To see the other types of publications on this topic, follow the link: Networking : Distributed computer systems.

Journal articles on the topic 'Networking : Distributed computer systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Networking : Distributed computer systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Han, Jungsoo. "Distributed hybrid P2P networking systems." Peer-to-Peer Networking and Applications 8, no. 4 (June 20, 2014): 555–56. http://dx.doi.org/10.1007/s12083-014-0298-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schill, A. "Advanced networking and distributed systems treatise." Computer Communications 17, no. 5 (May 1994): 379–80. http://dx.doi.org/10.1016/0140-3664(94)90055-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farsad, Behshld. "Networking Your Computer Lab: Benefits And Pitfalls." Hospitality Education and Research Journal 12, no. 2 (February 1988): 482. http://dx.doi.org/10.1177/109634808801200259.

Full text
Abstract:
Local area networks (LANs) are probably the most flexible and adaptable to customizing communications systems. LANs can virtually fit any location/site requirements. They can be tailored for any number of users, any application type and any cost/performance ratio. LANs can work with small (micro computers), medium (mini computers) and large/complex (mainframe) systems. This great flexibility which is due to several factors like, distributed architecture design, software standards, and hardware independence technology make LANs easy to use in a computer laboratory environment. Currently, many hospitality institutions are investigating the feasibility of using LANs in their computer laboratory. However, LANs are still costly, and sometimes difficult to install.
APA, Harvard, Vancouver, ISO, and other styles
4

Ray, A., and S. Phoha. "Research Directions in Computer Networking for Manufacturing Systems." Journal of Engineering for Industry 111, no. 2 (May 1, 1989): 109–15. http://dx.doi.org/10.1115/1.3188739.

Full text
Abstract:
This paper identifies and discusses pertinent research problems in the design and development of communication networks for Computer-Integrated Manufacturing (CIM). The conclusions and recommendations presented here are largely the outcome of the workshop on Computer Networking for Manufacturing Systems [1]. The workshop was conducted in November 1987 under the sponsorship of the division of Design, Manufacturing and Computer Engineering of National Science Foundation. Both basic and applied research in computer networking for integration of all manufacturing-related functions is recommended in three general areas of efficient networking architectures, accommodation of equipment and environmental heterogeneity, and distributed network management and control.
APA, Harvard, Vancouver, ISO, and other styles
5

McLean, Neil. "Information Control: Open Systems Interconnection and Networking Strategies." Alexandria: The Journal of National and International Library and Information Issues 1, no. 1 (May 1989): 43–50. http://dx.doi.org/10.1177/095574908900100104.

Full text
Abstract:
The convergence of communications technology and computer technology has resulted in the development of the Open Systems Interconnection (OSI) Reference Model which permits communication between computers both within and between organizations. There are now national and international library initiatives concerned with developing applications for bibliographic searching and transfer of records and also interlending. In parallel with these initiatives it is important to re-evaluate the role of the library at an institutional level where open systems architecture and distributed processing are changing work practices. The key concept to be explored is the role of the library in the management of information services which will serve potential applications at the workstation level.
APA, Harvard, Vancouver, ISO, and other styles
6

Smed, Jouni, Timo Kaukoranta, and Harri Hakonen. "Aspects of networking in multiplayer computer games." Electronic Library 20, no. 2 (April 1, 2002): 87–97. http://dx.doi.org/10.1108/02640470210424392.

Full text
Abstract:
Distributed, real‐time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research has been done in military simulations, virtual reality systems, and computer supported cooperative working, the suggested solutions diverge from the problems posed by MCGs. With this in mind, this paper provides a concise overview of four aspects affecting networking in MCGs. First, networking resources (bandwidth, latency, and computational power) set the technical boundaries within which the MCG must operate. Second, distribution concepts encompass communication architectures (peer‐to‐peer, client/server, server‐network), and both data and control architectures (centralized, distributed, replicated). Third, scalability allows the MCG to adapt to the resource changes by parametrization. Finally, security aims at fighting back against cheating and vandalism, which are common in online gaming.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghaffari, Mohsen, Behnoosh Hariri, Shervin Shirmohammadi, and Dewan Tanvir Ahmed. "A Dynamic Networking Substrate for Distributed MMOGs." IEEE Transactions on Emerging Topics in Computing 3, no. 2 (June 2015): 289–302. http://dx.doi.org/10.1109/tetc.2014.2330520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

AMELOOT, TOM J., JAN VAN DEN BUSSCHE, WILLIAM R. MARCZAK, PETER ALVARO, and JOSEPH M. HELLERSTEIN. "Putting logic-based distributed systems on stable grounds." Theory and Practice of Logic Programming 16, no. 4 (August 20, 2015): 378–417. http://dx.doi.org/10.1017/s1471068415000381.

Full text
Abstract:
AbstractIn the Declarative Networking paradigm, Datalog-like languages are used to express distributed computations. Whereas recently formal operational semantics for these languages have been developed, a corresponding declarative semantics has been lacking so far. The challenge is to capture precisely the amount of nondeterminism that is inherent to distributed computations due to concurrency, networking delays, and asynchronous communication. This paper shows how a declarative, model-based semantics can be obtained by simply using the well-known stable model semantics for Datalog with negation. We show that the model-based semantics matches previously proposed formal operational semantics.
APA, Harvard, Vancouver, ISO, and other styles
9

Hong, Choong Seon, and Yutaka Matsushita. "An open information networking architecture for distributed multimedia systems." Systems and Computers in Japan 27, no. 14 (1996): 9–19. http://dx.doi.org/10.1002/scj.4690271402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

LOPES, NUNO P., JUAN A. NAVARRO, ANDREY RYBALCHENKO, and ATUL SINGH. "Applying Prolog to develop distributed systems." Theory and Practice of Logic Programming 10, no. 4-6 (July 2010): 691–707. http://dx.doi.org/10.1017/s1471068410000360.

Full text
Abstract:
AbstractDevelopment of distributed systems is a difficult task. Declarative programming techniques hold a promising potential for effectively supporting programmer in this challenge. While Datalog-based languages have been actively explored for programming distributed systems, Prolog received relatively little attention in this application area so far. In this paper we present a Prolog-based programming system, called DAHL, for the declarative development of distributed systems. DAHL extends Prolog with an event-driven control mechanism and built-in networking procedures. Our experimental evaluation using a distributed hash-table data structure, a protocol for achieving Byzantine fault tolerance, and a distributed software model checker—all implemented in DAHL—indicates the viability of the approach.
APA, Harvard, Vancouver, ISO, and other styles
11

Dotan, Maya, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, and Aviv Zohar. "Survey on Blockchain Networking." ACM Computing Surveys 54, no. 5 (June 2021): 1–34. http://dx.doi.org/10.1145/3453161.

Full text
Abstract:
Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however, can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This article is motivated by these differences and, in particular, by the observation that many fundamental design aspects of these networks are not well-understood today. To support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies. In particular, for each of these domains, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our article can hence also be seen as a call-to-arms to improve the foundation on top of which blockchains are built.
APA, Harvard, Vancouver, ISO, and other styles
12

Cacciapuoti, Angela Sara, Marcello Caleffi, Francesco Tafuri, Francesco Saverio Cataliotti, Stefano Gherardini, and Giuseppe Bianchi. "Quantum Internet: Networking Challenges in Distributed Quantum Computing." IEEE Network 34, no. 1 (January 2020): 137–43. http://dx.doi.org/10.1109/mnet.001.1900092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Vassio, Luca, Zhi-Li Zhang, Danilo Giordano, and Abhishek Chandra. "Message from the organizers of WAIN." ACM SIGMETRICS Performance Evaluation Review 48, no. 4 (May 17, 2021): 28. http://dx.doi.org/10.1145/3466826.3466837.

Full text
Abstract:
We are pleased to welcome you to the 2nd Workshop on AI in Networks and Distributed Systems. This year we have expanded the scope of the workshop to include applications of Machine Learning and AI not merely in Networking, but also in Distributed Systems. The scale and complexity of today's networks and distributed systems make their design, analysis, optimization, and management a daunting task. Hence smart and scalable approaches leveraging machine learning solutions are increasingly called for to take full advantage of these systems and infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
14

Wei, Yunkai, Yijin Chen, Mingyue Xiao, Sabita Maharjan, and Yan Zhang. "Protecting Machine Learning Integrity in Distributed Big Data Networking." IEEE Network 34, no. 4 (July 2020): 84–90. http://dx.doi.org/10.1109/mnet.011.1900450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Zyda, Michael, David Pratt, John Falby, Paul Barham, and Kristen Kelleher. "NPSNET and the Naval Postgraduate School Graphics and Video Laboratory." Presence: Teleoperators and Virtual Environments 2, no. 3 (January 1993): 244–58. http://dx.doi.org/10.1162/pres.1993.2.3.244.

Full text
Abstract:
The Naval Postgraduate School Networked Vehicle Simulator IV (NPSNET-IV) is a low-cost, student-written, real-time networked vehicle simulator that runs on commercial, off-the-shelf workstations (the Silicon Graphics IRIS family of computers). NPSNET-IV has been developed at the Naval Postgraduate School's (NPS) Department of Computer Science in the Graphics and Video Laboratory. It utilizes Simulation Network (SIMNET) databases and SIMNET and Distributed Interactive Simulation (DIS) networking formats. The DIS networking format is flexible enough to allow multiple players to game over the Internet. The availability of NPSNET-IV lowers the entry costs of researchers wanting to work with SIMNET, DIS, and follow-on systems. Without the contributions of the department's M.S. and Ph.D. candidates, the NPSNET project would be impossible to maintain and continue. The diversity of their interests accounts for the broad range of research areas within the project.
APA, Harvard, Vancouver, ISO, and other styles
16

DATTOLO, ANTONINA, and VINCENZO LOIA. "DISTRIBUTED INFORMATION AND CONTROL IN A CONCURRENT HYPERMEDIA-ORIENTED ARCHITECTURE." International Journal of Software Engineering and Knowledge Engineering 10, no. 03 (June 2000): 345–69. http://dx.doi.org/10.1142/s0218194000000158.

Full text
Abstract:
The market for parallel and distributed computing systems keeps growing. Technological advances in processor power, networking, telecommunication and multimedia are stimulating the development of applications requiring parallel and distributed computing. An important research problem in this area is the need to find a robust bridge between the decentralisation of knowledge sources in information-based systems and the distribution of computational power. Consequently, the attention of the research community has been directed towards high-level, concurrent, distributed programming. This work proposes a new hypermedia framework based on the metaphor of the actor model. The storage and run-time layers are represented entirely as communities of independent actors that cooperate in order to accomplish common goals, such as version management or user adaptivity. These goals involve fundamental and complex hypermedia issues, which, thanks to the distribution of tasks, are treated in an efficient and simple way.
APA, Harvard, Vancouver, ISO, and other styles
17

Stytz, Martin R., Philip Amburn, Patricia K. Lawlis, and Keith Shomper. "Virtual Environments Research in the Air Force Institute of Technology Virtual Environments, 3-D Medical Imaging, and Computer Graphics Laboratory." Presence: Teleoperators and Virtual Environments 4, no. 4 (January 1995): 417–30. http://dx.doi.org/10.1162/pres.1995.4.4.417.

Full text
Abstract:
The Air Force Institute of Technology Virtual Environments, 3-D Medical Imaging, and Computer Graphics Laboratory is investigating the 3-D computer graphics, user-interface design, networking protocol, and software architecture aspects of distributed virtual environments. In this paper we describe the research projects that are underway in the laboratory. These projects include the development of an aircraft simulator for a distributed virtual environment, projects for observing, analyzing, and understanding virtual environments, a space virtual environment, a project that incorporates “live” aircraft range data into a distributed virtual environment, a virtual environment application framework, and a project for use in a hospital emergency department. We also discuss the research equipment infrastructure in the laboratory, recent publications, and the educational services we provide.
APA, Harvard, Vancouver, ISO, and other styles
18

Li, Junwei, Le Wu, Richang Hong, and Jinkui Hou. "Random walk based distributed representation learning and prediction on Social Networking Services." Information Sciences 549 (March 2021): 328–46. http://dx.doi.org/10.1016/j.ins.2020.10.045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Thomopoulos, Stelios C. A., and Lei Zhang. "Distributed decision fusion in the presence of networking delays and channel errors." Information Sciences 66, no. 1-2 (December 1992): 91–118. http://dx.doi.org/10.1016/0020-0255(92)90089-q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Belda, Květoslav, Václav Rychnovský, and Pavel Píša. "Wireless communication for control of manipulation systems." Archives of Control Sciences 22, no. 1 (January 1, 2012): 29–41. http://dx.doi.org/10.2478/v10170-011-0010-6.

Full text
Abstract:
Wireless communication for control of manipulation systemsThe paper deals with a novel application of the wireless data communication for a continual control of the distributed manipulation systems. The solution is intended for industrial robotic plants. A considered way of the wireless communication is based on ZigBee protocol. The protocol is tested for a real time bidirectional data communication within a manipulation system. The system consists of several moving manipulation units, several stationary auxiliary units and one control computer. The computer provides the cooperation of all units in the system in relation to the user requirements. The system is controlled by a simple feedback multi-level control realized in MATLAB - Simulink environment. The paper is focused on the realization of the boards of power electronics, transmitters, optical positional sensors, optical gates and their networking in accordance with ZigBee protocol definition. The behavior of the ZigBee is illustrated by several records from real experiments.
APA, Harvard, Vancouver, ISO, and other styles
21

Nour, Boubakr, Hakima Khelifi, Hassine Moungla, Rasheed Hussain, and Nadra Guizani. "A Distributed Cache Placement Scheme for Large-Scale Information-Centric Networking." IEEE Network 34, no. 6 (November 2020): 126–32. http://dx.doi.org/10.1109/mnet.011.2000081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ginoth, R., and Navin Prasad. "Implementation of Smart Grid Using Lab View." International Journal of Students' Research in Technology & Management 3, no. 7 (October 29, 2015): 428. http://dx.doi.org/10.18510/ijsrtm.2015.376.

Full text
Abstract:
Like the Personal Computer and smart phone, most disruptive ideas combine existing elements in a way that provides a dramatically better solution. The same phenomenon is true for the smart grid. Embedded reconfigurable instrumentation and control systems powered by National Instruments (NI) Laboratory Virtual Instrument Engineering Workbench (LabVIEW) software are merging with cloud-based networking, analytics, and other cutting-edge information technologies.The proliferation of smart networked embedded systems, widely distributed throughout the grid, will revolutionize the way electricity is produced, consumed, and distributed. Like the information technology (IT) revolution that drives it, the energy technology (ET) revolution will bring dramatic innovations that make energy cheaper, cleaner, and more abundant. By this presentation spectators can understand the technology development in the fields of energy.
APA, Harvard, Vancouver, ISO, and other styles
23

Hannon, Christopher, Jiaqi Yan, and Dong Jin. "Distributed Virtual Time-Based Synchronization for Simulation of Cyber-Physical Systems." ACM Transactions on Modeling and Computer Simulation 31, no. 2 (April 2021): 1–24. http://dx.doi.org/10.1145/3446237.

Full text
Abstract:
Our world today increasingly relies on the orchestration of digital and physical systems to ensure the successful operations of many complex and critical infrastructures. Simulation-based testbeds are useful tools for engineering those cyber-physical systems and evaluating their efficiency, security, and resilience. In this article, we present a cyber-physical system testing platform combining distributed physical computing and networking hardware and simulation models. A core component is the distributed virtual time system that enables the efficient synchronization of virtual clocks among distributed embedded Linux devices. Virtual clocks also enable high-fidelity experimentation by interrupting real and emulated cyber-physical applications to inject offline simulation data. We design and implement two modes of the distributed virtual time: periodic mode for scheduling repetitive events like sensor device measurements, and dynamic mode for on-demand interrupt-based synchronization. We also analyze the performance of both approaches to synchronization including overhead, accuracy, and error introduced from each approach. By interconnecting the embedded devices’ general purpose IO pins, they can coordinate and synchronize with low overhead, under 50 microseconds for eight processes across four embedded Linux devices. Finally, we demonstrate the usability of our testbed and the differences between both approaches in a power grid control application.
APA, Harvard, Vancouver, ISO, and other styles
24

SHAHZAD, FAISAL, MARKUS WITTMANN, MORITZ KREUTZER, THOMAS ZEISER, GEORG HAGER, and GERHARD WELLEIN. "A SURVEY OF CHECKPOINT/RESTART TECHNIQUES ON DISTRIBUTED MEMORY SYSTEMS." Parallel Processing Letters 23, no. 04 (December 2013): 1340011. http://dx.doi.org/10.1142/s0129626413400112.

Full text
Abstract:
The road to exascale computing poses many challenges for the High Performance Computing (HPC) community. Each step on the exascale path is mainly the result of a higher level of parallelism of the basic building blocks (i.e., CPUs, memory units, networking components, etc.). The reliability of each of these basic components does not increase at the same rate as the rate of hardware parallelism. This results in a reduction of the mean time to failure (MTTF) of the whole system. A fault tolerance environment is thus indispensable to run large applications on such clusters. Checkpoint/Restart (C/R) is the classic and most popular method to minimize failure damage. Its ease of implementation makes it useful, but typically it introduces significant overhead to the application. Several efforts have been made to reduce the C/R overhead. In this paper we compare various C/R techniques for their overheads by implementing them on two different categories of applications. These approaches are based on parallel-file-system (PFS)-level checkpoints (synchronous/asynchronous) and node-level checkpoints. We utilize the Scalable Checkpoint/Restart (SCR) library for the comparison of node-level checkpoints. For asynchronous PFS-level checkpoints, we use the Damaris library, the SCR asynchronous feature, and application-based checkpointing via dedicated threads. Our baseline for overhead comparison is the naïve application-based synchronous PFS-level checkpointing method. A 3D lattice-Boltzmann (LBM) flow solver and a Lanczos eigenvalue solver are used as prototypical applications in which all the techniques considered here may be applied.
APA, Harvard, Vancouver, ISO, and other styles
25

Gaur, Puru, Amish Tandon, Nupur Goyal, Gitanjali Chandwani, and Mangey Ram. "An Analysis of Hierarchical Software-Defined Network Control Plane: A Reliability Approach." International Journal of Reliability, Quality and Safety Engineering 27, no. 03 (October 2, 2019): 2050010. http://dx.doi.org/10.1142/s0218539320500102.

Full text
Abstract:
Present-day computer systems have drastically transformed from the ones in days of basic file sharing, peripheral sharing or the hosting of companywide applications on a server to much more sophisticated, small and faster systems. These systems have further expanded to include cloud-based networks, virtualized desktops, servers, etc. The capabilities of evolving heterogeneous computer systems require advanced control plane. Software-defined networking (SDN) proposes to control the network from a centralized controller instead of a distributed configuration. SDN makes it easier for network operators to evolve network capabilities. Even though SDN proposes a logically centralized system, the controllers may not represent a single, centralized device, instead the control plane may consist of logically centralized but physically distributed controllers wherein each controller manages different administrative domains of the network or different parts of the flow space. There are mainly two types of control plane architecture: flat control plane and hierarchical control plane. In this paper, we have analyzed the reliability and availability of the hierarchical SDN control plane. We take into consideration work-load capacities of the controllers, link failures, node failures and controller-end failures to determine the reliability of the system.
APA, Harvard, Vancouver, ISO, and other styles
26

Rodis, Panteleimon. "On defining and modeling context-awareness." International Journal of Pervasive Computing and Communications 14, no. 2 (June 4, 2018): 111–23. http://dx.doi.org/10.1108/ijpcc-d-18-00003.

Full text
Abstract:
Purpose This paper aims to present a methodology for defining and modeling context-awareness and describing efficiently the interactions between systems, applications and their context. Also, the relation of modern context-aware systems with distributed computation is investigated. Design/methodology/approach On this purpose, definitions of context and context-awareness are developed based on the theory of computation and especially on a computational model for interactive computation which extends the classical Turing Machine model. The computational model proposed here encloses interaction and networking capabilities for computational machines. Findings The definition of context presented here develops a mathematical framework for working with context. Also, the modeling approach of distributed computing enables us to build robust, scalable and detailed models for systems and application with context-aware capabilities. Also, it enables us to map the procedures that support context-aware operations providing detailed descriptions about the interactions of applications with their context and other external sources. Practical implications A case study of a cloud-based context-aware application is examined using the modeling methodology described in the paper so as to demonstrate the practical usage of the theoretical framework that is presented. Originality/value The originality on the framework presented here relies on the connection of context-awareness with the theory of computation and distributed computing.
APA, Harvard, Vancouver, ISO, and other styles
27

SRINIVASAN, JAGANNATHAN, YIN-HE JIANG, YONGGUANG ZHANG, and BHARAT BHARGAVA. "PERFORMANCE STUDY ON SUPPORTING OBJECTS IN O-RAID DISTRIBUTED DATABASE SYSTEM." International Journal of Cooperative Information Systems 02, no. 02 (June 1993): 225–47. http://dx.doi.org/10.1142/s0218215793000113.

Full text
Abstract:
O-Raid [1, 2] uses a layered approach to provide support for objects on top of a distributed relational database system called RAID [3], It reuses the replication controller of RAID to allow replication of simple objects as well as replication of composite objects. In this paper, we first describe the experiments conducted on O-Raid that measure the overheads incurred in supporting objects through a layered implementation, and the overheads involved in replicating objects. The overheads are low (e.g. 4ms for an insert query involving objects). We present experiments that evaluate three replication strategies for composite objects, namely, full replication, selective replication and no replication in a two-site and a four-site O-Raid system. For composite object experiments, the selective replication strategy demonstrated the flexibility of tuning replication of member objects based on the patterns of access. The experimentation is performed in different networking environments (LANs and WANs) to further evaluate the replication schemes. The results indicate that selective replication scheme has greater benefits in WAN than in LAN.
APA, Harvard, Vancouver, ISO, and other styles
28

Bhavadharini, R. M., S. Karthik, N. Karthikeyan, and Anand Paul. "Wireless Networking Performance in IoT Using Adaptive Contention Window." Wireless Communications and Mobile Computing 2018 (July 3, 2018): 1–9. http://dx.doi.org/10.1155/2018/7248040.

Full text
Abstract:
Internet of Things (IoT) network contains heterogeneous resource-constrained computing devices which has its unique reputation in IoT environments. In spite of its distinctiveness, the network performance deteriorates by the distributed contention of the nodes for the shared wireless medium in IoT. In IoT network, the Medium Access Control (MAC) layer contention impacts the level of congestion at the transport layer. Further, the increasing node contention at the MAC layer increases link layer frame drops resulting in timeouts at the transport layer segments and the performance of TCP degrades. In addition to that, the expiration of maximum retransmission attempts and the high contentions drive the MAC retransmissions and the associated overheads to reduce the link level throughput and the packet delivery ratio. In order to deal with aforementioned problems, the Adaptive Contention Window (ACW) is proposed, which aims to reduce the MAC overhead and retransmissions by determining active queue size at the contending nodes and the energy level of the nodes to improve TCP performance. Further, the MAC contention window is adjusted according to the node’s active queue size and the residual energy and TCP congestion window is dynamically adjusted based on the MAC contention window. Hence, by adjusting the MAC Adaptive Contention Window, the proposed model effectively distributes the access to medium and assures improved network throughput. Finally, the simulation study implemented through ns-2 is compared with an existing methodology such as Cross-Layer Congestion Control and dynamic window adaptation (CC-BADWA); the proposed model enhances the network throughput with the minimal collisions.
APA, Harvard, Vancouver, ISO, and other styles
29

Kenyeres, Martin, and Jozef Kenyeres. "Comparative Study of Distributed Consensus Gossip Algorithms for Network Size Estimation in Multi-Agent Systems." Future Internet 13, no. 5 (May 18, 2021): 134. http://dx.doi.org/10.3390/fi13050134.

Full text
Abstract:
Determining the network size is a critical process in numerous areas (e.g., computer science, logistic, epidemiology, social networking services, mathematical modeling, demography, etc.). However, many modern real-world systems are so extensive that measuring their size poses a serious challenge. Therefore, the algorithms for determining/estimating this parameter in an effective manner have been gaining popularity over the past decades. In the paper, we analyze five frequently applied distributed consensus gossip-based algorithms for network size estimation in multi-agent systems (namely, the Randomized gossip algorithm, the Geographic gossip algorithm, the Broadcast gossip algorithm, the Push-Sum protocol, and the Push-Pull protocol). We examine the performance of the mentioned algorithms with bounded execution over random geometric graphs by applying two metrics: the number of sent messages required for consensus achievement and the estimation precision quantified as the median deviation from the real value of the network size. The experimental part consists of two scenarios—the consensus achievement is conditioned by either the values of the inner states or the network size estimates—and, in both scenarios, either the best-connected or the worst-connected agent is chosen as the leader. The goal of this paper is to identify whether all the examined algorithms are applicable to estimating the network size, which algorithm provides the best performance, how the leader selection can affect the performance of the algorithms, and how to most effectively configure the applied stopping criterion.
APA, Harvard, Vancouver, ISO, and other styles
30

Chu, Shu-Chuan, Lili Chen, Sachin Kumar, Saru Kumari, Joel J. P. C. Rodrigues, and Chien-Ming Chen. "Decentralized Private Information Sharing Protocol on Social Networks." Security and Communication Networks 2020 (June 5, 2020): 1–12. http://dx.doi.org/10.1155/2020/7137480.

Full text
Abstract:
Social networks are becoming popular, with people sharing information with their friends on social networking sites. On many of these sites, shared information can be read by all of the friends; however, not all information is suitable for mass distribution and access. Although people can form communities on some sites, this feature is not yet available on all sites. Additionally, it is inconvenient to set receivers for a message when the target community is large. One characteristic of social networks is that people who know each other tend to form densely connected clusters, and connections between clusters are relatively rare. Based on this feature, community-finding algorithms have been proposed to detect communities on social networks. However, it is difficult to apply community-finding algorithms to distributed social networks. In this paper, we propose a distributed privacy control protocol for distributed social networks. By selecting only a small portion of people from a community, our protocol can transmit information to the target community.
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Shaofeng, Alex H. B. Duffy, Robert Ian Whitfield, Iain M. Boyle, and Iain McKenna. "Towards the Realization of an Integrated Decision Support Environment for Organizational Decision Making." International Journal of Decision Support System Technology 1, no. 4 (October 2009): 38–58. http://dx.doi.org/10.4018/jdsst.2009062603.

Full text
Abstract:
Traditional decision support systems are based on the paradigm of a single decision maker working at a standalone computer or terminal who has a specific decision to make with a specific goal in mind. Organizational decision support systems aim to support decision makers at all levels of an organization (from executive, middle management managers to operators), who have a variety of decisions to make, with different priorities, often in a distributed and dynamic environment. Such systems need to be designed and developed with extra functionality to meet the challenges such as collaborative working. This article proposes an Integrated Decision Support Environment (IDSE) for organizational decision making. The IDSE distinguishes itself from traditional decision support systems in that it can flexibly configure and re-configure its functions to support various decision applications. IDSE is an open software platform which allows its users to define their own decision processes and choose their own exiting decision tools to be integrated into the platform. The IDSE is designed and developed based on distributed client/server networking, with a multi-tier integration framework for consistent information exchange and sharing, seamless process co-ordination and synchronisation, and quick access to packaged and legacy systems. The prototype of the IDSE demonstrates good performance in agile response to fast changing decision situations.
APA, Harvard, Vancouver, ISO, and other styles
32

Janky, Ferenc Nandor, and Pal Varga. "Time Synchronization Solution for FPGA-based Distributed Network Monitoring." Infocommunications journal, no. 1 (2018): 1–9. http://dx.doi.org/10.36244/icj.2018.1.1.

Full text
Abstract:
Distributed network monitoring solutions face various challenges with the increase of line speed, the extending variety of protocols, and new services with complex KPIs. This paper addresses one part of the first challenge: faster line speed necessitates time-stamping with higher granularity and higher precision than ever. Proper, system-wide time-stamping is inevitable for network monitoring and traffic analysis point of view. It is hard to find feasible time synchronization solutions for those systems that have nation-wide, physically distributed probes. Current networking equipment reside in server rooms, and have many legacy nodes. Access to GPS signal is complicated in these places, and Precision Time Protocol (PTP) does not seem to be supported by all network nodes in the near future – so high precision time-stamping is indeed a current problem. This paper suggests a novel, practical solution to overcome the obstacles. The core idea is that in real-life, distributed network monitoring systems operate with a few, finite number of probeclusters, and their site should have a precise clock provided by PTP or GPS somewhere in the building. The distribution of time information within a site is still troublesome, even within a server rack. This paper presents a closed control loop solution implemented in an FPGA-based device in order to minimize the jitter, and compensate the calculated delay.
APA, Harvard, Vancouver, ISO, and other styles
33

Abed, Ali, AbdulAdhem Ali, and Nauman Aslam. "Building an HMI and Demo Application of WSN-based Industrial Control Systems." Iraqi Journal for Electrical and Electronic Engineering 7, no. 2 (December 1, 2011): 107–11. http://dx.doi.org/10.37917/ijeee.7.2.4.

Full text
Abstract:
In this paper we present the details of methodology pursued in implementation of an HMI and Demo Temperature Monitoring application for wireless sensor-based distributed control systems. The application of WSN for a temperature monitoring and control is composed of a number of sensor nodes (motes) with a networking capability that can be deployed for monitoring and control purposes. The temperature is measured in the real time by the sensor boards that sample and send the data to the monitoring computer through a base station or gateway. This paper proposes how such monitoring system can be setup emphasizing on the aspects of low cost, energy-efficient, easy ad-hoc installation and easy handling and maintenance. This paper focuses on the overall potential of wireless sensor nodes and networking in industrial applications. A specific case study is given for the measurement of temperature (with thermistor or thermocouple), humidity, light and the health of the WSN. The focus was not on these four types of measurements and analysis but rather on the design of a communication protocol and building of an HMI software for monitoring. So, a set of system design requirements are developed that covered the use of the wireless platforms, the design of sensor network, the capabilities for remote data access and management, the connection between the WSN and an HMI software designed with MATLAB.
APA, Harvard, Vancouver, ISO, and other styles
34

Caprolu, Maurantonio, Simone Raponi, and Roberto Di Pietro. "FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN." Security and Communication Networks 2019 (February 19, 2019): 1–16. http://dx.doi.org/10.1155/2019/6874592.

Full text
Abstract:
The Software Defined Networking (SDN) paradigm decouples the logic module from the forwarding module on traditional network devices, bringing a wave of innovation to computer networks. Firewalls, as well as other security appliances, can largely benefit from this novel paradigm. Firewalls can be easily implemented by using the default OpenFlow rules, but the logic must reside in the control plane due to the dynamic nature of their rules that cannot be handled by data plane devices. This leads to a nonnegligible overhead in the communication channel between layers, as well as introducing an additional computational load on the control plane. To address the above limitations, we propose the architectural design of FORTRESS: a stateful firewall for SDN networks that leverages the stateful data plane architecture to move the logic of the firewall from the control plane to the data plane. FORTRESS can be implemented according to two different architectural designs: Stand-Alone and Cooperative, each one with its own peculiar advantages. We compare FORTRESS against FlowTracker, the state-of-the-art solution for SDN firewalling, and show how our solution outperforms the competitor in terms of the number of packets exchanged between the control plane and the data plane—we require 0 packets for the Stand-Alone architecture and just 4 for the Cooperative one. Moreover, we discuss how the adaptability, elegant and modular design, and portability of FORTRESS contribute to make it the ideal candidate for SDN firewalling. Finally, we also provide further research directions.
APA, Harvard, Vancouver, ISO, and other styles
35

Ben-Shaul, Israel, Avron Cohen, Ophir Holder, and Boris Lavva. "HADAS: A Network-Centric Framework for Interoperability Programming." International Journal of Cooperative Information Systems 06, no. 03n04 (September 1997): 293–314. http://dx.doi.org/10.1142/s0218843097000148.

Full text
Abstract:
The explosive growth in global networking infrastructures has created the opportunity to construct systems involving large number of independent and widely-distributed computational components. Administrative and operational autonomy considerations imply that the actual establishment of agreements regarding all aspects of component interaction must be explicitly declared and effectively formed. Moreover, since agreements may evolve over time, their representation needs to be highly tailorable. Design autonomy considerations imply the need to interoperate between pre-existing components, yet not enforce a fixed interoperability standard. The HADAS system addresses both concerns by providing a model and a corresponding programmable interface to component interoperability. Specifically, it provides an integration framework in which components "live", a peer-based configuration model for forming agreements and interconnections between components, and a coordination language for explicitly programming the actual desired distributed computation using these components. The framework rests on an underlying reflective object model that supports mutability and mobility, and an infrastructure that provides object interconnectivity, security and persistence. HADAS is fully implemented in Java and comes with a full programming environment for developing and executing network-centric applications.
APA, Harvard, Vancouver, ISO, and other styles
36

Gedel, Ibrahim Alhassan, and Nnamdi I. Nwulu. "Low Latency 5G Distributed Wireless Network Architecture: A Techno-Economic Comparison." Inventions 6, no. 1 (January 24, 2021): 11. http://dx.doi.org/10.3390/inventions6010011.

Full text
Abstract:
The most profound requirements of fifth-generation (5G) technology implementations are the architecture design and the radio base station technology to capably run applications such as device-to-device, machine-to machine and internet of things at a reduced latency. Owing to these requirements, the implementation of 5G technology is very expensive to mobile network operators (MNO). In this study we modified the existing 4G network to form a distributed wireless network architecture (DWNA); the picocell and distributed antenna system were modified to support the enabling technology of 5G technology were a multi-edge computer (MEC), software-defined networking (SDN), massive multiple input multiple output (MIMO), ultra-dense network (UDN), Network Functions Virtualization (NFV) and device-to-device (D2D) communication at a reduced cost of ownership, improved coverage and capacity. We present a mathematical model for operational expenditure, capital expenditure and total cost of ownership (TCO) for the DWNA. A mathematical model for DWNA capacity and throughput was presented. Result shows that it is very economical for MNO to rent the space of the tower infrastructure from tower companies. The sensitivity analysis also shows a significant reduction in TCO for both the modified picocell and modified distributed antenna systems.
APA, Harvard, Vancouver, ISO, and other styles
37

Myint Oo, Myo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, and Sangsuree Vasupongayya. "Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)." Journal of Computer Networks and Communications 2019 (March 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/8012568.

Full text
Abstract:
Software Defined Networking (SDN) has many advantages over a traditional network. The great advantage of SDN is that the network control is physically separated from forwarding devices. SDN can solve many security issues of a legacy network. Nevertheless, SDN has many security vulnerabilities. The biggest issue of SDN vulnerabilities is Distributed Denial of Service (DDoS) attack. The DDoS attack on SDN becomes an important problem, and varieties of methods had been applied for detection and mitigation purposes. The objectives of this paper are to propose a detection method of DDoS attacks by using SDN based technique that will disturb the legitimate user's activities at the minimum and to propose Advanced Support Vector Machine (ASVM) technique as an enhancement of existing Support Vector Machine (SVM) algorithm to detect DDoS attacks. ASVM technique is a multiclass classification method consisting of three classes. In this paper, we can successfully detect two types of flooding-based DDoS attacks. Our detection technique can reduce the training time as well as the testing time by using two key features, namely, the volumetric and the asymmetric features. We evaluate the results by measuring a false alarm rate, a detection rate, and accuracy. The detection accuracy of our detection technique is approximately 97% with the fastest training time and testing time.
APA, Harvard, Vancouver, ISO, and other styles
38

Mahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, and Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.

Full text
Abstract:
Information Communication Technology (ICT) environment in traditional power grids makes detection and mitigation of DDoS attacks more challenging. Existing security technologies, besides their efficiency, are not adequate to cater to DDoS security in Smart Grids (SGs) due to highly distributed and dynamic network environments. Recently, emerging Software Defined Networking- (SDN-) based approaches are proposed by researchers for SG’s DDoS protection; however, they are only able to protect against flooding attacks and are dependent on static thresholds. The proposed approach, i.e., Software Defined Networking-based DDoS Protection System (S-DPS), is efficiently addressing these issues by employing light-weight Tsallis entropy-based defense mechanisms using SDN environment. It provides early detection mechanism with mitigation of anomaly in real time. The approach offers the best deployment location of defense mechanism due to the centralized control of network. Moreover, the employment of a dynamic threshold mechanism is making detection process adaptive to the changing network conditions. S-DPS has demonstrated its effectiveness and efficiency in terms of Detection Rate (DR) and minimal CPU/RAM utilization, considering DDoS protection focusing smurf attacks, socket stress attacks, and SYN flood attacks.
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Hao, Rongbo Zhu, Jun Wang, and Wengang Xu. "Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking." Security and Communication Networks 2021 (July 7, 2021): 1–13. http://dx.doi.org/10.1155/2021/3717702.

Full text
Abstract:
Due to the distributed and dynamic characteristics of the Internet of Vehicles (IoV) and the continuous growth in the number of devices, content-centric decentralized vehicular named data networking (VNDN) has become more suitable for content-oriented applications in IoV. However, the existing centralized architecture is prone to the failure of single points, which results in trust problems in key verification between cross-domain nodes and consuming more power and reducing the lifetime. Focusing on secure key management and power-efficient routing, this article proposes a blockchain-based key management and green routing scheme for VNDN. A blockchain-based key management scheme is presented to achieve secure and efficient distribution and verification of keys. Specifically, all trusted agencies (TAs) form a consortium blockchain for storing public key hashes to ensure the authenticity of users’ public keys. A green global routing scheme based on node relaying pressure (GGNRP) is proposed to save power consumption and reduce the forwarding delay. A new node relay pressure metric is introduced to assist with routing decisions. Detailed experiments and analysis show that, compared with the existing scheme, the proposed scheme can achieve secure key management and GGNRP can decrease the power consumption and average delay by 15.8% and 63.2%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
40

Chang, I.-Chiu, Chia-Hui Chang, Jiunn-Woei Lian, and Ming-Wei Wang. "Antecedents and consequences of social networking site knowledge sharing by seniors." Library Hi Tech 36, no. 4 (November 19, 2018): 651–64. http://dx.doi.org/10.1108/lht-11-2016-0144.

Full text
Abstract:
Purpose Understanding elders’ experience and knowledge-sharing behaviors online have become significant issues in this aging society. In this study, the purpose of this paper is to summarize and validate the factors that influence the intention of elders to share knowledge online, and assess whether seniors’ knowledge-sharing behaviors affect their sense of meaning in life. Design/methodology/approach In total, 49 senior students were invited as participants to join the social networking site (SNS) and share knowledge on the platform. After a month of knowledge-sharing activities, questionnaires were distributed to all the participants. All the 49 participants returned completed questionnaires. To verify the results obtained via the above quantitative data analysis, follow-up interviews were conducted with one popular computer instructor and four seniors (who are experienced users of the SNS). Open-ended questions were employed to understand the motivations for sharing knowledge in a virtual community and the benefits obtained from sharing. Findings The results indicate that sharing vision, community identification, and social interaction ties are the main factors that influence the sharing of knowledge by seniors on SNSs. In addition, sharing knowledge on SNSs has a positive influence on seniors’ meaning in life. Follow-up interviews conducted also validate the results obtained. Originality/value Understanding elders’ experience and knowledge-sharing behaviors online have become significant issues in this aging society. It can not only benefit younger generations but also enable them to age gracefully. Rare SNSs similar to the one used in the study were found on the Facebook during our research.
APA, Harvard, Vancouver, ISO, and other styles
41

Kelso, John, Steven G. Satterfield, Lance E. Arsenault, Peter M. Ketchan, and Ronald D. Kriz. "DIVERSE: A Framework for Building Extensible and Reconfigurable Device-Independent Virtual Environments and Distributed Asynchronous Simulations." Presence: Teleoperators and Virtual Environments 12, no. 1 (February 2003): 19–36. http://dx.doi.org/10.1162/105474603763835314.

Full text
Abstract:
We present DIVERSE, a highly modular collection of complimentary software packages designed to facilitate the creation of device-independent virtual environments and distributed asynchronous simulations. DIVERSE is free/open source software, containing both end-user programs and C++ application programming interfaces (APIs). DPF is the DIVERSE graphics interface to OpenGL Performer. A program using the DPF API can run without modification on platforms ranging from fully immersive systems such as CAVEs to generic desktop workstations. The DIVERSE toolkit (DTK) contains all the nongraphical components of DIVERSE, such as networking utilities, hardware device access, and navigational techniques. It introduces a software implementation of networks of replicated noncoherent shared memory. It also introduces a method that seamlessly extends hardware drivers into interprocess and Internet hardware services. We will describe the design of DIVERSE and present a specific example of how it is being used to aid researchers.
APA, Harvard, Vancouver, ISO, and other styles
42

J. Gokulraj, J. Deepika,. "Internet of Things Device Enabled Smart Home Integrated Architecture with Security Services." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2614–23. http://dx.doi.org/10.17762/turcomat.v12i6.5708.

Full text
Abstract:
The innovative internet technology of domestic automation applications is widely distributed. Home automation systems have become increasingly sophisticated by providing access to all people irrespective of time or place. Home automation devices, known as smart home systems, are supplied with wireless communication technologies via cell phones and microcontrollers for a remote control of wired non-computers at home. In this digital age, the home automation system was developed to target a broad range of applications for new digital consumers. Smart home systems with Internet connectivity of objects and security services, incorporation of intelligence into sensors and actuators, networking of intelligent elements that enable interactions between intelligent devices allow easy access at different locations, increased calculation power, storage capacity and efficient data sharing.
APA, Harvard, Vancouver, ISO, and other styles
43

Halevi, Yoram, and Asok Ray. "Integrated Communication and Control Systems: Part I—Analysis." Journal of Dynamic Systems, Measurement, and Control 110, no. 4 (December 1, 1988): 367–73. http://dx.doi.org/10.1115/1.3152698.

Full text
Abstract:
Computer networking is a reliable and efficient means for communications between disparate and distributed components in complex dynamical processes like advanced aircraft, spacecraft, and autonomous manufacturing plants. The role of Integrated Communication and Control Systems (ICCS) is to coordinate and perform interrelated functions, ranging from real-time multi-loop control to information display and routine maintenance support. In ICCS, a feedback control loop is closed via the common communication channel which multiplexes digital data from the sensor to the controller and from the controller to the actuator along with the data traffic from other loops and management functions. Due to the asynchronous time-division multiplexing of the network protocol, time-varying and possibly stochastic delays are introduced in the control system, which degrade the system dynamic performance and are a source of potential instability. The paper is divided into two parts. In the first part, the delayed control system is represented by a finite-dimensional, time-varying, discrete-time model which is less complex than the existing continuous-time models for time-varying delays; this approach allows for simpler schemes for analysis and simulation of ICCS. The second part of the paper addresses ICCS design considerations and presents simulation results for certain operational scenarios of ICCS.
APA, Harvard, Vancouver, ISO, and other styles
44

Wu, Yi-Chang, Ching-Han Chen, Yao-Te Chiu, and Pi-Wei Chen. "Cooperative People Tracking by Distributed Cameras Network." Electronics 10, no. 15 (July 25, 2021): 1780. http://dx.doi.org/10.3390/electronics10151780.

Full text
Abstract:
In the application of video surveillance, reliable people detection and tracking are always challenging tasks. The conventional single-camera surveillance system may encounter difficulties such as narrow-angle of view and dead space. In this paper, we proposed multi-cameras network architecture with an inter-camera hand-off protocol for cooperative people tracking. We use the YOLO model to detect multiple people in the video scene and incorporate the particle swarm optimization algorithm to track the person movement. When a person leaves the area covered by a camera and enters an area covered by another camera, these cameras can exchange relevant information for uninterrupted tracking. The motion smoothness (MS) metrics is proposed for evaluating the tracking quality of multi-camera networking system. We used a three-camera system for two persons tracking in overlapping scene for experimental evaluation. Most tracking person offsets at different frames were lower than 30 pixels. Only 0.15% of the frames showed abrupt increases in offsets pixel. The experiment results reveal that our multi-camera system achieves robust, smooth tracking performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Khan, Nadim Akhtar, Huma Shafiq, Sabiha Zehra Rizvi, and Samah Mushtaq. "Social Networking Tools in Virtual Reference." International Journal of Virtual Communities and Social Networking 7, no. 3 (July 2015): 59–73. http://dx.doi.org/10.4018/ijvcsn.2015070104.

Full text
Abstract:
The rapid advancements in web and availability of growing number of free social networking tools have greatly influenced the present day communication mechanisms. These tools have provided cheaper, instant and faster methods of communicating information irrespective of geographical and time barriers. Users especially the younger generation is much familiar with the use of such tools and modern libraries are experiencing rapid changes in user perceptions and information seeking patterns. Owing to the ease of accessibility of plethora of information resources via cell phones, tablets using smart apps, libraries are revisiting their methods of information delivery. Many libraries are using social networking tools for handling user queries and advertising their library products especially in Virtual Reference Services (VRS). Virtual reference is reference service initiated electronically where patrons employ computers or other technology to communicate with public services staff without being physically present. Communication channels used frequently in virtual reference include chat, video-conferencing, voice-over-IP, co-browsing, e-mail, and instant messaging (Reference and User Services Association [RUSA] Guidelines, 2010). It primarily refers to a network of expertise, intermediation and resources placed at the disposal of someone seeking answers in an online environment (Berube, 2003). It has brought about tremendous change in the concept of reference services in terms of information dissemination and user satisfaction. Various initiatives have already been taken to develop standards, guidelines and procedures for setting up successful digital reference systems. Virtual reference has emerged as a new powerful method of delivering reference and information service to a vast number of clientele distributed globally. It includes seamless access to global resources and the collection of knowledge for reference access, coupled with complementary access to information on the internet. It has brought about tremendous change in the concept of reference services in terms of information dissemination and user satisfaction. The seamless influence of Social Networking tools on virtual reference is quite evident and trend is fast shifting towards incorporating such tools in libraries at global level. These tools not only solve the problems of communicating in real time environment in all modes ranging from instant messaging to audio/visuals but also provide ample opportunities for libraries to retain their users. The present work thus discusses the concept of Virtual Reference Service and possible use of different Social Networking tools in present day Virtual Reference Systems for successfully addressing user queries.
APA, Harvard, Vancouver, ISO, and other styles
46

Saqib, Muhammad, Farrukh Zeeshan Khan, Muneer Ahmed, and Raja Majid Mehmood. "A critical review on security approaches to software-defined wireless sensor networking." International Journal of Distributed Sensor Networks 15, no. 12 (December 2019): 155014771988990. http://dx.doi.org/10.1177/1550147719889906.

Full text
Abstract:
Wireless sensor networks (WSNs) are very prone to ongoing security threats due to its resource constraints and unprotected transmission medium. WSN contains hundreds and thousands of resource-constrained and self-organized sensor nodes. These sensor nodes are usually organized in a distributed manner; thus, it permits the creation of an ad hoc network without predefined infrastructure or centralized management. As WSNs are going to get control of real-time applications, where a malicious activity can cause serious damage, the inherent challenge is to fortify the security enforcement in these networks. As a solution, software-defined network (SDN) has come out and has been merged with WSN to form what is known as software-defined wireless sensor network (SDWSN). SDWSN has come into existence, and it legitimizes network operators with more flexibility and control over the network. SDWSN has more tightened the security enforcement based on the global view and centralized control of the network topology. Moreover, machine learning (ML)–based and deep learning (DL)–based network intrusion detection systems (NIDS) have been introduced to the SDN environment to protect the networks against anomaly threats. In this review article, we illustrated the SDN–based security approaches to WSN followed by its architectures, advantages, and possible security threats. Finally, ML/DL–based NIDS integrated with the SDN controller is proposed as a complete solution for the WSN environment to confront the ongoing anomaly threats and to sufficiently protect the network against both known and unknown attacks.
APA, Harvard, Vancouver, ISO, and other styles
47

Ohata, Toru, Hiroyuki Konishi, Hiroaki Kimura, Yukito Furukawa, Kenji Tamasaku, Takeshi Nakatani, Toshiya Tanabe, Norimasa Matsumoto, Miho Ishii, and Tetsuya Ishikawa. "SPring-8 beamline control system." Journal of Synchrotron Radiation 5, no. 3 (May 1, 1998): 590–92. http://dx.doi.org/10.1107/s0909049597016038.

Full text
Abstract:
The SPring-8 beamline control system is now taking part in the control of the insertion device (ID), front end, beam transportation channel and all interlock systems of the beamline: it will supply a highly standardized environment of apparatus control for collaborative researchers. In particular, ID operation is very important in a third-generation synchrotron light source facility. It is also very important to consider the security system because the ID is part of the storage ring and is therefore governed by the synchrotron ring control system. The progress of computer networking systems and the technology of security control require the development of a highly flexible control system. An interlock system that is independent of the control system has increased the reliability. For the beamline control system the so-called standard model concept has been adopted. VME-bus (VME) is used as the front-end control system and a UNIX workstation as the operator console. CPU boards of the VME-bus are RISC processor-based board computers operated by a LynxOS-based HP-RT real-time operating system. The workstation and the VME are linked to each other by a network, and form the distributed system. The HP 9000/700 series with HP-UX and the HP 9000/743rt series with HP-RT are used. All the controllable apparatus may be operated from any workstation.
APA, Harvard, Vancouver, ISO, and other styles
48

Zheng, Xiabing, Christy M. K. Cheung, Matthew K. O. Lee, and Liang Liang. "Building brand loyalty through user engagement in online brand communities in social networking sites." Information Technology & People 28, no. 1 (March 2, 2015): 90–106. http://dx.doi.org/10.1108/itp-08-2013-0144.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the concept of user engagement in the context of online brand communities. A research model is proposed to explain how brand loyalty is developed through user engagement. Design/methodology/approach – The research model was empirically tested with an online survey study of 185 current Facebook users. Findings – Results revealed that user engagement influenced brand loyalty both directly and indirectly through online community commitment. Users tend to focus on the benefits (rather than the costs) derived from the usage when they engage in an online brand community. Research limitations/implications – The selection of respondents is bound to the Hong Kong area, while Facebook members are globally distributed. In addition, this study involved a cross-sectional design instead of investigating the development of brand loyalty from a long-term perspective. Practical implications – The results inform e-marketers the importance of user engagement behaviors for building brand loyalty through online communities. Strategies that encourage members to engage in online brand communities on social networking sites such as Facebook are also provided. Originality/value – The concept of user engagement in online brand communities is still poorly understood, underscoring the need for theoretically based research of user engagement. This paper enriches the knowledge in the area of brand engagement by presenting a research model that introduces the concept of user engagement in social media research and empirically examines its role in building brand loyalty in online brand communities.
APA, Harvard, Vancouver, ISO, and other styles
49

Lampton, D. R., and J. B. Parsons. "The Fully Immersive Team Training (FITT) Research System: Design and Implementation." Presence: Teleoperators and Virtual Environments 10, no. 2 (April 2001): 129–41. http://dx.doi.org/10.1162/105474601750216768.

Full text
Abstract:
This paper describes the design and implementation of the Fully Immersive Team Training (FITT) research system. FITT was developed to support research on the use of distributed virtual environments (VEs) for team training. A generic search mission was created and modeled after decision-making and procedural tasks used by military and civilian small teams in conducting missions in emergency situations. The hardware and software functional requirements for the development of FITT were defined by the characteristics of the mission environment to be simulated, the team members' actions and interactions necessary to complete the mission, and instructional features and interventions relevant to training research. These requirements included locomotion, object manipulation and aiming, communication among participants, design of avatars for participants and computer-generated forces, data capture and playback, and a host of networking issues. A brief description of the first experiment conducted with FITT is presented as an example of how the system will be used in VE training research.
APA, Harvard, Vancouver, ISO, and other styles
50

Al-Mehdhara, Mohammed, and Na Ruan. "MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET." Wireless Communications and Mobile Computing 2021 (April 9, 2021): 1–17. http://dx.doi.org/10.1155/2021/8891758.

Full text
Abstract:
The wireless nature of the Vehicular Ad Hoc Network (VANET), a technology that offers facilities such as traffic management and safety services, makes it vulnerable to distributed denial-of-service (DDoS) attacks that exploit network communications and reduce network reliability and performance. This paper proposes a design of a secure VANET architecture using a Software-Defined Networking (SDN) controller and Neural Network Self-Organizing Maps (SOMs). In the proposed design, we adopt the SDN architecture by using its separation of the control plane from the data plane and adding intelligent capabilities to the VANET. To resolve the drawbacks of standard SOMs and to enhance the SOM’s efficiency, a Multilayer Distributed SOM (MSOM) model based on two levels of clustering and classification is used. Experimental results show that our solution can efficiently detect malicious traffic, prevent and mitigate DDoS attacks, and increase system security and recovery speed from the attacking traffic. Moreover, the proposed scheme achieves a high accuracy rate (99.67%). Simulation results demonstrate the effectiveness and efficiency of the MSOM regarding detection accuracy and other studied metrics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography