future backbone of the Internet. In general, to understand the performance and the limitation of SDN is a prerequisite for deploying these networks and making the most of their resources. For achieving that goal, this paper discusses the difference between traditional networks and SDN over ...
Samaa A. I. Hussein +2 more
wiley +1 more source
A Low‐Overhead and High‐Precision Attack Traceback Scheme with Combination Bloom Filters
Distributed denial of service attacks seriously threatens the availability of highly resilient software‐defined networking systems, such as data center networks. A traceback scheme is an effective means of mitigating attacks by identifying the location of the attacker and the attacking path.
Jie Ma +4 more
wiley +1 more source
Smart Speech Recognition System for Chinese Language Learning Enhancement
With the expansion of teaching scale and the rapid development of educational information, a smart classroom management system based on speech recognition has been proposed and developed to improve the information level of smart classroom management. This paper discusses the application of multimedia equipment control.
Lijun Hu, Jing Jia, Lianhui Li
wiley +1 more source
By combining virtual reality, the digital twin system has been deeply applied in many places. Especially with the upsurge of national sports and more attention to sports, people have also begun a more in‐depth study on the strategy of sports training. This paper aims to explore the application of the Brazilian jujitsu training strategy and interactive ...
Zheyu He, Xi He, Rahim Khan
wiley +1 more source
The Internet of Things (IoT) has impacted various aspects of life, but its profound effects on the health sector are particularly striking because of its cutting‐edge nature. Mobile computing characteristics enable IoT to play a more important role when used with mobile computing.
Eshrag Refaee +7 more
wiley +1 more source
[Retracted] Network Interconnection Security Buffer Technology for Power Monitoring System
In recent years, the risk of malicious attacks on power monitoring systems has increased, and there have been many attacks on power systems in the world. Aiming at the network interconnection security problem of the core control system, the concept of “security buffer” is introduced, and a network security buffer method forpower monitoring system is ...
Jifeng Wang +5 more
wiley +1 more source

