Showing 321 - 340 results of 380 for search '"Computer network"', query time: 0.07s Refine Results
  1. 321

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
    Get full text
    Article
  2. 322

    On Some Properties of Multiplicative Topological Indices in Silicon-Carbon by Abid Mahboob, Sajid Mahboob, Mohammed M. M. Jaradat, Nigait Nigar, Imran Siddique

    Published 2021-01-01
    “…The use of graph theory can be visualized in nanochemistry, computer networks, Google maps, and molecular graph which are common areas to elaborate application of this subject. …”
    Get full text
    Article
  3. 323

    Computing Fault-Tolerant Metric Dimension of Connected Graphs by Uzma Ahmad, Sara Ahmed, Muhammad Javaid, Md Nur Alam

    Published 2022-01-01
    “…For a connected graph, the concept of metric dimension contributes an important role in computer networking and in the formation of chemical structures. …”
    Get full text
    Article
  4. 324

    Joint intelligent optimization of task offloading and service caching for vehicular edge computing by Lei LIU, Chen CHEN, Jie FENG, Qingqi PEI, Ci HE, Zhibin DOU

    Published 2021-01-01
    “…Given the contradiction between limited network resources and massive user demands in Internet of vehicles, an intelligent vehicular edge computing network architecture was proposed to achieve the comprehensive cooperation and intelligent management of network resources.Based on this architecture, a joint optimization scheme of task offloading and service caching was furtherly devised, which formulated an optimization problem about how to offload tasks and allocate computation and cache resources.In view of the dynamics, randomness and time variation of vehicular networks, an asynchronous distributed reinforcement learning algorithm was employed to obtain the optimal task offloading and resource management policy.Simulation results demonstrate that the proposed algorithm achieves significant performance improvement in comparison with the other schemes.…”
    Get full text
    Article
  5. 325

    Modeling and analysis of performance reliability for communication networks based on traffic dynamics by ZHAO Juan1, GUO Ping1, DENG Hong-zhong2, WU Jun2, TAN Yue-jin2, LI Jian-ping1

    Published 2011-01-01
    “…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
    Get full text
    Article
  6. 326

    On Face Index of Silicon Carbides by Xiujun Zhang, Ali Raza, Asfand Fahad, Muhammad Kamran Jamil, Muhammad Anwar Chaudhry, Zahid Iqbal

    Published 2020-01-01
    “…Several graph invariants have been defined and studied, which present applications in nanochemistry, computer networks, and other areas of science. One vastly studied class of the graph invariants is the class of the topological indices, which helps in the studies of chemical, biological, and physical properties of a chemical structure. …”
    Get full text
    Article
  7. 327

    Security risk analysis of power 5G hybrid networking by Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO

    Published 2022-01-01
    “…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
    Get full text
    Article
  8. 328

    Research of authentication techniques for the Internet of things by Hongqiang YAN, Linjie WANG

    Published 2020-07-01
    “…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
    Get full text
    Article
  9. 329

    Heterogeneous resource cooperative game in space-ground computing power network by Yutong ZHANG, Yuming PENG, Boya DI, Lingyang SONG

    Published 2023-12-01
    “…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
    Get full text
    Article
  10. 330

    Autonomous computing and network convergence:architecture, technologies, and prospects by Xiaomao ZHOU, Qingmin JIA, Yujiao HU, Kai GUO, Qianpiao MA, Hui LIU, Renchao XIE

    Published 2023-12-01
    “…., intent-driven computing network, the autonomous system operation and the adaptive co-evolution of communication, computing intelligence, were summarized from the proposed Auto-CNC.Meanwhile, the reference architecture and key technologies of Auto-CNC were described, which were followed by several preliminary exploration cases.Finally, future research trends and technical advice were discussed and recommended.…”
    Get full text
    Article
  11. 331

    Research on intelligent modeling and policy making of CNC brain by Jun ZHOU, Keqing LIU, Shikui WANG, Ling YANG

    Published 2023-08-01
    “…As a future-oriented new network architecture, the core idea of computing and network convergence is to manage cloud-edge-end computing network resources in a centralized or distributed way by centering on the deep integration of computing force and network resources, so as to provide computing service for users’ needs.Although the CNC has made some progress in standard setting and industrial promotion, the overall development still faces many challenges, and there are still many scientific and engineering problems to be broken through.Research on CNC and its brain was carried out, the latest progress in related fields in the industry was analyzed, and the idea of building intelligent CNC brain was put forward, hoping to throw a brick at the table, jointly promote the implementation of AI in CNC, and truly realize intelligent CNC.…”
    Get full text
    Article
  12. 332

    5G industry wireless private network technology and business requirement model by Xuezhi ZHANG, Jingbo ZHAO, Huijie ZHAO

    Published 2021-08-01
    “…5G industry wireless private network has become one of the most important services for operators enabling the vertical industry.The gradual maturity of virtualization, multi-access edge computing, network slicing and other technologies have provided a key technical guarantee for the development of 5G industry wireless private network.The development status, key technology, requirement model, challenges and development recommendations of 5G industry wireless private network were introduced.The concept and classification of 5G industry wireless private network were introduced, the key technologies were generalized, and the design ideas and the main reference index were put forward aiming at business requirement.Finally, the challenges faced by operators when developing 5G wireless private network services were summarized and development suggestions were given.…”
    Get full text
    Article
  13. 333

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
    Get full text
    Article
  14. 334

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  15. 335

    Online energy-aware task dispatching with QoS guarantee in edge computing by Hao YUAN, Deke GUO, Guoming TANG, Lailong LUO

    Published 2021-06-01
    “…Edge computing can provide users with low-latency and high-bandwidth services by deploying many edge servers at the network edge.However, a large number of deployments also bring problems of high energy consumption.When dispatching tasks from end devices to different edge servers, different energy consumption and delays will occur due to the edge servers’ heterogeneity.Therefore, it is a challenge to select an optimal server among many edge servers for task dispatching so that energy consumption and delay are relatively low.An energy-aware task dispatching method with quality of service (QoS) guarantee based on online learning was proposed.It can obtain real-time information by interacting with the environment to ensure energy consumption was minimal while the QoS was acceptable when dispatching tasks.Experiments show that the proposed method can dispatch tasks efficiently to the optimal server compared with other methods, thereby reducing the edge computing network’s overall energy consumption significantly.…”
    Get full text
    Article
  16. 336

    The Application of Clothing Intelligent 3D Display with Uncertainty Models Technology in Clothing Marketing by Zhonglin Xu, Trip Huwan

    Published 2022-01-01
    “…As a result of the development of new technologies such as satellite communication, digitalization, and multimedia computer networks, new media such as blogs, online magazines, and wireless network media have sparked a lot of interest. …”
    Get full text
    Article
  17. 337

    An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection by zahra asgari varzaneh, soodeh hosseini

    Published 2024-12-01
    “…For computer networks to remain secure, intrusion detection is essential. …”
    Get full text
    Article
  18. 338

    Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks by Narun Asvarujanon, Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata

    Published 2013-01-01
    “…The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. …”
    Get full text
    Article
  19. 339

    Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture by Mohammad Hossein Modirrousta, Parisa Forghani Arani, Reza Kazemi, Mahdi Aliyari‐Shoorehdeli

    Published 2024-12-01
    “…The increasing importance of computer networks in daily life is a result of our growing dependence on them. …”
    Get full text
    Article
  20. 340

    AsyncBTree: Revisiting Binary Tree Topology for Efficient FPGA-Based NoC Implementation by Kizheppatt Vipin

    Published 2019-01-01
    “…This scheme is very efficient in interconnected networks such as computer networks, which use generic switches for interconnection. …”
    Get full text
    Article