Results 71 to 80 of about 18,286 (189)

Network traffic anomalies identification based on classification methods / Tinklo srauto anomalijų identifikavimas, taikant klasifikavimo metodus

open access: yesMokslas: Lietuvos Ateitis, 2015
A problem of network traffic anomalies detection in the computer networks is analyzed. Overview of anomalies detection methods is given then advantages and disadvantages of the different methods are analyzed. Model for the traffic anomalies detection was
Donatas Račys, Dalius Mažeika
doaj   +1 more source

Simple network management protocol co- existence with hydrocarbon process automation communication real-time network [PDF]

open access: yes, 2009
Hydrocarbon Process Automation Applications (HPAA) utilizes Real-time network connecting process instrumentations, controllers, and real-time logic control applications.
Almadi, S, El-Haddadeh, R, Jahromi, M
core  

TabNet‐SFO: An Intrusion Detection Model for Smart Water Management in Smart Cities

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As Smart City (SC) infrastructures evolve rapidly, securing critical systems like smart water management (SWM) becomes paramount to protecting against cyber threats. Enhancing the security, sustainability and execution of conventional schemes is considered significant in developing smart environments.
Wahid Rajeh   +5 more
wiley   +1 more source

SNMP Trace Analysis Definitions [PDF]

open access: yes, 2008
The Network Management Research Group (NMRG) started an activity to collect traces of the Simple Network Management Protocol (SNMP) from operational networks. To analyze these traces, it is necessary to split potentially large traces into more manageable pieces that make it easier to deal with large data sets and simplify the analysis of the data. This
van den Broek, G.   +3 more
openaire   +2 more sources

Soft Actor‐Critic Request Redirection for Quality Control in Green Multimedia Content Distribution

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 35, Issue 12, December 2024.
A model‐free and online soft actor‐critic (SAC) reinforcement learning‐based request redirection algorithm has been developed for optimal quality of experience (QoE) enhancement of smart grid‐enabled (green) content distribution networks. The proposed optimal request redirection policy, maximizes the total QoE of the green CDN system under energy ...
Pejman Goudarzi, Jaime Lloret
wiley   +1 more source

Improved endogenous epoxyeicosatrienoic acid production mends heart function via increased PGC 1α-mitochondrial functions in metabolic syndrome

open access: yesJournal of Pharmacological Sciences, 2018
Metabolic syndrome (MS) is a combination of symptoms characterized by central obesity, hypertension, hyperglycemia, and hyperlipidemia, which together increase the risk of heart disease, stroke and diabetes.
Lu Liu   +7 more
doaj   +1 more source

Patterns in SNMP-Based Management [PDF]

open access: yes, 2004
A lot of activity is currently going on to replace the SNMP management architecture with a solution better suited to managing modern IP networks and systems. New candidates include Management by Delegation, active networks, and Web-based management.
Martin-Flatin, Jean-Philippe
core  

Transcriptome‐wide analysis uncovers regulatory elements of the antennal transcriptome repertoire of bumblebee at different life stages

open access: yesInsect Molecular Biology, Volume 33, Issue 6, Page 571-588, December 2024.
The antennal transcriptome is highly dynamic at different developmental stages. The expression of chemosensory and olfactory receptors mainly was positively correlated. Some miRNAs have a marked stage‐specific expression pattern in the antenna. Differentially expressed miRNAs regulate gene networks that are important antennal functions.
Fatih Dikmen   +13 more
wiley   +1 more source

EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

open access: yesSensors, 2014
Monitoring systems are important for debugging and analyzing Wireless Sensor Networks (WSN). In passive monitoring, a monitoring network needs to be deployed in addition to the network to be monitored, named the target network.
Fernando P. Garcia   +3 more
doaj   +1 more source

The analysis of user behaviour of a network management training tool using a neural network [PDF]

open access: yes, 2005
A novel method for the analysis and interpretation of data that describes the interaction between trainee network managers and a network management training tool is presented. A simulation based approach is currently being used to train network managers,
Donelan, H   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy