Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
321
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
Get full text
Article -
322
On Some Properties of Multiplicative Topological Indices in Silicon-Carbon
Published 2021-01-01“…The use of graph theory can be visualized in nanochemistry, computer networks, Google maps, and molecular graph which are common areas to elaborate application of this subject. …”
Get full text
Article -
323
Computing Fault-Tolerant Metric Dimension of Connected Graphs
Published 2022-01-01“…For a connected graph, the concept of metric dimension contributes an important role in computer networking and in the formation of chemical structures. …”
Get full text
Article -
324
Joint intelligent optimization of task offloading and service caching for vehicular edge computing
Published 2021-01-01“…Given the contradiction between limited network resources and massive user demands in Internet of vehicles, an intelligent vehicular edge computing network architecture was proposed to achieve the comprehensive cooperation and intelligent management of network resources.Based on this architecture, a joint optimization scheme of task offloading and service caching was furtherly devised, which formulated an optimization problem about how to offload tasks and allocate computation and cache resources.In view of the dynamics, randomness and time variation of vehicular networks, an asynchronous distributed reinforcement learning algorithm was employed to obtain the optimal task offloading and resource management policy.Simulation results demonstrate that the proposed algorithm achieves significant performance improvement in comparison with the other schemes.…”
Get full text
Article -
325
Modeling and analysis of performance reliability for communication networks based on traffic dynamics
Published 2011-01-01“…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
Get full text
Article -
326
On Face Index of Silicon Carbides
Published 2020-01-01“…Several graph invariants have been defined and studied, which present applications in nanochemistry, computer networks, and other areas of science. One vastly studied class of the graph invariants is the class of the topological indices, which helps in the studies of chemical, biological, and physical properties of a chemical structure. …”
Get full text
Article -
327
Security risk analysis of power 5G hybrid networking
Published 2022-01-01“…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
Get full text
Article -
328
Research of authentication techniques for the Internet of things
Published 2020-07-01“…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
Get full text
Article -
329
Heterogeneous resource cooperative game in space-ground computing power network
Published 2023-12-01“…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
Get full text
Article -
330
Autonomous computing and network convergence:architecture, technologies, and prospects
Published 2023-12-01“…., intent-driven computing network, the autonomous system operation and the adaptive co-evolution of communication, computing intelligence, were summarized from the proposed Auto-CNC.Meanwhile, the reference architecture and key technologies of Auto-CNC were described, which were followed by several preliminary exploration cases.Finally, future research trends and technical advice were discussed and recommended.…”
Get full text
Article -
331
Research on intelligent modeling and policy making of CNC brain
Published 2023-08-01“…As a future-oriented new network architecture, the core idea of computing and network convergence is to manage cloud-edge-end computing network resources in a centralized or distributed way by centering on the deep integration of computing force and network resources, so as to provide computing service for users’ needs.Although the CNC has made some progress in standard setting and industrial promotion, the overall development still faces many challenges, and there are still many scientific and engineering problems to be broken through.Research on CNC and its brain was carried out, the latest progress in related fields in the industry was analyzed, and the idea of building intelligent CNC brain was put forward, hoping to throw a brick at the table, jointly promote the implementation of AI in CNC, and truly realize intelligent CNC.…”
Get full text
Article -
332
5G industry wireless private network technology and business requirement model
Published 2021-08-01“…5G industry wireless private network has become one of the most important services for operators enabling the vertical industry.The gradual maturity of virtualization, multi-access edge computing, network slicing and other technologies have provided a key technical guarantee for the development of 5G industry wireless private network.The development status, key technology, requirement model, challenges and development recommendations of 5G industry wireless private network were introduced.The concept and classification of 5G industry wireless private network were introduced, the key technologies were generalized, and the design ideas and the main reference index were put forward aiming at business requirement.Finally, the challenges faced by operators when developing 5G wireless private network services were summarized and development suggestions were given.…”
Get full text
Article -
333
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
Get full text
Article -
334
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
335
Online energy-aware task dispatching with QoS guarantee in edge computing
Published 2021-06-01“…Edge computing can provide users with low-latency and high-bandwidth services by deploying many edge servers at the network edge.However, a large number of deployments also bring problems of high energy consumption.When dispatching tasks from end devices to different edge servers, different energy consumption and delays will occur due to the edge servers’ heterogeneity.Therefore, it is a challenge to select an optimal server among many edge servers for task dispatching so that energy consumption and delay are relatively low.An energy-aware task dispatching method with quality of service (QoS) guarantee based on online learning was proposed.It can obtain real-time information by interacting with the environment to ensure energy consumption was minimal while the QoS was acceptable when dispatching tasks.Experiments show that the proposed method can dispatch tasks efficiently to the optimal server compared with other methods, thereby reducing the edge computing network’s overall energy consumption significantly.…”
Get full text
Article -
336
The Application of Clothing Intelligent 3D Display with Uncertainty Models Technology in Clothing Marketing
Published 2022-01-01“…As a result of the development of new technologies such as satellite communication, digitalization, and multimedia computer networks, new media such as blogs, online magazines, and wireless network media have sparked a lot of interest. …”
Get full text
Article -
337
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01“…For computer networks to remain secure, intrusion detection is essential. …”
Get full text
Article -
338
Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks
Published 2013-01-01“…The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. …”
Get full text
Article -
339
Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture
Published 2024-12-01“…The increasing importance of computer networks in daily life is a result of our growing dependence on them. …”
Get full text
Article -
340
AsyncBTree: Revisiting Binary Tree Topology for Efficient FPGA-Based NoC Implementation
Published 2019-01-01“…This scheme is very efficient in interconnected networks such as computer networks, which use generic switches for interconnection. …”
Get full text
Article