Journal articles on the topic 'Simple Object Access Protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 journal articles for your research on the topic 'Simple Object Access Protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access
APA, Harvard, Vancouver, ISO, and other styles
2

HONG, PENGYU, SHENG ZHONG, and WING H. WONG. "UBIC2 — TOWARDS UBIQUITOUS BIO-INFORMATION COMPUTING: DATA PROTOCOLS, MIDDLEWARE, AND WEB SERVICES FOR HETEROGENEOUS BIOLOGICAL INFORMATION INTEGRATION AND RETRIEVAL." International Journal of Software Engineering and Knowledge Engineering 15, no. 03 (June 2005): 475–85. http://dx.doi.org/10.1142/s0218194005001951.

Full text
Abstract:
The Ubiquitous Bio-Information Computing (UBIC2) project aims to disseminate protocols and software packages to facilitate the development of heterogeneous bio-information computing units that are interoperable and may run distributedly. UBIC2 specifies biological data in XML formats and queries data using XQuery. The UBIC2 programming library provides interfaces for integrating, retrieving, and manipulating heterogeneous biological data. Interoperability is achieved via Simple Object Access Protocol (SOAP) based web services. The documents and software packages of UBIC2 are available at .
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Musawi, Nawras A., and Dhiah Al-Shammary. "Static Hilbert convex set clustering for web services aggregation." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 1 (October 1, 2023): 372. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp372-380.

Full text
Abstract:
<span>Web services' high levels of duplicate textual structures have caused network bottlenecks and congestion. Clustering and then aggregating similar web services as one compressed message can potentially achieve network traffic reduction. In this paper, a static Hilbert clustering as new model for clustering web services based on convex set similarity is proposed. Mathematically, the proposed model calculates similarity among simple object access protocol (SOAP) messages and then cluster them based on higher similarity values. Next, each cluster is aggregated as a compact message. The
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Musawi, Nawras A., and Dhiah Al-Shammary. "Dynamic Hilbert clustering based on convex set for web services aggregation." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (December 1, 2023): 6654. http://dx.doi.org/10.11591/ijece.v13i6.pp6654-6662.

Full text
Abstract:
<div align=""><span lang="EN-US">In recent years, web services run by big corporations and different application-specific data centers have all been embraced by several companies worldwide. Web services provide several benefits when compared to other communication technologies. However, it still suffers from congestion and bottlenecks as well as a significant delay due to the tremendous load caused by a large number of web service requests from end users. Clustering and then aggregating similar web services as one compressed message can potentially achieve network traffic reduction
APA, Harvard, Vancouver, ISO, and other styles
5

Selvan, Satiaseelan, and Manmeet Mahinderjit Singh. "Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm." Computers 11, no. 2 (January 24, 2022): 16. http://dx.doi.org/10.3390/computers11020016.

Full text
Abstract:
The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. It has unsupported features such as low latency, location awareness, and geographic distribution that are important for a few IoT applications. Fog computing is integrated into IoT to aid these features to increase computing, storage, and networking resources to the network edge. Unfortunately, it is faced with numerous security and privacy risks, raising severe concerns among users. Therefore, this research proposes a contextual risk-based access
APA, Harvard, Vancouver, ISO, and other styles
6

Polgar, Jana. "Using WSRP 2.0 with JSR 168 and 286 Portlets." International Journal of Web Portals 2, no. 1 (January 2010): 45–57. http://dx.doi.org/10.4018/jwp.2010010105.

Full text
Abstract:
WSRP—Web Services for Remote Portlets—specification builds on current standard technologies, such as WSDL (Web Services Definition Language), UDDI (Universal Description, Discovery and Integration), and SOAP (Simple Object Access Protocol). It aims to sol
APA, Harvard, Vancouver, ISO, and other styles
7

Mitts, H�kan, and Harri Hans�n. "A simple and efficient routing protocol for the UMTSA Access network." Mobile Networks and Applications 1, no. 2 (June 1996): 167–81. http://dx.doi.org/10.1007/bf01193335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zientarski, Tomasz, Marek Miłosz, Marek Kamiński, and Maciej Kołodziej. "APPLICABILITY ANALYSIS OF REST AND SOAP WEB SERVICES." Informatics Control Measurement in Economy and Environment Protection 7, no. 4 (December 21, 2017): 28–31. http://dx.doi.org/10.5604/01.3001.0010.7249.

Full text
Abstract:
Web Services are common means to exchange data and information over the network. Web Services make themselves available over the Internet, where technology and platform are independent. These web services can be developed on the basis of two interaction styles such as Simple Object Access Protocol (SOAP) and Representational State Transfer Protocol (REST). In this study, a comparison of REST and SOAP web services is presented in terms of their applicability in diverse areas. It is concluded that in the past both technologies were equally popular, but during the rapid Internet development the R
APA, Harvard, Vancouver, ISO, and other styles
9

Ge, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 347-350 (August 2013): 2071–76. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2071.

Full text
Abstract:
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery pro
APA, Harvard, Vancouver, ISO, and other styles
10

Ge, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 380-384 (August 2013): 1327–32. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1327.

Full text
Abstract:
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery pro
APA, Harvard, Vancouver, ISO, and other styles
11

Datsenko, Serhii, and Heorhii Kuchuk. "BIOMETRIC AUTHENTICATION UTILIZING CONVOLUTIONAL NEURAL NETWORKS." Advanced Information Systems 7, no. 2 (June 12, 2023): 87–91. http://dx.doi.org/10.20998/2522-9052.2023.2.12.

Full text
Abstract:
Relevance. Cryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that implement various electronic trust services. Developing complete biometric cryptographic systems will allow using personal biometric data as a unique secret parameter instead of needing to remember cryptographic keys or using additional authentication devices. The object of research the process of generating cryptographic keys from biometric images
APA, Harvard, Vancouver, ISO, and other styles
12

Song, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.

Full text
Abstract:
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important inf
APA, Harvard, Vancouver, ISO, and other styles
13

Tan, Wenken, and Jianmin Hu. "Design of the Wireless Network Hierarchy System of Intelligent City Industrial Data Management Based on SDN Network Architecture." Security and Communication Networks 2021 (November 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5732300.

Full text
Abstract:
With the rapid development of the industrial Internet of Things and the comprehensive popularization of mobile intelligent devices, the construction of smart city and economic development of wireless network demand are increasingly high. SDN has the advantages of control separation, programmable interface, and centralized control logic. Therefore, integrating this technical concept into the smart city data management WLAN network not only can effectively solve the problems existing in the previous wireless network operation but also provide more functions according to different user needs. In
APA, Harvard, Vancouver, ISO, and other styles
14

Halili, Festim, and Erenis Ramadani. "Web Services: A Comparison of Soap and Rest Services." Modern Applied Science 12, no. 3 (February 28, 2018): 175. http://dx.doi.org/10.5539/mas.v12n3p175.

Full text
Abstract:
The interest on Web services has been growing rapidly in these couple of years since their start of use. A web service would be described as a method for exchanging/communicating information between devices over a network. Often, when deciding which service would fit on the architecture design to develop a product, then the question rises which service to use and when?SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) are the two most used protocols to exchange messages, so choosing one over the other has its own advantages and disadvantages. In this paper we have
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Xiao. "Intranet Web System, a Simple Solution to Companywide Information-on-demand." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 404–5. http://dx.doi.org/10.1017/s0424820100164489.

Full text
Abstract:
Intranet, a private corporate network that mirrors the internet Web structure, is the new internal communication technology being embraced by more than 50% of large US companies. Within the intranet, computers using Web-server software store and manage documents built on the Web’s hypertext markup language (HTML) format. This emerging technology allows disparate computer systems within companies to “speak” to one another using the Internet’s TCP/IP protocol. A “fire wall” allows internal users Internet access, but denies external intruders intranet access. As industrial microscopists, how can
APA, Harvard, Vancouver, ISO, and other styles
16

Lertsutthiwong, Monchai, Thinh Nguyen, and Alan Fern. "Scalable Video Streaming for Single-Hop Wireless Networks Using a Contention-Based Access MAC Protocol." Advances in Multimedia 2008 (2008): 1–21. http://dx.doi.org/10.1155/2008/928521.

Full text
Abstract:
Limited bandwidth and high packet loss rate pose a serious challenge for video streaming applications over wireless networks. Even when packet loss is not present, the bandwidth fluctuation, as a result of an arbitrary number of active flows in an IEEE 802.11 network, can significantly degrade the video quality. This paper aims to enhance the quality of video streaming applications in wireless home networks via a joint optimization of video layer-allocation technique, admission control algorithm, and medium access control (MAC) protocol. Using an Aloha-like MAC protocol, we propose a novel adm
APA, Harvard, Vancouver, ISO, and other styles
17

Chang, Chee Er, Azhar Kassim Mustapha, and Faisal Mohd-Yasin. "FPGA Prototyping of Web Service Using REST and SOAP Packages." Chips 1, no. 3 (December 5, 2022): 210–17. http://dx.doi.org/10.3390/chips1030014.

Full text
Abstract:
This Communication reports on FPGA prototyping of an embedded web service that sends XML messages under two different packages, namely Simple Object Access Protocol (SOAP) and Representational State Transfer (REST). The request and response messages are communicated through a 100 Mbps local area network between a Spartan-3E FPGA board and washing machine simulator. The performances of REST-based and SOAP-based web services implemented on reconfigurable hardware are then compared. In general, the former performs better than the latter in terms of FPGA resource utilization (~12% less), message l
APA, Harvard, Vancouver, ISO, and other styles
18

Comeau, Donald C., Chih-Hsuan Wei, Rezarta Islamaj Doğan, and Zhiyong Lu. "PMC text mining subset in BioC: about three million full-text articles and growing." Bioinformatics 35, no. 18 (January 31, 2019): 3533–35. http://dx.doi.org/10.1093/bioinformatics/btz070.

Full text
Abstract:
Abstract Motivation Interest in text mining full-text biomedical research articles is growing. To facilitate automated processing of nearly 3 million full-text articles (in PubMed Central® Open Access and Author Manuscript subsets) and to improve interoperability, we convert these articles to BioC, a community-driven simple data structure in either XML or JavaScript Object Notation format for conveniently sharing text and annotations. Results The resultant articles can be downloaded via both File Transfer Protocol for bulk access and a Web API for updates or a more focused collection. Since th
APA, Harvard, Vancouver, ISO, and other styles
19

Al-Dailami, Abdulrahman, Chang Ruan, Zhihong Bao, and Tao Zhang. "QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation." Security and Communication Networks 2019 (December 28, 2019): 1–16. http://dx.doi.org/10.1155/2019/3107543.

Full text
Abstract:
With the ever-increasing concern in network security and privacy, a major portion of Internet traffic is encrypted now. Recent research shows that more than 70% of Internet content is transmitted using HyperText Transfer Protocol Secure (HTTPS). However, HTTPS encryption eliminates the advantages of many intermediate services like the caching proxy, which can significantly degrade the performance of web content delivery. We argue that these restrictions lead to the need for other mechanisms to access sites quickly and safely. In this paper, we introduce QoS3, which is a protocol that can overc
APA, Harvard, Vancouver, ISO, and other styles
20

Zulkarnain, Hafid, Joseph Dedy Irawan, and Renaldi Primaswara Prasetya. "DESIGN OF A TRAFFIC RATE PRIORITY NETWORK CONNECTION MANAGEMENT SYSTEM ON A COMPUTER NETWORK." International Journal of Computer Science and Information Technology 1, no. 1 (January 18, 2024): 28–34. http://dx.doi.org/10.36040/ijcomit.v1i1.6720.

Full text
Abstract:
The practicum laboratory is one of the university facilities that accompany your studies, where students can practice their understanding of learning concepts through tests or practical exercises. In this sense the role of the laboratory is very important because the laboratory is a center for teaching and learning, where lectures are used for experiments, research or research. For this reason, in order to expedite the teaching and learning process, adequate facilities are needed in the laboratory, one of which is the Network. However, there are a number of problems that occur where when stude
APA, Harvard, Vancouver, ISO, and other styles
21

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Full text
Abstract:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as
APA, Harvard, Vancouver, ISO, and other styles
22

Cao, Jin, Hui Li, Maode Ma, and Fenghua Li. "UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/6854612.

Full text
Abstract:
Machine Type Communication (MTC), as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN) for massive MTC (mMTC) devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A) networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership
APA, Harvard, Vancouver, ISO, and other styles
23

Shukla, Samiksha, D. K. Mishra, and Kapil Tiwari. "Performance Enhancement of Soap Via Multi Level Caching." Mapana - Journal of Sciences 9, no. 2 (November 30, 2010): 47–52. http://dx.doi.org/10.12723/mjs.17.6.

Full text
Abstract:
Due to complex infrastructure of web application response time for different service request by client requires significantly larger time. Simple Object Access Protocol (SOAP) is a recent and emerging technology in the field of web services, which aims at replacing traditional methods of remote communications. Basic aim of designing SOAP was to increase interoperability among broad range of programs and environment, SOAP allows applications from different languages, installed on different platforms to communicate with each other over the network. Web services demand security, high performance
APA, Harvard, Vancouver, ISO, and other styles
24

Yulianto, Budi. "Analisis Korelasi Faktor Perilaku Konsumen terhadap Keputusan Penggunaan Teknologi Komunikasi Voip." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 236. http://dx.doi.org/10.21512/comtech.v5i1.2619.

Full text
Abstract:
The advancement of communication technology that is combined with computer and the Internet brings Internet Telephony or VoIP (Voice over Internet Protocol). Through VoIP technology, the cost of telecommunications in particular for international direct dialing (IDD) can be reduced. This research analyzes the growth rate of VoIP users, the correlation of the consumer behavior towards using VoIP, and cost comparisons of using telecommunication services between VoIP and other operators. This research is using descriptive analysis method to describe researched object through sampling data collecti
APA, Harvard, Vancouver, ISO, and other styles
25

Al-Mashadani, Abdulrahman Khalid Abdullah, and Muhammad Ilyas. "Distributed Denial of Service Attack Alleviated and Detected by Using Mininet and Software Defined Network." Webology 19, no. 1 (January 20, 2022): 4129–44. http://dx.doi.org/10.14704/web/v19i1/web19272.

Full text
Abstract:
The network security and how to keep it safe from malicious attacks now days is attract huge interest of the developers and cyber security experts (SDN) Software- Defined Network is simple framework for network that allow programmability and monitoring that enable the operators to manage the entire network in a consistent and comprehensive manner also used to detect and alleviate the DDoS attacks the SDN now is the trending of network security evolution there many threats that faces the networks one of them is the distributed Denial of Service (DDoS) because of the architecture weakness in tra
APA, Harvard, Vancouver, ISO, and other styles
26

Bartlett, H., and R. Wong. "Modelling and Simulation of the Operational and Information Processing Functions of a Computer-Integrated Manufacturing Cell." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 209, no. 4 (August 1995): 245–59. http://dx.doi.org/10.1243/pime_proc_1995_209_081_02.

Full text
Abstract:
This paper investigates the information processing function of a computer-integrated manufacturing (CIM) system, which is usually neglected by engineers when they study the performance of a manufacturing system. The feasibility of developing a complete simulation model which would include both the operational and information processing functions is therefore considered. In order to achieve this, a typical pick-and-place manufacturing cell was considered in which 46 devices were connected to a local area network (LAN). Two independent simulation tools, SIMAN* and L-NET†, were used in order to d
APA, Harvard, Vancouver, ISO, and other styles
27

Bujari, Armir, and Claudio Enrico Palazzi. "AirCache: A Crowd-Based Solution for Geoanchored Floating Data." Mobile Information Systems 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/3247903.

Full text
Abstract:
The Internet edge has evolved from a simple consumer of information and data to eager producer feeding sensed data at a societal scale. The crowdsensing paradigm is a representative example which has the potential to revolutionize the way we acquire and consume data. Indeed, especially in the era of smartphones, the geographical and temporalscopusof data is often local. For instance, users’ queries are more and more frequently about a nearby object, event, person, location, and so forth. These queries could certainly be processed and answered locally, without the need for contacting a remote s
APA, Harvard, Vancouver, ISO, and other styles
28

Djibo, Moumouni, Wend Yam Serge Boris Ouedraogo, Ali Doumounia, Serge Roland Sanou, Moumouni Sawadogo, Idrissa Guira, Nicolas Koné, Christian Chwala, Harald Kunstmann, and François Zougmoré. "Towards Innovative Solutions for Monitoring Precipitation in Poorly Instrumented Regions: Real-Time System for Collecting Power Levels of Microwave Links of Mobile Phone Operators for Rainfall Quantification in Burkina Faso." Applied System Innovation 6, no. 1 (December 27, 2022): 4. http://dx.doi.org/10.3390/asi6010004.

Full text
Abstract:
Since the 1990s, mobile telecommunication networks have gradually become denser around the world. Nowadays, large parts of their backhaul network consist of commercial microwave links (CMLs). Since CML signals are attenuated by rainfall, the exploitation of records of this attenuation is an innovative and an inexpensive solution for precipitation monitoring purposes. Performance data from mobile operators’ networks are crucial for the implementation of this technology. Therefore, a real-time system for collecting and storing CML power levels from the mobile phone operator “Telecel Faso” in Bur
APA, Harvard, Vancouver, ISO, and other styles
29

Rouissat, Mehdi, Mohammed Belkheir, Ibrahim S. Alsukayti, and Allel Mokaddem. "A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks." Applied Sciences 13, no. 18 (September 16, 2023): 10366. http://dx.doi.org/10.3390/app131810366.

Full text
Abstract:
Internet of Things (IoT) networks are being widely deployed for a broad range of critical applications. Without effective security support, such a trend would open the doors to notable security challenges. Due to their inherent constrained characteristics, IoT networks are highly vulnerable to the adverse impacts of a wide scope of IoT attacks. Among these, flooding attacks would cause great damage given the limited computational and energy capacity of IoT devices. However, IETF-standardized IoT routing protocols, such as the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL), have n
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Liujing, Jin Li, Wenyang Guan, and Xiaoqin Lian. "Optimization of User Service Rate with Image Compression in Edge Computing-Based Vehicular Networks." Mathematics 12, no. 4 (February 12, 2024): 558. http://dx.doi.org/10.3390/math12040558.

Full text
Abstract:
The prevalence of intelligent transportation systems in alleviating traffic congestion and reducing the number of traffic accidents has risen in recent years owing to the rapid advancement of information and communication technology (ICT). Nevertheless, the increase in Internet of Vehicles (IoV) users has led to massive data transmission, resulting in significant delays and network instability during vehicle operation due to limited bandwidth resources. This poses serious security risks to the traffic system and endangers the safety of IoV users. To alleviate the computational load on the core
APA, Harvard, Vancouver, ISO, and other styles
31

Khudair Madhloom, Jamal, Hussein Najm Abd Ali, Haifaa Ahmed Hasan, Oday Ali Hassen, and Saad Mohamed Darwish. "A Quantum-Inspired Ant Colony Optimization Approach for Exploring Routing Gateways in Mobile Ad Hoc Networks." Electronics 12, no. 5 (February 28, 2023): 1171. http://dx.doi.org/10.3390/electronics12051171.

Full text
Abstract:
Establishing internet access for mobile ad hoc networks (MANET) is a job that is both vital and complex. MANET is used to build a broad range of applications, both commercial and non-commercial, with the majority of these apps obtaining access to internet resources. Since the gateways (GWs) are the central nodes in a MANET’s ability to connect to the internet, it is common practice to deploy numerous GWs to increase the capabilities of a MANET. Current routing methods have been adapted and optimized for use with MANET through the use of both conventional routing techniques and tree-based netwo
APA, Harvard, Vancouver, ISO, and other styles
32

Bristola, Glenn Arwin M. "Integrating of voice recognition email application system for visually impaired person using linear regression algorithm." South Asian Journal of Engineering and Technology 12, no. 1 (March 31, 2022): 74–83. http://dx.doi.org/10.26524/sajet.2022.12.12.

Full text
Abstract:
The outcome of this study will surely help visually impaired people, who face difficulties in accessing the computer system. Voice recognition will help them to access e-mail. This study also reduces cognitive load taken by a visually impaired users to remember and type characters using keyboard. If this system is implemented, self-esteem and social and emotional well-being of the visually impaired users will be lifted up for they will now feel they are being valued in the society and has fair treatment and access in technologyThe main function of this study is to use a keyboard of the user th
APA, Harvard, Vancouver, ISO, and other styles
33

Bristol, Glenn Arwin M. "Integrating of Voice Recognition Email Application System for Visually Impaired Person using Linear Regression Algorithm." Proceedings of The International Halal Science and Technology Conference 14, no. 1 (March 10, 2022): 56–66. http://dx.doi.org/10.31098/ihsatec.v14i1.486.

Full text
Abstract:
The outcome of this study will surely help visually impaired people who face difficulties in accessing the computer system. Voice recognition will help them to access email. This study also reduces the cognitive load taken by visually impaired users to remember and type characters using a keyboard. If this system is implemented, self-esteem and social and emotional well-being of the visually impaired users will be lifted up for they will now feel they are being valued in society and has fair treatment and access to technology main function of this study is to use a keyboard of the user that wi
APA, Harvard, Vancouver, ISO, and other styles
34

Glenn Arwin M Bristola and Joevilzon C Calderon. "Integrating of voice recognition email application system for visually impaired person using linear regression algorithm." South Asian Journal of Engineering and Technology 12, no. 1 (March 31, 2022): 74–83. http://dx.doi.org/10.26524/sajet.2022.12.012.

Full text
Abstract:

 
 
 The outcome of this study will surely help visually impaired people, who face difficulties in accessing the computer system. Voice recognition will help them to access e-mail. This study also reduces cognitive load taken by a visually impaired users to remember and type characters using keyboard. If this system is implemented, self-esteem and social and emotional well-being of the visually impaired users will be lifted up for they will now feel they are being valued in the society and has fair treatment and access in technologyThe main function of this study is to use a ke
APA, Harvard, Vancouver, ISO, and other styles
35

Bezprozvannych, G. V., and O. A. Pushkar. "Ensuring standardized parameters for the transmission of digital signals by twisted pairs at the technological stage of manufacturing cables for industrial operating technologies." Electrical Engineering & Electromechanics, no. 4 (June 27, 2023): 57–64. http://dx.doi.org/10.20998/2074-272x.2023.4.09.

Full text
Abstract:
Introduction. In production control and control systems, buildings use many simple devices - sensors to detect light, heat, movement, smoke, humidity and pressure, mechanisms for activation and control of switches, closing devices, alarm, etc. - «operating technologies» (OT). Different communication protocols and field tire technologies, such as Modbus for conditioning systems, Bacnet for access control and Lonworks for lighting, have been traditionally used and used for their connection. Network fragmentation leads to the need to use gateways to transform protocols when creating a single auto
APA, Harvard, Vancouver, ISO, and other styles
36

Abraham, Ajith, Sung-Bae Cho, Thomas Hite, and Sang-Yong Han. "Special Issue on Web Services Practices." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 5 (September 20, 2006): 703–4. http://dx.doi.org/10.20965/jaciii.2006.p0703.

Full text
Abstract:
Web services – a new breed of self-contained, self-describing, modular applications published, located, and invoked across the Web – handle functions, from simple requests to complicated business processes. They are defined as network-based application components with a services-oriented architecture (SOA) using standard interface description languages and uniform communication protocols. SOA enables organizations to grasp and respond to changing trends and to adapt their business processes rapidly without major changes to the IT infrastructure. The Inaugural International Conference on Next-G
APA, Harvard, Vancouver, ISO, and other styles
37

Nayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.

Full text
Abstract:
Internet of Things (IoT) is regarded as a next-generation wave of Information Technology (IT) after the widespread emergence of the Internet and mobile communication technologies. IoT supports information exchange and networked interaction of appliances, vehicles and other objects, making sensing and actuation possible in a low-cost and smart manner.
 
 On the other hand, cyber-physical systems (CPS) are described as the engineered systems which are built upon the tight integration of the cyber entities (e.g., computation, communication, and control) and the physical things (natural
APA, Harvard, Vancouver, ISO, and other styles
38

Abisa, Michael. "Meaningful Use and Electronic Laboratory Reporting: Challenges Health Information Technology Vendors Face in Kentucky." Online Journal of Public Health Informatics 9, no. 3 (December 30, 2017). http://dx.doi.org/10.5210/ojphi.v9i3.7491.

Full text
Abstract:
Objectives: To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky.Methodology: A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to su
APA, Harvard, Vancouver, ISO, and other styles
39

"Safety Measures and Auto Detection against SQL Injection Attacks." International Journal of Recent Technology and Engineering 8, no. 4 (December 30, 2019): 2827–33. http://dx.doi.org/10.35940/ijeat.b3316.129219.

Full text
Abstract:
The SQL injection attack (SQLIA) occurred when the attacker integrating a code of a malicious SQL query into a valid query statement via a non-valid input. As a result the relational database management system will trigger these malicious query that cause to SQL injection attack. After successful execution, it may interrupts the CIA (confidentiality, integrity and availability) of web API. The vulnerability of Web Application Programming Interface (API) is the prior concern for any programming. The Web API is mainly based of Simple Object Access Protocol (SOAP) protocol which provide its own s
APA, Harvard, Vancouver, ISO, and other styles
40

Soni, Gulshan, and Kandasamy Selvaradjou. "Rational Allocation of Guaranteed Time Slots to support real-time traffic in Wireless Body Area Networks." International Journal of Sensors, Wireless Communications and Control 11 (March 8, 2021). http://dx.doi.org/10.2174/2210327911666210308155147.

Full text
Abstract:
Background: The main requirement of Wireless Body Area Network (WBAN) is on-time delivery of vital signs that are sensed through the delay-sensitive biological sensors that are implanted in the body of the patient being monitored to the central gateway. The Medium Access Control (MAC) protocol standard IEEE 802.15.4 supports real-time data delivery through its unique feature called Guaranteed Time Slot (GTS) under its beacon-enabled mode. This protocol is considered suitable for the WBAN Scenario. However, as per standard, IEEE 802.15.4 uses a simple and straightforward First Come First Served
APA, Harvard, Vancouver, ISO, and other styles
41

Vieira Junior, Ivanilson França, Jorge Granjal, and Marilia Curado. "RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments." Journal of Network and Systems Management 32, no. 1 (January 3, 2024). http://dx.doi.org/10.1007/s10922-023-09796-3.

Full text
Abstract:
AbstractTime-slotted Channel Hopping (TSCH) Media Access Control (MAC) was specified to target the Industrial Internet of Things needs. This MAC balances energy, bandwidth, and latency for deterministic communications in unreliable wireless environments. Building a distributed or autonomous TSCH schedule is arduous because the node negotiates cells with its neighbours based on queue occupancy, latency, and consumption metrics. The Minimal TSCH Configuration defined by RFC 8180 was specified for bootstrapping a 6TiSCH network and detailed configurations necessary to be supported. In particular,
APA, Harvard, Vancouver, ISO, and other styles
42

Peters, Andreas J., and Daniel C. van der Ster. "Evaluating CephFS Performance vs. Cost on High-Density Commodity Disk Servers." Computing and Software for Big Science 5, no. 1 (November 9, 2021). http://dx.doi.org/10.1007/s41781-021-00071-1.

Full text
Abstract:
AbstractCephFS is a network filesystem built upon the Reliable Autonomic Distributed Object Store (RADOS). At CERN we have demonstrated its reliability and elasticity while operating several 100-to-1000TB clusters which provide NFS-like storage to infrastructure applications and services. At the same time, our lab developed EOS to offer high performance 100PB-scale storage for the LHC at extremely low costs while also supporting the complete set of security and functional APIs required by the particle-physics user community. This work seeks to evaluate the performance of CephFS on this cost-op
APA, Harvard, Vancouver, ISO, and other styles
43

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:

 
 
 There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright –
APA, Harvard, Vancouver, ISO, and other styles
44

Mackenzie, Adrian. "Making Data Flow." M/C Journal 5, no. 4 (August 1, 2002). http://dx.doi.org/10.5204/mcj.1975.

Full text
Abstract:
Why has software code become an object of intense interest in several different domains of cultural life? In art (.net art or software art), in Open source software (Linux, Perl, Apache, et cetera (Moody; Himanen)), in tactical media actions (hacking of WEF Melbourne and Nike websites), and more generally, in the significance attributed to coding as work at the pinnacle of contemporary production of information (Negri and Hardt 298), code itself has somehow recently become significant, at least for some subcultures. Why has that happened? At one level, we could say that this happened because i
APA, Harvard, Vancouver, ISO, and other styles
45

Hinner, Kajetan. "Statistics of Major IRC Networks." M/C Journal 3, no. 4 (August 1, 2000). http://dx.doi.org/10.5204/mcj.1867.

Full text
Abstract:
Internet Relay Chat (IRC) is a text-based computer-mediated communication (CMC) service in which people can meet and chat in real time. Most chat occurs in channels named for a specific topic, such as #usa or #linux. A user can take part in several channels when connected to an IRC network. For a long time the only major IRC network available was EFnet, founded in 1990. Over the 1990s three other major IRC networks developed, Undernet (1993), DALnet (1994) and IRCnet (which split from EFnet in June 1996). Several causes led to the separate development of IRC networks: fast growth of user numbe
APA, Harvard, Vancouver, ISO, and other styles
46

Deck, Andy. "Treadmill Culture." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2157.

Full text
Abstract:
Since the first days of the World Wide Web, artists like myself have been exploring the new possibilities of network interactivity. Some good tools and languages have been developed and made available free for the public to use. This has empowered individuals to participate in the media in ways that are quite remarkable. Nonetheless, the future of independent media is clouded by legal, regulatory, and organisational challenges that need to be addressed. It is not clear to what extent independent content producers will be able to build upon the successes of the 90s – it is yet to be seen whethe
APA, Harvard, Vancouver, ISO, and other styles
47

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text
Abstract:
Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile ph
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!