To see the other types of publications on this topic, follow the link: Computer network monitoring.

Journal articles on the topic 'Computer network monitoring'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network monitoring.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Full text
Abstract:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted
APA, Harvard, Vancouver, ISO, and other styles
2

Bodt, Barry A. "Computer Intrusion Detection and Network Monitoring." Technometrics 44, no. 3 (2002): 294–95. http://dx.doi.org/10.1198/004017002320256549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Suharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.

Full text
Abstract:
This study aims to design a portable monitoring system using the Raspberry mini computer. As a case study, we conducted this research at Credit Union Tunas Harapan, which is based in Batam, Indonesia. We implemented the system with additional tools to monitor networks, namely Wireshark and Nagios. On the local network, we managed to monitor broadcasting from the switch. We have also analyzed several issues on network security. The use of architectural Raspberry mini computers is a very flexible tool.
APA, Harvard, Vancouver, ISO, and other styles
4

Nashrullah, Muhammad, and Muhammad Alif Raher. "The Android Based Computer Network Monitoring Application." JOURNAL OF APPLIED INFORMATICS AND COMPUTING 2, no. 1 (2018): 18–22. http://dx.doi.org/10.30871/jaic.v2i1.879.

Full text
Abstract:
Utilization of information technology and computer network as data communication media has been increased. The requirement for shared use of existing resources in the network both software and hardware has resulted in the development of various technologies of the network itself. Information technology and communications are widely used today using computer network system as a medium of information and data transformation, the greater the company or agency that uses the network computer the more complex the network system in the company or agency, and required a good handling for the system ca
APA, Harvard, Vancouver, ISO, and other styles
5

Okafor, O. J., O. C. Nwokonkwo, and A. M. John-Otumu. "An Integrated Model for Monitoring Nodes in Computer Networks." Journal of Advances in Computing, Communications and Information Technology 1 (April 25, 2021): 18–27. http://dx.doi.org/10.37121/jaccit.v1.154.

Full text
Abstract:
Monitoring complex computer network environment is now a very challenging task for network administrators despite the various existing monitoring applications for networks that are faced with the issues of centralized monitoring, which causes network traffic, reduces network bandwidth, and are unable to concurrently run two or more network services. This research paper was designed to tackle the problems exhibited by the existing network monitoring application by integrating different network monitoring services in a single model using the power of agent’s distributed processing and monitoring
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Yong, and Haiwen Wang. "Intelligent Computer Security Monitoring Information Network Analysis." IOP Conference Series: Materials Science and Engineering 612 (October 19, 2019): 042042. http://dx.doi.org/10.1088/1757-899x/612/4/042042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barznji, Ammar O., Tarik A. Rashid, and Nawzad K. Al-Salihi. "Computer Network Simulation of Firewall and VoIP Performance Monitoring." International Journal of Online Engineering (iJOE) 14, no. 09 (2018): 4. http://dx.doi.org/10.3991/ijoe.v14i09.8508.

Full text
Abstract:
<p class="0abstract">Fast growing in communication technology has influenced global changes and challenges appear in the field of network security issues. Security solutions must be efficient and operate in a way to deal with threats, reject and stop the network intruders and Trojans. The simulated network of Salahaddin university new campus is planned to build on an area of (3000X3000) meter square. The network consists of many main and secondary devices. The network is mainly consisted of one core switch that provides a very high data transfer through connecting all the collected posit
APA, Harvard, Vancouver, ISO, and other styles
8

Yin, Xiao Hong, and Song Guo. "The Design of Computer Network Traffic Monitoring System." Advanced Materials Research 1049-1050 (October 2014): 2088–91. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.2088.

Full text
Abstract:
With the rapid development of Internet and the growing, today's network structure complexity is increasing day by day, network scale, network security has gradually become the focus of attention. To build a stable and secure network management system naturally become the focus of attention, one of network traffic monitoring system is one of the important means. The network traffic load monitoring system from the perspective of packet traffic analysis, through real-time information collection and monitor network packets, to check the network performance. It is help to monitor and analysis the n
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yun Peng. "Design and Realization of the Computer Network Traffic Monitoring." Advanced Materials Research 926-930 (May 2014): 2297–300. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2297.

Full text
Abstract:
This paper studies the computer network traffic related subjects background first, and analyzes the research status quo of network traffic monitoring, putting forward the main content and the research target. This paper introduces the key technology, network traffic monitoring system for the topological design and analysis of computer network traffic monitoring system, computer network traffic monitoring system for the overall design, network traffic monitoring has been basically achieved demand. From the point of view of network users and network operators, network traffic monitoring can impr
APA, Harvard, Vancouver, ISO, and other styles
10

Cui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software." Applied Mechanics and Materials 686 (October 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.

Full text
Abstract:
This paper mainly studies the key technologies of network real-time monitoring system based on Client/Server, and implementation of a real-time monitoring system based on CS/ mode. Using the network communication technology, Winsock technology, TCP/IP protocol, image compression and transmission technology, the process of communication technology and object oriented software technology to realize the main frame module, the system include network monitoring data initialization module, data transmission module, image coding and decoding module, its advantage is to make full use of the existing n
APA, Harvard, Vancouver, ISO, and other styles
11

Балакин, Сергей Вячеславович. "Detection of computer attacks using network entities monitoring." Technology audit and production reserves 5, no. 6(25) (2015): 36. http://dx.doi.org/10.15587/2312-8372.2015.51120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Xin Lei, Lei Chong, Wen Jie Chen, Xin Yuan Lu, and Ming Lai Yang. "The Research of Computer Monitoring System." Applied Mechanics and Materials 635-637 (September 2014): 1648–53. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1648.

Full text
Abstract:
In order to ensure traffic safety, strengthen the comprehensive management of signal device and detect the use quality of railway signal equipment. We have done some research. Through analyzing the organization structure and feature of recent computer monitoring system, using the latest information and computer network technology. We propose a new system, whose performance and function are better than now. The result of analysis shows that networking style effect the performance of system, the combine of star and cycle style can make the system take advantage of the network resource better. Pr
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Wan Chun, Chir Neng Hung, Ming Dar Hwang, Tzu Hua Huang, Yuan Chen Liu, and Chia Che Cheng. "Implementation and Research of a Real-Time Monitoring System for Computer Classroom." Applied Mechanics and Materials 303-306 (February 2013): 2280–83. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2280.

Full text
Abstract:
In this study, a system is designed using the local network in a computer classroom to monitor students’ learning situation and classroom order in a real-time manner. Teachers can use a network management program to monitor students’ use of computers. A questionnaire on the installation of computer classroom monitoring system is created after a post-test is administered to the experiment group. The result shows that 59.52% say that pay more attention to what teachers teach in the class.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Rong Hua. "Management System of Computer Laboratory in Liberal College." Applied Mechanics and Materials 411-414 (September 2013): 712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.712.

Full text
Abstract:
The university network is very popular, the use of computer networks for laboratory management has become a necessity. We proposed the construction of the building room memorandum ideas and some strategies that can be implemented, the better solution normative room management issues. According to the actual use of university computer room design possible combination of VLAN and VPN solutions. We used a more mature support for multiple operating systems and supports SNMP network devices Mrtg tools to help us achieve traffic monitoring, reducing the need for repeat open, traffic monitoring can b
APA, Harvard, Vancouver, ISO, and other styles
15

Zhou, Xiong. "The Analysis and Design of the Computer Network Traffic Monitor." Applied Mechanics and Materials 556-562 (May 2014): 6791–94. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6791.

Full text
Abstract:
The important work of the network management in real-time network monitoring, network monitoring network traffic, the state, the collection of behavioral information, the information will be collected for statistical analysis, network traffic status data, and network traffic information collected includes dynamic information and static information, on this basis, conducted a study of network traffic monitoring and management system.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Hong De, Qi Lang Le, Xiu Yuan Yang, and You Long Gao. "Application of Real-Time Monitoring and Data Web Sharing to Landslides." Applied Mechanics and Materials 166-169 (May 2012): 2787–93. http://dx.doi.org/10.4028/www.scientific.net/amm.166-169.2787.

Full text
Abstract:
Acquiring instant information and sharing massive data are indispensable elements in social informatization. Real-time monitoring is realized with the support of computer and communication technologies. The monitoring facilities which are controlled by communication network terminal computers would collect and transfer data according to established procedures or real-time instructions. That is, data could be acquired under all weather and no duty conditions. Then the acquired massive data could be widely shared by issuing on Internet Web. This whole procedure is called real-time monitoring. De
APA, Harvard, Vancouver, ISO, and other styles
17

Nadezhdin, E. N., and A. A. Roganov. "PARAMETRIC SYNTHESIS OF THE ACTIVE CORPORATE COMPUTER NETWORK MONITORING." Современные наукоемкие технологии (Modern High Technologies), no. 10 2020 (2020): 67–61. http://dx.doi.org/10.17513/snt.38255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Eberle, H. "A radio network for monitoring and diagnosing computer systems." IEEE Micro 23, no. 1 (2003): 60–65. http://dx.doi.org/10.1109/mm.2003.1179899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Edwards, Paul J. "High Energy Transient Ionospheric Monitoring Network." Publications of the Astronomical Society of Australia 8, no. 3 (1990): 263–65. http://dx.doi.org/10.1017/s1323358000023481.

Full text
Abstract:
AbstractContinuous, wide sky coverage is essential for the detection and monitoring of infrequent, short-lived events of astrophysical interest such as supernova and nova explosions, variable X-ray sources, gamma ray bursts, gravity waves and stellar and solar flares. We propose to (1) examine past radio propagation records and (2) develop new computer based radio receivers to monitor and log ionospheric perturbations associated with these events.
APA, Harvard, Vancouver, ISO, and other styles
21

GU, WEIZHEN, D. FRANK HSU, and XINGDE JIA. "ON A NETWORK SENSING PROBLEM." Journal of Interconnection Networks 07, no. 01 (2006): 63–73. http://dx.doi.org/10.1142/s0219265906001582.

Full text
Abstract:
Live traffic flow information can help improve the efficiency of a communication network. There are many ways available to monitor the traffic flow of a network. In this paper, we propose a very efficient monitoring strategy. This strategy not only reduces the number of nodes to be monitored but also determines the complete traffic information of the entire network using the information from the monitored nodes. The strategy is optimal for monitoring a network because it reduces the number of monitored nodes to a minimum. Fast algorithms are also presented in this paper to compute the traffic
APA, Harvard, Vancouver, ISO, and other styles
22

Yates, Patricia. "Factory monitoring and control network." Computer Communications 8, no. 2 (1985): 79–81. http://dx.doi.org/10.1016/0140-3664(85)90217-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Sihyung, Kyriaki Levanti, and Hyong S. Kim. "Network monitoring: Present and future." Computer Networks 65 (June 2014): 84–98. http://dx.doi.org/10.1016/j.comnet.2014.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Anagnostakis, K. G., M. B. Greenwald, S. Ioannidis, D. Li, and J. M. Smith. "Flexible network monitoring with FLAME." Computer Networks 50, no. 14 (2006): 2548–63. http://dx.doi.org/10.1016/j.comnet.2006.04.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Hong Wei. "Online Monitoring System of the Mine Main Fan." Advanced Materials Research 756-759 (September 2013): 376–79. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.376.

Full text
Abstract:
Monitoring system uses upper and lower machine model. The machine adopts the simple operation, reliable performance of PLC acquisition of main fan for each parameter and alarm control. In order to ensure that the fan monitoring system reliability and real time nature, based on the VC++ and SQL Server to develop a set of computer monitoring system. Monitoring software system and data acquisition and processing hardware system connected by a RS-485 bus system. Computer to other computers in a network or through the monitoring host forwarding see fan monitoring interface.
APA, Harvard, Vancouver, ISO, and other styles
26

Chebykin, I. A. "Automating Road Traffic Monitoring Using Computer Vision." World of Transport and Transportation 18, no. 6 (2021): 74–87. http://dx.doi.org/10.30932/1992-3252-2020-18-6-74-87.

Full text
Abstract:
The objective of the article is to describe application of computer vision and artificial intelligence technologies for solving the problems of road infrastructure design.The article evaluates the traditional methods of quantitative and qualitative analysis of traffic flows in terms of labour intensity and accuracy using the method of comparative analysis, the advantages and disadvantages of the considered methods are indicated. A new method of traffic flow analysis using unmanned aerial vehicles and computer vision technology based on convolutional neural networks is proposed. The considered
APA, Harvard, Vancouver, ISO, and other styles
27

Рубан, І. В., В. О. Мартовицький, Н. В. Лукова-Чуйко, Є. Ю. Кортяк, and Є. О. Кругліков. "Model monitoring network infrastructure based on standard FIPA." Системи обробки інформації, no. 2(161), (June 15, 2020): 71–77. http://dx.doi.org/10.30748/soi.2020.161.08.

Full text
Abstract:
The article focuses on the problem of creating systems for monitoring the functioning of the network infra-structure of distributed computer systems. This publication represents a model of multi-agent functioning for monitoring anomalies of distributed computer systems functioning components, which details the process of monitoring anomalies in the functioning of distributed computer systems and allows to integrate the monitoring system with other components of the cyber security systems. The model of a monitoring system designed to solve the problems of collecting and storing parameters recei
APA, Harvard, Vancouver, ISO, and other styles
28

Nainggolan, Mhd Ramadhan, and Pristiwanto Pristiwanto. "Simulasi Sistem Monitoring Link Metro Ethernet (ME) di PT Indosat Ooredoo Medan dengan Metode Doppler." JURIKOM (Jurnal Riset Komputer) 7, no. 3 (2020): 426. http://dx.doi.org/10.30865/jurikom.v7i3.2169.

Full text
Abstract:
Current technological developments have been so rapid, monitoring computer networks has become a very necessary thing. Computer network connection is a fundamental thing in a computer network that cannot be used. Likewise for the Metro Ethenet network work, If a parameter is problematic then the quality of the network will be reduced and Frequently occurs the duration of Metro ethernet monitoring and access to the report report ME becomes disrupted. This Final Project I will discuss how the Metro Ethernet Link Monitoring Simulation System in PT Indosat Ooredoo with the doppler method to determ
APA, Harvard, Vancouver, ISO, and other styles
29

Habib, Ahsan, Sonia Fahmy, and Bharat Bhargava. "Monitoring and controlling QoS network domains." International Journal of Network Management 15, no. 1 (2005): 11–29. http://dx.doi.org/10.1002/nem.541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ciuffoletti, Augusto. "Monitoring a virtual network infrastructure." ACM SIGCOMM Computer Communication Review 40, no. 5 (2010): 47–52. http://dx.doi.org/10.1145/1880153.1880161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Winasis, Bima Putra, and Bambang Sugiantoro. "Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification." IJID (International Journal on Informatics for Development) 6, no. 2 (2018): 1. http://dx.doi.org/10.14421/ijid.2017.06201.

Full text
Abstract:
A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Pu, Zhi Sun, Mehmet C. Vuran, Mznah A. Al-Rodhaan, Abdullah M. Al-Dhelaan, and Ian F. Akyildiz. "On network connectivity of wireless sensor networks for sandstorm monitoring." Computer Networks 55, no. 5 (2011): 1150–57. http://dx.doi.org/10.1016/j.comnet.2010.11.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kodituwakku, Hansaka Angel Dias Edirisinghe, Alex Keller, and Jens Gregor. "InSight2: A Modular Visual Analysis Platform for Network Situational Awareness in Large-Scale Networks." Electronics 9, no. 10 (2020): 1747. http://dx.doi.org/10.3390/electronics9101747.

Full text
Abstract:
The complexity and throughput of computer networks are rapidly increasing as a result of the proliferation of interconnected devices, data-driven applications, and remote working. Providing situational awareness for computer networks requires monitoring and analysis of network data to understand normal activity and identify abnormal activity. A scalable platform to process and visualize data in real time for large-scale networks enables security analysts and researchers to not only monitor and study network flow data but also experiment and develop novel analytics. In this paper, we introduce
APA, Harvard, Vancouver, ISO, and other styles
34

Cadima, Rita, Carlos Ferreira, Josep Monguet, Jordi Ojeda, and Joaquin Fernandez. "Promoting social network awareness: A social network monitoring system." Computers & Education 54, no. 4 (2010): 1233–40. http://dx.doi.org/10.1016/j.compedu.2009.11.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Cusani, Roberto, Tiziano Inzerilli, and Luca Valentini. "Network monitoring and performance evaluation in a 3.5G network." Computer Networks 51, no. 15 (2007): 4412–20. http://dx.doi.org/10.1016/j.comnet.2007.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hussien, Anas Ali, and Ali Hameed Tawfeeq. "ZigBee-Based Wireless Sensor Network for Temperature Monitoring." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 10 (2013): 2062–70. http://dx.doi.org/10.24297/ijct.v10i10.1201.

Full text
Abstract:
The proposed system in this paper describes the design and implementation of a Wireless Sensor Network (WSN) based on ZigBee technology to monitor the history and current temperature information of remote locations. The system is an electronic embedded system that contains: Base Station with coordinator ZigBee, End nodes with router ZigBee, and host computer as a data base (DB) server. The base station is responsible for data collecting, a display for end node sensor readings, and TCP/IP communication with the host computer. End nodes are directly connected with sensors and transmitting the re
APA, Harvard, Vancouver, ISO, and other styles
37

Al Shidhani, Ali, Khalil Al Maawali, Dawood Al Abri, and Hadj Bourdoucen. "A Comparative Analysis of Open Source Network Monitoring Tools." International Journal of Open Source Software and Processes 7, no. 2 (2016): 1–19. http://dx.doi.org/10.4018/ijossp.2016040101.

Full text
Abstract:
Nowadays, the heavy reliance on computer networks necessitates minimizing outage time, increasing the availability of services, and preventing network related problems. Such realization requires continuous monitoring and observation. This is not a trivial task. Thus, automatic network monitoring tools are deployed to monitor and analyze the traffic trespassing network devices. There is an increasing demand for automated network monitoring tools and selecting a suitable candidate can become a challenging task. Some computerized network monitoring tools and systems are available, including expen
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Ke Jun, and Wu Xu. "Virtual Instrument Measurement System Architecture Design Based on Database Management." Applied Mechanics and Materials 198-199 (September 2012): 989–94. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.989.

Full text
Abstract:
The purpose of virtual instrument measurement system architecture design based on database management is to expand stand-alone mode into the measurement mode of network. Through computer network, multiple virtual instrument measurement networks for data storage, communication and control the formation of network measurement applications are realized. This article discusses the formation of virtual instrument based on the database and computer network monitoring and control network programs, measures and achievement.
APA, Harvard, Vancouver, ISO, and other styles
39

Hizriadi, Ainul, Radea Shiddiq, Ivan Jaya, and Santi Prayudani. "Network Device Monitoring System based on Geographic Information System dan Simple Network Management Protocol." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 3, no. 2 (2020): 216–23. http://dx.doi.org/10.31289/jite.v3i2.3187.

Full text
Abstract:
Network infrastructure monitoring is an important part of an institute to maintain the stability of computer network devices. One of the functions of computer network monitoring is to find out the data traffic generated in network application. Simple Network Management Protocol is one of protocols for monitoring the data traffic in network device. However, network device administrators still have problems when they want to monitor their network infrastructure, such as device location and data traffic information of network device that is only temporarily stored in the monitoring system, and ph
APA, Harvard, Vancouver, ISO, and other styles
40

Hidra Amnur, Defni, Deddy Prayama, and Febrina Agustin. "Perancangan dan Implementasi Network Monitoring Sistem Menggunakan Nagios dengan Email dan SMS Alert." Jurnal Ilmiah Poli Rekayasa 10, no. 1 (2014): 42. http://dx.doi.org/10.30630/jipr.10.1.56.

Full text
Abstract:
Network Monitoring System is a system which has a function to observe or monitor the computer network system is running. Network monitoring system can be implemented in real time in a computer network.Development of network monitoring system using the local ip and web-based applications, where the construction of this network monitoring system using CentOS 6.4 operating system as the server.Nagios is a network monitoring application based on open source that can be used according to user needs. To maximize the use of Nagios can use email and SMS as alerts.
APA, Harvard, Vancouver, ISO, and other styles
41

Chao, W., and W. Tsun. "Event-driven network topology monitoring function." IBM Systems Journal 35, no. 1 (1996): 25–36. http://dx.doi.org/10.1147/sj.351.0025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Phillipson, Frank, Robert S. Wezeman, and Irina Chiscop. "Indoor–Outdoor Detection in Mobile Networks Using Quantum Machine Learning Approaches." Computers 10, no. 6 (2021): 71. http://dx.doi.org/10.3390/computers10060071.

Full text
Abstract:
Communication networks are managed more and more by using artificial intelligence. Anomaly detection, network monitoring and user behaviour are areas where machine learning offers advantages over more traditional methods. However, computer power is increasingly becoming a limiting factor in machine learning tasks. The rise of quantum computers may be helpful here, especially where machine learning is one of the areas where quantum computers are expected to bring an advantage. This paper proposes and evaluates three approaches for using quantum machine learning for a specific task in mobile net
APA, Harvard, Vancouver, ISO, and other styles
43

Vaughan, Joel, Stilian Stoev, and George Michailidis. "Network-Wide Statistical Modeling, Prediction, and Monitoring of Computer Traffic." Technometrics 55, no. 1 (2012): 79–93. http://dx.doi.org/10.1080/00401706.2012.723959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hu, Dong Tao, Ting Ting Tao, Zhi Gang Liu, and Shao Feng Ren. "Research on the Mine Safety Monitoring System Based on Wireless Sensor Network Technology." Advanced Materials Research 791-793 (September 2013): 897–901. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.897.

Full text
Abstract:
The development of computers wireless network monitoring system mainly includes steps such as the selection of transmission protocol, the calls of database program, data display and automation implementation and so on. The transmission speed of protocol TD-SCDMA is faster. In addition, it also can transmit voice and pure data files. Thus, this article selects TD-SCDMA protocol as transport protocol of wireless sensor networks. On the basis of the software OLEDB, this paper has developed ActiveX Data Object program, and has implemented the safety supervision automation process of wireless senso
APA, Harvard, Vancouver, ISO, and other styles
45

Fu, Hui, Bin Jin, Lin Han, and Zuo Tang Tao. "Remote Wireless Network Monitoring Application System." Advanced Materials Research 433-440 (January 2012): 7024–28. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.7024.

Full text
Abstract:
With computer technology, communication technology and the rapid development of electronic technology, remote monitoring technology will be more widely used for data transmission requirements and more stringent. GPRS-based remote monitoring system, which is based in communications equipment, through the server to PC, as the remote control platform, embedded applications, network programming and other technology, the remote information display and control. Throughout the system, users can allow each terminal in the case of permission to accept the data on the changes and settings. Wireless netw
APA, Harvard, Vancouver, ISO, and other styles
46

Ferrari, Tiziana, and Francesco Giacomini. "Network monitoring for GRID performance optimization." Computer Communications 27, no. 14 (2004): 1357–63. http://dx.doi.org/10.1016/j.comcom.2004.02.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hoplaros, Demetris, Zahir Tari, and Ibrahim Khalil. "Data summarization for network traffic monitoring." Journal of Network and Computer Applications 37 (January 2014): 194–205. http://dx.doi.org/10.1016/j.jnca.2013.02.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Yan Kun, Yun Xu Shi, and Hong Mei Fan. "Design of Mine Production Safety Monitoring System." Advanced Materials Research 503-504 (April 2012): 1330–33. http://dx.doi.org/10.4028/www.scientific.net/amr.503-504.1330.

Full text
Abstract:
The mine safety monitoring system is a set of sensor technology, electronics technology, power electronics technology, computer technology, wireless communication and network technology in one of China's leading multi-functional computer network systems, including underground, Inoue environment and equipment the detection of network systems and the Inoue monitoring data processing system. Environment and equipment for testing network system to achieve underground, of Inoue environment physical monitoring and control; monitoring data processing system is a comprehensive treatment of the collect
APA, Harvard, Vancouver, ISO, and other styles
49

Zhao, Xiang, and Zhi Yuan Wang. "Electric Leakage Protection System Based on Wireless Monitoring Network." Applied Mechanics and Materials 241-244 (December 2012): 728–33. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.728.

Full text
Abstract:
This paper introduces a monitoring system for electric leakage protection based on AVR Single-Chip Computer, which the terminal monitoring PC communicates with AVR single-chip computer through wireless channel, so as to monitor the operational status of the residual current protective device (RCD) in real time. In addition, taking both amplitude and phase angle of the residual current as leakage protection judgment parameters could increase the accuracy of RCD effectively.
APA, Harvard, Vancouver, ISO, and other styles
50

Robson, Stephen, Gan Tan, and Abderrahmane Haddad. "Low-Cost Monitoring of Synchrophasors Using Frequency Modulation." Energies 12, no. 4 (2019): 611. http://dx.doi.org/10.3390/en12040611.

Full text
Abstract:
A new, low-cost method of simultaneously measuring and communicating voltage and current on distribution networks is presented. Based on Frequency Modulation (FM) of the measured fundamental frequency (and harmonics), followed by immediate re-injection of the modulated waveform back into the network, the proposed method can be implemented using inexpensive and readily available electronics. Furthermore, the method does not require a separate communication media, but instead uses the power line itself to propagate the FM signals back to a central point. EMTP-ATP simulations on a mixed LV/MV net
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!