To see the other types of publications on this topic, follow the link: Static IP.

Journal articles on the topic 'Static IP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Static IP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lu, Wencheng, and Sartaj Sahni. "Recursively Partitioned Static IP Router Tables." IEEE Transactions on Computers 59, no. 12 (2010): 1683–90. http://dx.doi.org/10.1109/tc.2010.137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Juwanda, Natali, Fajrillah, and Diansyah T.M. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (2016): 51–58. https://doi.org/10.5281/zenodo.574449.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
3

Aslam, J. M., and K. M. Kumar. "Enhancing security of cloud using static IP techniques." Scientific Temper 15, no. 01 (2024): 1790–98. http://dx.doi.org/10.58414/scientifictemper.2024.15.1.30.

Full text
Abstract:
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Xinyan, Zhengyu Zhang, Xiaoli Chen, Jing Li, and Junfang Xian. "Value of magnetic resonance imaging including dynamic contrast-enhanced magnetic resonance imaging in differentiation between inverted papilloma and malignant tumors in the nasal cavity." Chinese Medical Journal 127, no. 9 (2014): 1696–701. http://dx.doi.org/10.3760/cma.j.issn.0366-6999.20132409.

Full text
Abstract:
Background Distinguishing inverted papilloma (IP) from malignant tumors in the nasal cavity is difficult in a substantial number of cases, thus hindering the administration of appropriate therapeutic strategies. This study aimed to evaluate whether magnetic resonance imaging (MRI), including dynamic contrast enhanced MRI (DCE-MRI), could improve differentiation between IP and malignant tumors, and to identify which MRI features were the best in discriminating IP from malignant tumors in the nasal cavity. Methods Non-enhanced, static, and dynamic contrast enhanced MRI was performed in 88 patients with an IP or a malignant tumor in the nasal cavity that had been confirmed by histological results. MRI features of IP and malignant tumors including side, margin, T1 signal intensity, T1 homogeneity, T2 signal intensity, T2 homogeneity, lobulation signs, convoluted cerebriform pattern, extra-sinonasal involvement, pattern of enhancement, Tpeak, Tmax, CImax, and TIC type were evaluated and correlated with histological findings. Results There were significant differences between IP and malignant tumors in T2 homogeneity, lobulation signs, convoluted cerebriform pattern, extra-sinonasal involvement, Tpeak, Tmax and TIC types. A convoluted cerebriform pattern had a higher sensitivity and specificity in diagnosis of IP while washout-type TIC had a higher sensitivity and specificity in diagnosis of malignant tumors in the nasal cavity. Non-enhanced combined with static and dynamic enhancement MRI was significantly superior to non-enhanced combined with static enhancement MRI in the differentiation of IP and malignant tumors in the nasal cavity. Multivariate logistic regression analysis identified that the best MRI features were a convoluted cerebriform pattern, extra-sinonasal involvement, and washout-type TIC for both observers (Wang XY and Zhang ZY). Conclusion Non-enhanced and static combined with dynamic contrast-enhanced MRI improves differentiation of IP and malignant tumors in the nasal cavity.
APA, Harvard, Vancouver, ISO, and other styles
5

Natali, Juwanda, Fajrillah Fajrillah, and T. M. Diansyah. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (2016): 51–58. http://dx.doi.org/10.35316/jimi.v1i1.444.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
6

Wintolo, Hero, Salam Aryanto, and Muhamad Hafish. "Analisis Pengaruh Konfigurasi Network Address Translator (NAT) Statik Berbasis Web Menggunakan Wire Shark." Jurnal Informatika 8, no. 1 (2021): 93–98. http://dx.doi.org/10.31294/ji.v8i1.10166.

Full text
Abstract:
Konfigurasi peralatan jaringan computer yang digunakan untuk mengelola sebuah jaringan computer banyak yang menggunakan command line atau berbasis teks meski ada beberapa merk dari peralatan jaringan computer sudah menawarkan perangkat lunak untuk konfigurasi yang berbasis Graphical User Interface(GUI) dengan fungsi yang terbatas. Hal ini menjadi inspirasi untuk membuat perangkat lunak berbasis web untuk fungsi konfigurasi NAT statik dan dinamik. Hasil perancangan perangkat lunak diujikan dalam Local Area Network(LAN) dan jaringan internet untuk layanan server. Perangkat lunak yang dibuat pada peneltian ini terbukti dapat bekerja untuk pembuatan NAT statik dan dinamik melalui perangkat lunak wireshark yang memperlihatkan proses penyalinan alamat IP source menjadi alamat IP router yang ada NAT statik dan dinamik sehingga dapat mengakses web server yang ada. Sebanyak 30 komputer dalam LAN dan computer dari jaringan internet 100% dapat mengkases web server melalui NAT static yang dikonfigurasi menggunakan keyboard dan mouse.
APA, Harvard, Vancouver, ISO, and other styles
7

Groebbens, Adelbert, Didier Colle, Sophie De Maesschalck, et al. "Logical topology design for IP rerouting: ASONs versus static OTNs." Photonic Network Communications 21, no. 2 (2010): 170–91. http://dx.doi.org/10.1007/s11107-010-0291-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammad Rifqi Maulana and Abdul Kholiq. "ANALISIS DAN IMPLEMENTASI KEAMANAN JARINGAN MIKROTIK DENGAN METODE IP FILTERING DAN PORT KNOCKIING ( STUDI KASUS BAROKAH.NET )." JURNAL LIMITS 19, no. 02 (2023): 71–80. http://dx.doi.org/10.59134/jlmt.v19i02.199.

Full text
Abstract:
Keamanan jaringan pada server sangat penting, karena server adalah titik utama dalam penyaluran jaringan internet, jika keamanan jaringan lemah maka orang yang tidak berkepentingan dapat dengan mudah melakukan serangan terhadap server, baik untuk mendapatkan internet secara gratis atau merubah sistem pada server. Di Barokah.net sistem keamanan yang digunakan hanya pada login ke akses server dan menggunakan IP Static untuk identitas pada modem client, seiring berjalannya waktu di temukan ip address illegal yang muncul pada daftar IP ARP Mikrotik dan penyerangan menggunakan Brute Force yang terdeteksi pada Log sistem Mikrotik. Berfokus pada masalah tersebut penggunaan metode IP Filtering dan Port Knocking pada server utama merupakan cara yang tepat untuk meningkatkan sistem keamanan jaringan, dimana IP Filtering dan Port Knocking akan memberikan sebuah daftardan autentikasi khusus agar perangkat yang ingin mendapatkan akses ke server dapat di perbolehkan oleh server. Sehingga metode IP Filtering dan Port Knocking dapat meningkatkan keamanan jaringan pada Barokah.net.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Runhua, Jyh‐An Lee, and Jingwen Liu. "Unwinding NFTs in the shadow of IP law." American Business Law Journal 61, no. 1 (2024): 31–55. http://dx.doi.org/10.1111/ablj.12237.

Full text
Abstract:
AbstractAmid the surge of intellectual property (IP) disputes surrounding non‐fungible tokens (NFTs), some scholars have advocated for the application of personal property or sales law to regulate NFT minting and transactions, contending that IP laws unduly hinder the development of the NFT market. This Article counters these proposals and argues that the existing IP system stands as the most suitable regulatory framework for governing the evolving NFT market. Compared to personal property or sales law, IP laws can more effectively address challenges such as tragedies of the commons and anticommons in the NFT market. NFT communities have also developed their own norms and licensing agreements upon existing IP laws to regulate shared resources. Moreover, the IP regimes, with both static and dynamic institutional designs, can effectively balance various policy concerns, such as innovation, fair competition, and consumer protection, which alternative proposals struggle to provide.
APA, Harvard, Vancouver, ISO, and other styles
10

Miyazawa, S., and F. Nakamura. "New cycloconvertor with static induction transistors." IEE Proceedings B Electric Power Applications 136, no. 6 (1989): 293. http://dx.doi.org/10.1049/ip-b.1989.0038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Alves, A. B., and A. Monticelli. "Static security analysis using pipeline decomposition." IEE Proceedings - Generation, Transmission and Distribution 145, no. 2 (1998): 105. http://dx.doi.org/10.1049/ip-gtd:19981785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Lei, and Zhi Yong Hao. "Model Analysis and Optimization Design for Mg-Based Instrument Panel Beam Assembly." Advanced Materials Research 681 (April 2013): 204–8. http://dx.doi.org/10.4028/www.scientific.net/amr.681.204.

Full text
Abstract:
Based on the basic structure in the practical installation condition, the static model of the instrument panel (IP) beam assembly is developed. To reduce the weight, Mg is substituted for steel as the material of the structure. The finite element software is used to evaluate the constraint modal performance, rigidness and strength withstanding the specific load. After the comparison of model analysis with different materials, the Mg-based IP beam assembly is optimized to achieve the performance the steel-based one has. The process offers the reference to the lightweight design of Mg-based IP beam assembly.
APA, Harvard, Vancouver, ISO, and other styles
13

Lai, Wuwen, Longfei Wang, Xingwei Wang, and Min Huang. "A Static Traffic Grooming Scheme for IP over WDM Optical Internet." Journal of Algorithms & Computational Technology 8, no. 2 (2014): 203–17. http://dx.doi.org/10.1260/1748-3018.8.2.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wendra, Wendra, and Fadhliah M. Alhadar. "The Influence of Knowledge Management Processes on Intellectual Capital and Innovation Performance." 11th GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES 11, no. 1 (2020): 6. http://dx.doi.org/10.35609/gcbssproceeding.2020.11(6).

Full text
Abstract:
The organisational ability to utilise its knowledge is inseparably linked to its innovation performance. Knowledge is characterized as valuable, rare, inimitable and non-substitutable (VRIN) resources. Those characteristics are key resources to achieve organisational performance (Ferreira & Hamilton, 2010; Wang, 2014; Hussinki, Ritala, Vanhala, and Kianto, 2017). Within literature, there are two streams of academics discussion relating to knowledge in organisation. Those are intellectual capital (IC) literature, and knowledge management (KM) literature (Ramadan, Dahiyat, Bontis, & Al-dalahmeh, 2017; Kianto, Ritala, Spender, & Vanhala, 2014). The first stream considers IC as static resources or materials for organisational value creation. While the later sees KM as processes to create organisational value. Even though many studies have considers the important role of IC and KM Processes (KMPs) in creating values, however there are only limited studies examine IC and KMPs interaction to support innovation performance (IP) (Hsu & Sabherwal, 2012; Cabrilo and Dahms, 2018). Most of the existing studies have contented themselves with assessing IC or KM value level, and then correlating those two to IP. There are far less studies examining to what extent KMPs are consciously implemented within organisations, and furthermore, how the implementation of KMPs impacts the quality of IC leading to the success of IP. To bridge these gaps in the existing knowledge, the current paper examines how KMPs impacts on organisational IC and IP. This study suggested that IC as static resources could be examined as a mediation of KMPs influence on IP. The idea is that KMPs have the abilities to renew IC, leading to support organisational IP. Accordingly, the rationale for this study is to develop a conceptual model of KMPs-IC-IP causal relationship, and provide empirical evidence on the model. This study is expected to contribute to a broader knowledge of the extent IC that can mediate KMPs and IP relationship. Keywords: Knowledge Management Process, Intellectual Capital, Innovation Performance
APA, Harvard, Vancouver, ISO, and other styles
15

Yuan, S. Y., K. H. Chen, J. Y. Jou, and S. Y. Kuo. "Static power analysis for power-driven synthesis." IEE Proceedings - Computers and Digital Techniques 145, no. 2 (1998): 89. http://dx.doi.org/10.1049/ip-cdt:19981909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

O'Brien, M., and G. Ledwich. "Placement of static compensators for stability improvement." IEE Proceedings C Generation, Transmission and Distribution 132, no. 1 (1985): 30. http://dx.doi.org/10.1049/ip-c.1985.0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ho, P. T., and S. K. Tso. "Software control of static reactive current compensators." IEE Proceedings C Generation, Transmission and Distribution 135, no. 6 (1988): 518. http://dx.doi.org/10.1049/ip-c.1988.0068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shahnawaz Ahmed, S., and A. Brameller. "New algorithm for diakoptical static state estimation." IEE Proceedings C Generation, Transmission and Distribution 138, no. 3 (1991): 185. http://dx.doi.org/10.1049/ip-c.1991.0021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Boers, Y. "Average performance control by static output feedback." IEE Proceedings - Control Theory and Applications 149, no. 3 (2002): 188–92. http://dx.doi.org/10.1049/ip-cta:20020234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Blajszczak, G. "Static VAr compensator with fully controlled reactors." IEE Proceedings - Electric Power Applications 141, no. 5 (1994): 264. http://dx.doi.org/10.1049/ip-epa:19941348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Trainer, D. R. "Analysis of GTO-based static VAr compensators." IEE Proceedings - Electric Power Applications 141, no. 6 (1994): 293. http://dx.doi.org/10.1049/ip-epa:19941353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ji, Yanchao, Yongxuan Hu, and Zhuo Liu. "Novel four-bridge PWM static VAr compensator." IEE Proceedings - Electric Power Applications 144, no. 4 (1997): 249. http://dx.doi.org/10.1049/ip-epa:19971059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Müller, V., and D. Nelles. "Artificial neural networks as static equivalent networks." IEE Proceedings - Generation, Transmission and Distribution 152, no. 1 (2005): 61. http://dx.doi.org/10.1049/ip-gtd:20040827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Levy, D., and E. McQuade. "Analysis and synthesis of static power convertors." IEE Proceedings G (Electronic Circuits and Systems) 133, no. 1 (1986): 39. http://dx.doi.org/10.1049/ip-g-1.1986.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
26

Tömösközi, Máté, Patrick Seeling, Péter Ekler, and Frank Fitzek. "Performance evaluation and implementation of IP and robust header compression schemes for TCP and UDP traffic in static and dynamic wireless contexts." Computer Science and Information Systems 14, no. 2 (2017): 283–308. http://dx.doi.org/10.2298/csis151101006t.

Full text
Abstract:
Modern cellular networks utilising the long?term evolution (LTE) set of standards face an ever?increasing demand for mobile data from connected devices. Header compression is commonly employed to minimise the overhead for IP?based cellular network traffic. In this paper, we evaluate the three header compression implementations used by these networks with respect to their potential throughput increase and complexity for different mobile service scenarios over wireless IP networks. Specifically, we consider header compression as defined by (i) IP Header Compression (RFC 2507), (ii) Robust Header Compression version 1 (RFC 3095), and (iii) the recently updated Robust Header Compression version 2 (RFC 5225) with TCP/IP profile (RFC 6846). The contribution of this article is the performance evaluation of IP Header Compression (IPHC) for UDP and TCP, as well as its evaluation in contrast to the Robust Header Compression (RoHC) methods in a comparative overview for real?world mobile scenarios. Our results show that all implementations have great potential for saving bandwidth in IP?based wireless networks, even under varying channel conditions. While both RoHC versions generally provide more reliable results than IPHC, we find that on a unidirectional channel IPHC could perform better. However, if a TCP connection is prone to packet reordering (e.g., by retransmissions), IPHC?s performance drops drastically, while RoHC?s does not exhibit any significant performance reduction.
APA, Harvard, Vancouver, ISO, and other styles
27

Hyder, M. F., Waseemullah, M. U. Farooq, U. Ahmed, and W. Raza. "Towards Enhancing the Endpoint Security using Moving Target Defense (Shuffle-based Approach) in Software Defined Networking." Engineering, Technology & Applied Science Research 11, no. 4 (2021): 7483–88. http://dx.doi.org/10.48084/etasr.4316.

Full text
Abstract:
Static IP addresses make the network vulnerable to different attacks and once the machines are compromised, any sensitive information within the network can be spoofed. Moving Target Defense (MTD) provides an efficient mechanism for proactive security by constantly changing different system attributes. Software Defined Networks (SDNs) provide greater flexibility in designing security solutions due to their centralized management and programming capabilities. In this paper, a mechanism for the protection of endpoint security is developed using IP address host shuffling. In the proposed approach, the real IP address of the host is masked and a virtual IP address is assigned. The virtual IPs are mined from the pool of unassigned IP addresses. The address pool is created using a pseudo-random number generator to guarantee high randomness. This approach helps in invalidating the intelligence gathered by the adversaries through the changes in the network configuration that will disturb attack execution, eventually leading to attack failure. Transparency is attained via preserving the actual IP intact and mapping a virtual IP to it. The proposed solution is implemented using the RYU Controller and Mininet. The efficient results obtained from the experiments substantiate the effectiveness of the MTD approach for enhancing endpoint security.
APA, Harvard, Vancouver, ISO, and other styles
28

Agnestisya, Wury. "Analisis Perbandingan Kinerja Routing Statis dan Dinamis dengan Teknik RIP Pada Topologi Ring Dalam Jaringan LAN." Digital Transformation Technology 2, no. 2 (2022): 31–34. http://dx.doi.org/10.47709/digitech.v2i2.1801.

Full text
Abstract:
Aktivitas masyarakat tidak terlepas dari peran teknologi. Internet selalu berkembang dan sudah dapat diakses oleh seluruh orang, hampir seluruh pekerjaan menggunakan internet untuk mengakses apapun. Dengan internet kita dapat saling terhubung antar perangkat dan bisa mengakses secara luas, seperti antar gedung yang saling terhubung dengan pembagian ip dalam sebuah jaringan.Terdapat dua teknik peroutingan yang akan dibandingkan, yaitu secara statis dan dinamis dengan teknik RIP (Routing Information Protocol) dan menggunakan topologi ring untuk pertukaran data nya. Kedua routing akan dibandingkan untuk mengetahui troughput, delay, dan packet loss dengan keadaan sibuk dan tidak sibuk, tujuannya adalah ntuk mengetahui kinerja routing statis dan dinamis dengan teknik RIP (Routing Information Protocol). FTP (File Transfer Protocol) bisa digunakan untuk mengunduh atau mengunggah file dari pc ke server, mempunyai besaran sendiri dan bisa digunakan unuk mengakses troughput. Untuk mendapatkan hasil FTP bisa melalui traffic generator pada comand prompt. Hasil yang diperoleh untuk delay pada kedua routing bagus, karena rerata <150 ms. Routing static pada traffic tidak sibuk lebih rendah nilai delay, sedangkan pada routing static lebih rendah nilai delay pada traffic sibuk. Pada traffic sibuk dalam pada kedua router tidak memiliki nilai packetloss, sedangkan pada traffic tidak sibuk, routing dynamic dengan teknik rip mempunyai nilai packetloss lebih rendah dibanding routing static. Nilai throughput pada traffic tidak sibuk routing dynamic dengan teknik RIP lebih tinggi dibanding dengan routing static, sedangkan routing static mempunyai rerata nilai throughput pada traffic sibuk lebih tinggi dibanding routing rip
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Yong Qiang, Wei Dong Wu, and Wan Zhen Zhou. "Design and Implementation of Electrostatic Parameters Network Monitoring System." Applied Mechanics and Materials 494-495 (February 2014): 857–60. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.857.

Full text
Abstract:
This paper presents an electrostatic parameters network monitoring system, which has achieved three types of devices, those are static dynamic potential test unit, non-contract electrostatic potential test unit and body static parameter test unit. In these three devices embedded microcontroller system, by deploying streamlined TCP/IP protocol stack to encode and transmit the data, and the PC receives data for display and then stores in the database.
APA, Harvard, Vancouver, ISO, and other styles
30

Ruiz, G. A. "New static multi-output carry lookahead CMOS adders." IEE Proceedings - Circuits, Devices and Systems 144, no. 6 (1997): 350. http://dx.doi.org/10.1049/ip-cds:19971445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Koumboulis, F. N., and M. G. Skarpetis. "Static controllers for magnetic suspension and balance systems." IEE Proceedings - Control Theory and Applications 143, no. 4 (1996): 338–48. http://dx.doi.org/10.1049/ip-cta:19960301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Vournas, C. D., and N. D. Krassas. "Voltage stability as affected by static load characteristics." IEE Proceedings C Generation, Transmission and Distribution 140, no. 3 (1993): 221. http://dx.doi.org/10.1049/ip-c.1993.0033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rahim, A. H. M. A., S. A. Al-Baiyat, and H. M. Al-Maghrabi. "Robust damping controller design for a static compensator." IEE Proceedings - Generation, Transmission and Distribution 149, no. 4 (2002): 491. http://dx.doi.org/10.1049/ip-gtd:20020344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ekanayake, J. B. "Experimental investigation of an advanced static VAr compensator." IEE Proceedings - Generation, Transmission and Distribution 142, no. 2 (1995): 202. http://dx.doi.org/10.1049/ip-gtd:19951710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Parniani, M., and M. R. Iravani. "Optimal robust control design of static VAR compensators." IEE Proceedings - Generation, Transmission and Distribution 145, no. 3 (1998): 301. http://dx.doi.org/10.1049/ip-gtd:19981885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Belliveau, Patrick, and Eldad Haber. "Coupled simulation of electromagnetic induction and induced polarization effects using stretched exponential relaxation." GEOPHYSICS 83, no. 2 (2018): WB109—WB121. http://dx.doi.org/10.1190/geo2017-0494.1.

Full text
Abstract:
We have developed a new algorithm for 3D time-domain electromagnetic (EM) modeling, taking full account of induced polarization (IP) and the coupling between EM and IP effects. The algorithm can be used to model grounded source IP surveys that indicate EM induction effects and airborne time-domain EM surveys that exhibit IP effects. IP effects are most often approximated as static or modeled in the frequency domain, using frequency-dependent electrical conductivity. It is difficult to translate the frequency-dependent conductivity approach directly to the time domain in a computationally efficient manner. We take an alternative approach in which we model IP relaxations in time using the stretched exponential (SE) function. We incorporate this IP model into a direct time-stepping discretization of the quasistatic time-domain Maxwell equations. We found that modeling of IP effects with this SE approach is asymptotically equivalent to the commonly used Cole-Cole model of IP transformed to the time domain. We have implemented our algorithm using efficient numerical methods that allow it to tackle large-scale problems and are amenable to use in inversion. In particular, we have developed a parallel time-stepping technique that allows us to compute transient electric fields at multiple time steps simultaneously. We demonstrate the behavior of the SE model of IP decay and the efficiency of our algorithm by applying it to synthetic numerical examples that simulate a grounded source IP survey with significant EM effects and a concentric-loop airborne EM sounding over a chargeable body.
APA, Harvard, Vancouver, ISO, and other styles
37

Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.

Full text
Abstract:
Even today, internet users’ data security remains a significant concern. One problem is ARP poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the identified ARP protocol vulnerability. Despite no straightforward remedy for ARP spoofing being apparent, certain actions may be taken to maintain one’s safety. The most basic and common defence against a poisoning attack is manually adding MAC and IP addresses to the static ARP cache table. However, this solution is ineffective for large networks where static entries require considerable time and effort to maintain, whether by human input or via special tools and settings for the static entries of network devices. Accordingly, this paper aimed to monitor network packet information and detect the behaviour of ARP poison attacks on operating systems, for instance Windows and Linux. The discovery and defence policy systematically and periodically check the MAC addresses in the ARP table, enabling alerts to be issued if a duplicate entry is detected. This enables the poison-IP address to be blocked before a reply is sent. Finally, the results showed that the superiority was successfully achieved in the detection, prevention and reporting mechanisms in the real-world environment.
APA, Harvard, Vancouver, ISO, and other styles
38

Vishnevsky, A., and A. Lapovok. "Conservative methods in boundary-element calculations of static fields." IEE Proceedings - Science, Measurement and Technology 142, no. 2 (1995): 151–56. http://dx.doi.org/10.1049/ip-smt:19951495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ormondroyd, R. F., P. N. Pennington, and M. C. Perkins. "Nonlinear static characteristics of monolithic active integrated-optic waveguides." IEE Proceedings J Optoelectronics 136, no. 1 (1989): 59. http://dx.doi.org/10.1049/ip-j.1989.0013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Nishizawa, J., P. Płotka, and T. Kurabayashi. "Light emission from tunnelling mode GaAs static induction transistor." IEE Proceedings - Circuits, Devices and Systems 146, no. 1 (1999): 27. http://dx.doi.org/10.1049/ip-cds:19990274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mahony, J. D. "Static fringing capacitance of a dielectric loaded coaxial termination." IEE Proceedings A Physical Science, Measurement and Instrumentation, Management and Education, Reviews 135, no. 7 (1988): 448. http://dx.doi.org/10.1049/ip-a-1.1988.0070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

O'Brien, M., and G. Ledwich. "Static reactive-power compensator controls for improved system stability." IEE Proceedings C Generation, Transmission and Distribution 134, no. 1 (1987): 38. http://dx.doi.org/10.1049/ip-c.1987.0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Schauder, C., and H. Mehta. "Vector analysis and control of advanced static VAR compensators." IEE Proceedings C Generation, Transmission and Distribution 140, no. 4 (1993): 299. http://dx.doi.org/10.1049/ip-c.1993.0044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lee, S., and C. C. Liu. "Damping torsional oscillations using a SIMO static VAR controller." IEE Proceedings C Generation, Transmission and Distribution 140, no. 6 (1993): 462. http://dx.doi.org/10.1049/ip-c.1993.0067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Pratama, Hedy, and Nila Feby Puspitasari. "Penerapan Protokol L2TP/IPSec dan Port Forwarding untuk Remote Mikrotik pada Jaringan Dynamic IP." Creative Information Technology Journal 7, no. 1 (2021): 51. http://dx.doi.org/10.24076/citec.2020v7i1.253.

Full text
Abstract:
Salah satu cara yang dilakukan untuk menjaga dan meningkatkan kualitas layanan yang diberikan oleh suatu Perusahaan XYZ, seorang administrator setiap saat memonitoring lalu lintas data dengan mengakses router dan access point untuk mengetahui kondisi jaringan. Hal tersebut hanya dapat dilakukan Administrator ketika sedang berada dalam jaringan lokal. Permasalahannya, ketika Administrator berada pada jaringan publik, maka tidak dapat mengakses router dan perangkat access point yang ada. Hal ini dikarenakan IP publik yang didapatkan dari Provider utama bersifat Dynamic IP Public. Untuk mengatasi masalah tersebut dilakukan penelitian melalui metode NDLC dengan penggabungan sistem protokol VPN L2TP/IPSec dan port forwarding yang ada di mikrotik VPS. VPN L2TP/IPSec yang dapat membantu menghubungkan dua router yang berbeda dalam satu jaringan private yang aman dan memungkingkan data terenkripsi dengan aman. Penggunaan VPS untuk mendapatkan Static Public IP sehingga dapat di port forward untuk membuka akses terhadap perangkat pada jaringan lokal agar dapat diakses melalui jaringan publik melalui remote address VPN. Hasil pengujian penggabungan VPN L2TP/IPSec dan port forwarding dapat digunakan Administrator dari jaringan publik untuk melakukan remote router mikrotik dan wireless access point pada jaringan Dynamic IP Public. Sehingga memudahkan Administrator dalam memonitoring jaringan secara realtime meningkatkan kualitas layanan internet.Kata Kunci—VPN, L2TP/IP Sec, Port Forwarding, Dynamic IPAbstractOne way that is done to maintain and improve the quality of services provided by XYZ Company, is that an administrator will monitor data traffic by accessing routers and access points to find out network conditions at any time. This can only be done by the Administrator while on the local network. The problem is that when an Administrator is on a public network, it cannot access the existing routers and access point devices. This is because the public IP obtained from the main Provider is Dynamic Public IP. To overcome this problem, research was carried out through the NDLC method by combining the L2TP / IPSec VPN protocol system and the port forwarding in the VPS proxy. The L2TP / IPSec VPN helps to connect two different routers in a secure private network and allows encrypted data to be safe during the communication process between routers. The use of VPS is to get a Static Public IP so that it can be ported forward to open access to devices on the local network so that it can be accessed through a public network via a VPN remote address. The results of testing the merging of VPN L2TP / IPSec and port forwarding, an Administrator from a public network can use a remote router and a wireless access point on a Dynamic IP Public network. Making it easy for Administrators to monitor networks in realtime and improve the quality of internet services.Keywords—3-5 VPN, L2TP/IP Sec, Port Forwarding, Dynamic IP
APA, Harvard, Vancouver, ISO, and other styles
46

Damjan, Matija. "The Protection of Privacy of the IP Address in Slovenia." Law, Identity and Values 2, no. 2 (2022): 25–43. http://dx.doi.org/10.55073/2022.2.25-43.

Full text
Abstract:
The protection of communication privacy covers not only the content of the conversation, but also other information related to the communication (metadata). The most prominent type of metadata in online communication is IP address, which defines the location of a computer or other connected device in the network. As a purely technical information, an IP address does not refer directly to any individual and is not in itself personal information. Yet, it can also be used to identify individuals online, track their location and online activity. An IP address is never strictly private, since any internet user’s IP address is visible to other participants in regular online interactions, which differentiates it from typical private information. The paper examines the conditions, developed in case law of the European Court of Human Rights and Court of Justice of the European Union as well as the Slovenian courts, under which an IP address can be considered personal data and when it is protected as a part of one’s communication privacy. The paper then focuses on the issue of whether an individual should be considered to have waived the privacy protection of their IP address if they have taken no measures to hide it. The relevance of the distinction between static and dynamic IP addresses from the perspective of privacy protection is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Xiao Jun, and Shu Dong Sun. "The Remote Technology Support for Motion Controller Based on the Ethernet." Advanced Materials Research 129-131 (August 2010): 789–93. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.789.

Full text
Abstract:
Many enterprises design their device with motion controller as one parts of whole equipment. On the Internet, if the engineer wants to do a remote technology support to a particular motion controller, the latter need to have an Internet IP address which can be accessed. Fixed (static) IP address with limited resources, the user must pay high cost. This paper presents VPN technique to remote technology support for Siemens SIMOTION motion controller. A detailed analysis of the application effect is shown. The result shows the feasibility of remote technology support to motion controller using VPN technology.
APA, Harvard, Vancouver, ISO, and other styles
48

B. Escabal, Ingrid, Edzel G. Raffiñan, and Jefferson A. Hora. "Development of Framer/Deframer for 5Gbps JESD204B Soft IP." International Journal of Engineering & Technology 7, no. 2.11 (2018): 21. http://dx.doi.org/10.14419/ijet.v7i2.11.11000.

Full text
Abstract:
This paper aimed to modify and redesign theJESD204B Full System of Lattice Semiconductor, particularly the TX deframer and RX framer modules used for the 3Gbps JESD204B soft IP to support the recently released 5Gbps JESD204B Soft IP. The modified full system instantiating the new 5Gbps JESD204B Soft IP had to be tested for functionality through RTL and gate simulation and tested for timing through Static Timing Analysis. The transaction layer’s RX framer, TX deframer, and the clock generator modules were identified to be the major blocks of the full system affected by the change in the soft IP. These were redesigned, followed by RTL and gate simulation of the full system. STA was checked through the Lattice Diamond tool. The system passed the simulation tests. Also, STA results showed that timing was still relaxed even if the lane speed was increased, ensuring that timing requirements are achieved by the device. It is recommended that the full system’s other blocks, and the testbench for the JESD204B and other soft IP products be investigated to operate at a higher clock frequency without violating the timing requirements and constraints of the ECP5 device.
APA, Harvard, Vancouver, ISO, and other styles
49

Behera, Swikruti, and Bipin Bihari Pradhan. "Correlation of Static Lung Function with Fat Free Mass & Fat Free Mass Index." International Physiology 4, no. 1 (2016): 9–13. http://dx.doi.org/10.21088/ip.2347.1506.4116.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Nikoskinen, K., and H. Wallén. "Application of the Kelvin inversion to static conducting wedge problems." IEE Proceedings - Science, Measurement and Technology 153, no. 4 (2006): 174–80. http://dx.doi.org/10.1049/ip-smt:20060009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography