Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • Journal Of Epileptology
  • International Journal Advanced Network Monitoring Controls
  • Australasian Orthodontic Journal
  • Sj Child Adolescent Psychiatry Psychology
  • Journal Of Ultrasonography
  • Transport Problems
  • Architecture Civil Engineering Environment
  • Borderlands
  • Immunohematology

 

Article | 07-May-2018

Research on Information Service of Home Care in Internet Plus Era

In the “Internet plus” era, information technology will be applied to the community home-based care services is a new initiative to create wisdom of the pension industry. With the full use of the Internet and large data, the new model of home care for the elderly needs the active participation of the social organizations (enterprises), and the correct guidance of the government. Strengthening the top-level design of government, establishing the information standard and enhancing the

Jie Zhao

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 113–117

rapid-communication | 31-March-2020

Internet-based digital video atlas of sonographic findings for clinical and educational purposes

CT and MRI, there are increasing databases that facilitate finding out the diagnosis by comparing images and using algorithms and artificial intelligence (AI)(6,7). US imaging is less standardized and therefore a challenge for AI-based diagnostic tools. A single image does not reflect the visual impression of a moving US image from a real-time examination. Many young employees – for the sake of convenience – resort to using general search engines to search the Internet for examples of US images

Daniel Merkel, Christoph Schneider, Michael Ludwig

Journal of Ultrasonography, Volume 20 , ISSUE 80, e24–e28

research-article | 30-November-2020

Performance evaluation of vertical handover in Internet of Vehicles

Shaik Mazhar Hussain, Kamaludin Mohamad Yusof, Shaik Ashfaq Hussain, Rolito Asuncion

International Journal on Smart Sensing and Intelligent Systems, Volume 14 , ISSUE 1, 1–16

Article | 18-March-2018

BLOCKCHAIN AND INTERNET OF THINGS REQUIRE INNOVATIVE APPROACH TO LOGISTICS EDUCATION

Short description of higher education study programme creation and evaluation process is stated. The study pointed out the difficulties of up-dating study programmes in connection with innovative technology trends in the relevant field of knowledge. Blockchain technology and Internet of Things as emerging digitalization trends in logistics and transport are considered together with three relevant bachelor study programmes. The first proposal of innovation inclusion in study programmes is

Genadijs GROMOVS, Mika LAMMI

Transport Problems, Volume 12 , ISSUE SE, 23–34

Article | 09-April-2018

Research of Petroleum Well Fuel Pump Measurement & Control System Based on Internet of Things Technology

In order to realize remote automatic measurement and control of all petroleum well fuel pumps which are located in different regions of the crude oil production enterprises, this paper discusses and designs a petroleum well fuel pump measurement & control system based on internet of things technology. The measurement & control system uses a three-tier (perception layer, network layer and application control layer) form of the IOT (Internet of Things) structure, and then the function and

Shengquan Yang, Ceng Gong

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 127–132

Article | 02-April-2020

Review of Network Technology System from the Past, Present to the Future

interconnected network. Future Network or an international network system consists of all ubiquitous networks connected, interacting and sharing different carriers, sources, function-matching and operating purposes, whether wired or wireless, ground or space. The current Internet is just a computer network using a single TCP/IP communication protocol, not two or more interconnected networks. It is not the interconnection or internet by the exact definition, so it can’t be called an interconnected net, or

Chengjin Mou, Xiaohui Guo

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 61–65

Article | 30-November-2018

Research and Design of Next Generation Internet (IPV9) Datagram

packet that is transmitted on the Internet; called IP Datagram, which are the network layer protocol and the core protocol of the TCP/IP protocol family. IP is a virtual package consisting of a header and data. The IPv4 header is a fixed length of 20 bytes, which is required for all IP datagram. After the fixed portion of the header are optional fields whose length is variable. Both the source and destination addresses in the header are IP protocol addresses. The current global Internet USES the TCP

Zhongsheng Wang, Jianping Xie, Zhao Lin, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 10–28

Article | 01-April-2018

Improving Protection and Security Awareness Amongst Home User

The growth of the Internet brings threats to the end user, which affects the home users more severely. The result from the different surveys shows that these vulnerabilities affect home user very badly. As strong security, controls have been implemented in businesses to minimize losses, hackers and fraudsters have moved their attention towards end users, which are normally easier prey. The increase in the need of security amongst end users is an important task of the today. A small security

Muhammad Farhan, Muhammed Fazil Ali, Sajid Ahmed Khan, Syed Shaji Ul hassan

International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 1, –

Article | 01-April-2018

Improving Protection and Security Awareness Amongst Home User

The growth of the Internet brings threats to the end user, which affects the home users more severely. The result from the different surveys shows that these vulnerabilities affect home user very badly. As strong security, controls have been implemented in businesses to minimize losses, hackers and fraudsters have moved their attention towards end users, which are normally easier prey. The increase in the need of security amongst end users is an important task of the today. A small security

Muhammad Farhan, Muhammed Fazil Ali, Sajid Ahmed Khan, Syed Shaji Ul hassan

International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 1, –

Article | 30-November-2018

From Network Security to Network Autonomous

People can’t live without the internet; internet has become a necessity in daily life. The share of the network economy has accounted for 22% of the global GDP. The importance of the network has become more and more prominent, so the basic work about the network is even more important. Now the Internet has two biggest problems. One is the cyber sovereignty, which is about the network’s belongs. It is obviously that the United States hold the internet. How to adhere to cyber sovereignty is still

Yubian Wang, Shebzukhov Yuri

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 61–65

Article | 30-November-2018

Global Internet Come into a New DNS Era

Name System becomes inevitable. The Internet Engineering Task Force (IETF) proposed the implementation of DNS Domain Name System Extension Mechanism (EDNS) in 1999. In March 2016, the US Department of Commerce’s National Telecommunications and Information Administration (NTIA), Internet Corporation for Assigned Names and Numbers (ICANN) and VeriSign, a company that provides intelligent information infrastructure services which was established in the United States, led to the completion of the

Mou Chengjin

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 32–46

Article | 30-November-2018

Research on the Technology of Assign IP Address to the Connected Computer Based IPV9

I. THE EMERGENCE OF THE NEW GENERATION OF THE INTERNET IPv4 is the most widely used protocol on the Internet, and its address space is 232. In the early stage of the Internet, due to the underestimation of the development trend of the Internet, IP allocation was unreasonable, and IP resources were very limited. By 2010, there was no address that could be allocated. In order to solve the problem of insufficient addresses, researches proposed IPv6, IPv6 has 2128 addresses in theory, however, only

Hui Wang, Lingwen Liu, Zhikai Yu, Ming Li

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 40–47

research-article | 30-November-2020

A quality assessment of Internet information regarding accelerated orthodontics

, corticotomies, osteotomies, distraction, and a surgery-first approach.6 The Internet consists of a vast combination of computer networks linked around the world. It is reported that approximately 40% of the world’s population has an Internet connection, and this rate has increased rapidly during the twenty-first century.7 Public access to health-related information has also increased following the widespread use of the Internet. Many patients seek and obtain information about orthodontic problems and

Kevser Kurt Demirsoy, Tugce Imamoglu, Suleyman Kutalmış Buyuk

Australasian Orthodontic Journal, Volume 37 , ISSUE 2, 265–272

Article | 16-December-2013

Mobility of IP based Wireless Sensor Nodes in Sensor-Grid infrastructure

As the world is moving towards the “Internet of Things” [1], Internet Protocol enabled wireless sensor network is becoming an important research area. In order to make it possible and to facilitate transmission of IPv6 packets over low powered networks, 6Lowpan [2,3] has been introduced. Since the IPWSN application domain is expanded to real-time applications such as health-care [17] and surveillance systems, a fast and seamless handover becomes an important criterion for supporting mobility in

Suman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 2075–2102

Article | 30-November-2018

Research on the System Structure of IPV9 Based on TCP/IP/M

addresses of IPv4, IPv6 and IPV9 can be used simultaneously on the Internet. A. The hierarchy of IPV9 IPV9 system adopts the mixed network architecture of three-layer circuit/four-layer grouping, adopts the rules of verify first and then communication, address encryption, the address length could alter from 16-bie to 2048-bit, resource reservation, and adopts character direct route transmission mode, which apply virtual and real circuit to ensure the transmission security. The architecture diagram is

Jianguo Wang, Zhongsheng Wang, Jianping Xie, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 1–13

Article | 30-November-2018

Design and Research of Healthy Ecology System Framework Based on IPV9

I. THE CURRENT STATUS OF HEALTH CARE A. Medical health background A new round of scientific and technological revolution and industrial changes are accelerating. Life science technologies continuously made new breakthroughs, and major technologies such as genetic engineering, molecular diagnostics, stem cell therapy, and 3D printing are accelerating applications. The new generation information biology and engineering technologies such as big data, cloud computing, Internet, artificial and

Qinyu Li, Hongwen Zhao, An Geng, Lei Han

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 14–24

Article | 30-November-2019

Design and Research of Security System in University Laboratory

I. INTRODUCTION In the field of security, with the diversification of networking methods, hardware and software platforms and application technologies, the implementation of security systems has become more and more diverse. At present, the laboratory security system has a large number of alarm constraints and redundancy, and poor real-time monitoring. In response to this series of problems, this paper uses the Internet of Things and other related technologies to carry out research work on the

Ding Li, Shi Xuerong, Zhang Dujuan, Su Yulei

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 39–46

Article | 30-November-2018

Internet of Things Application in Satellite Communication in Power Transmission, Transform and Distribution

I. INTRODUCTION The Ubiquitous Electricity Internet of Things connects people, things and power users, power grid enterprises, power generation enterprises, suppliers and their equipment to generate shared data for users, the grid, power generation, and suppliers And government social services; use the power grid as a hub, play a platform and sharing role, create value for the development of the industry and more market players, and provide value services. The essence of the ubiquitous electric

Dong Chuang

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 38–46

Research Article | 01-September-2017

INSTANCE VEHICLE MONITORING AND TRACKING WITH INTERNET OF THINGS USING ARDUINO

inside the vehicles to prevent them from stolen and easy to identify the location and prevent from other disaster factors. The main methodology of the device is to monitoring the vehicle speed via Ethernet shield through Internet of things. The protective system is maintained by analysing gas tank through gas sensor which details about the gas leakage. The advantages of this device are alarming the driver when there is any gas leakage in the vehicle and also informs about the speed of the car. A

Dhanalakshmi, A.Ezil Sam Leni

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 123–135

Research Article | 15-February-2020

Designing a Wireless Sensors Network for  Monitoring and Predicting Droughts

sensor drought monitoring system is capable of remote real-time monitoring for extended periods. This monitoring can also help identify drought in the early stages and thereby indicate promptly when to take corrective measures. Intelligent sensors in a wireless network monitor the soil condition. These sensors collect various environmental; parameters and then send the pre-processed data wirelessly to a base station. From the base station this data uploads every two seconds to the cloud (internet

A Gaddam, M Al-Hrooby, W F Esmael

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6

Research Article | 01-September-2017

DETECTING IP BASED ATTACK ON CLOUD SERVER USING PASSIVE IP TRACEBACK

In computer network security, IP address spoofing plays a major role in the creation of Internet Protocol (IP) packets with a fake or forged source IP address and this may lead to major attacks to cloud centre. When the identities of user information are forged by spoofing or masquerade as another computing system. Whether the basic protocol for sending data in the Internet communication are based on the Internet Protocol ("IP"). In network communication header of each IP packet consist of

Divakar V, Vijayarangam S

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 136–146

Article | 01-June-2016

SEMANTIC COLLABORATION AND SENSING AS A SERVICE IN SEMANTIC WEB OF THINGS

The intrinsic contradiction hidden in the Internet of things, which is the mismatching between the diversification of forms expressing the thing’s information and the insufficiency of understanding ability of the agents using the thing’s information, hinders its intelligent development. Adding a semantic annotation for the expression of thing’s information based on ontology will improve the ability to understand, to reason and to obtain information for the agents, and will essentially promote

X. Y. Chen, G. Y. Li

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 997–1028

Article | 07-May-2018

University Library Internet WeChat Public Account Applicated for Student Values Education

With the popularization of intelligent mobile phone, mobile phone instant messaging application has achieved rapid development, at the same time, along with the SNS (Social Network Service) development, combined with mobile phone instant messaging and SNS has become an important means of the current Internet environment for people to communicate, in this trend, the university library is constantly looking for every kind of platform the expansion of information service. WeChat is a public

Yan Zhao

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 121–125

research-article | 30-November-2019

THE CONCEPT OF SMART CITY IN TERMS OF IMPROVING THE QUALITY AND ACCESSIBILITY OF URBAN SPACE FOR THE ELDERLY; LITERATURE REVIEW

design, in meaning that modern ICT technologies can support people at risk of exclusion and facilitate their active participation in social life (especially Internet of Things infrastructure, recognized as the most effective activator supporting active and healthy life). So far – few scientific studies cover the links between the concept of age-friendly city and the idea of smart city, which prompted the Author to take up this topic. A perspective of looking at the role of the elderly in society in

Anna SZEWCZENKO

Architecture, Civil Engineering, Environment, Volume 13 , ISSUE 2, 27–35

Article | 14-October-2020

Interview with the Inventor of the Future Network IPV9

I. INTRODUCTION The core of the current Internet (also known as the Internet) technology is IPv4 and IPv6, and its technical core is completely controlled by the United States. On December 14, 2017, the US Federal Communications Commission (FCC) officially abolished the net neutrality rule, making the Internet with obvious political color and posing a serious threat to Internet applications in various countries. The address space of the IPv4 protocol is 2 to the power of 32. Due to the

Guoshao Chen, Yubian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 73–79

Article | 30-November-2018

Application of the Source Encryption Algorithm Model in the Power Industry

I. INTRODUCTION Driven by intelligence and informatization, ubiquitous electric Internet of things is just at the right time. The construction of power Internet of things puts forward higher requirements for data management and information management. At present, the state grid system is connected to more than 500 million terminal devices, and with the construction of electric Internet of things and the surge, there will be a huge amount of data. Data is an important asset, data privacy

Jiao Longbing

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 68–73

Article | 30-November-2018

Design and Research of New Network Address Coding

PREFACE Because IPv4 addresses are allocated on a first-come-first-served, on-demand basis, the distribution imbalance makes address allocation flawed. With the continuous development of the Internet (especially the explosive growth of the scale and the surge of address use), some inherent defects of IPv4 are gradually exposed, mainly focusing on address shortage. IPV4 does not provide encryption and authentication mechanisms to ensure the secure transmission of confidential data resources and

Yufeng Lai, Jianping Xie, Xiaowei Cheng, Yuyu Li

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 29–38

Article | 14-October-2020

A Method to Access a Decimal Network (IPV9) Resource

Decimal network is a complete independent intellectual property rights based overall decimal digital code, the establishment of 2256 times of cyberspace sovereignty. It includes 13 root domain name servers from the parent root, the primary root, and the zero-trust security mechanism for communication after verification. Compatible with current Internet systems, it has a future Internet architecture that overlaps geographical location and IP address space. Most Internet applications today are

Guangzhou Liu, Fuya Yu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 36–46

Article | 30-November-2018

Research on IPv4, IPv6 and IPV9 Address Representation

I. NETWORK ADDRESS An interconnected network is made up of LAN with interconnected nodes, also known as hosts or routers. Each device has a physical address connected to a network with a MAC layer address and a logical Internet address. Because a network address can be logically assigned to any network device, it is also called a logical address. Internet addresses are assigned by the Internet Corporation for Assigned Names and Numbers. The association appoints three local organizations

Halavachou YURY, Yubian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 48–60

Article | 30-November-2018

Research of New Network Address Structure

I. INTRODUCTION At the beginning of the Internet development, IPv4 addresses were sufficient and successful, but in the last 20 years of the 20th century, the global Internet was growing rapidly, and the number of hosts connected to the Internet was growing exponentially every year. Therefore, the number of existing addresses is no longer sufficient for this development demand. IPv6 solves the problem of address shortage in IPv4, but it does not fully consider the network security problem in

Jiao Chong, Jianping Xie, Yinqiu Xu, Hongwen Zhao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 39–47

Article | 30-November-2018

Research of Network Closed-loop Control System Based on the Model Predictive Control

Xu Shuping, Wang Shuang, Guo yu, Su Xiaohui

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 30–37

Article | 02-April-2020

Research on Real-Name Routing and Trusted Connection Based on IPV9 and CPK-card

I. INTRODUCTION Routers work in the network layer of the OSI seven-layer protocol. Their main function is to connect the network with the network and forward packets between the networks. Routers have become the most important network equipment, so the research on the new generation of routers will become the core technology of the next generation of Internet research. Due to the IPv4, IPv6 protocols that used in the Internet, the new requirements for trusted Cyber Security connections are not

Jianping Xie, Xianghao Nan, Zoraghchin AliAb

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 9–14

Article | 30-November-2018

Comparative Research on Key Technologies from IPv4, IPv6 to IPV9

I. INTRODUCTION Internet Protocol (IP) is a communication protocol designed for computers to communicate with each other in the network. IP provides a common rule for computers to access the Internet. The Internet has become the largest open network in the world. With the rapid development of the global economy, the advancement of communication technology and network technology, the penetration rate of computers and mobile terminals is getting higher and higher. The problems with IPv4 are also

Sun Huai, Liu Zhang

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 79–87

Article | 30-November-2018

Remote ECG System Data Encryption Scheme

I. INTRODUCTION In the remote ECG system, because the terminals are distributed in the vast number of families, clinics, community hospitals, etc., there are problems in the management of physical equipment. Since the ECG data is communicated through the Internet, there is a problem that the communication data packet can be intercepted and monitored. Due to the diversification of commercial channels and construction teams, there is also a risk of technical confidentiality leaks. This paper

Liu Xin, Wei Zhiqiang

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 31–34

Letter to Editor | 22-November-2020

Letter to the Editor: Wanted Discussion Group on the Internet

Patricia Letendre

Immunohematology, Volume 10 , ISSUE 2, 66–66

research-article | 30-November-2020

Technical Introduction of Wireless Mesh Network

I. INTRODUCTION As a wireless access network that can be deployed quickly and does not need expensive network wiring infrastructure, its application value in the next generation Internet has been proved. In the process of evolution to the next generation network, wireless is an indispensable technology. Wireless Mesh can cooperate with other networks and is dynamic and calculable network architecture. Traditional wireless networks are mainly point-to-point or point-to-multipurpose star

Yana Luo, Jian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 73–78

Article | 08-April-2018

The Research of Information Delay in the Neural Network Forecast Remote Control System

measurement data represents the network path, and can effectively substitute for the actual network in the design of closed-loop control system based on Internet to research; the method used fast and accurate can be used for online learning network model and forecast the network delay value, provides a new way to remote closed-loop control based on Internet.

Xu Shuping, Chen Yiwei, Cheng Xinhua, Su Xiaohui

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 38–48

Article | 30-November-2018

A Full Decimal Method of Address Assignment for Networked Computer

I. INTRODUCTION With the rapid development of science and technology, the world has entered an information age of data communication. The most famous data network is the Internet, which can be seen all over the world. In 1969, in order to develop a computer network capable of resisting nuclear attacks, the US Department of Defense funded the establishment of a packet-switched network named ARPANET, which was the earliest prototype of today’s Internet and was regarded as the forerunner of the

Xin Zhan, Jianping Xie, Liming Jin, Jiawen Lai

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 53–60

Article | 30-November-2020

Research of Forecasting Information Time Delays with Nenural Network in Telecontrol System

I. INTRODUCTION Network control system based on Internet broke through the many limitations on control system based on field bus and become the new development direction of the network control system, stable, fast, and accurate still the ultimate goal of network control systems pursued [1]. Introduction network easy for the organization and deployment of the control system but the transmission delay and data drops inevitably exist in network communication, these will give control system adverse

Xu Shuping, Wu Jinfe, Su Xiaohui, Xiong Xiaodun

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 1–10

Article | 30-November-2020

Application Research of Decimal Network Technology

I. THE GENERATION OF DECIMAL NETWORK Nowadays, the network is highly valued by all countries in the world. The core of Internet technology is IPv4 and IPv6, and it is developed by the United States. The IPv4 protocol address space is 232, and it has some shortcoming with the development of the Internet, in theory, IPv6 has 2128 addresses, but only one eighth of the addresses can be assigned to end users, so IPv6 also has certain limitations. Decimal network working group joint Shanghai network

Zhang Liu, Shuyang Li

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 50–56

Research Article | 01-September-2017

AN ANTI-EMULATION STRUCTURE FOR INTERNET DESPOSITORY USING SECURED IMAGE VALIDATION SCHEME

Anupriyan K, Santhosh Kumar C, Nagaraj N

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 62–68

Article | 30-November-2019

Comparison Research on Future Network Between IPv4, IPv6 and IPV9

With the rapid development of science and technology, the world has entered an information age of data communication. The most famous of the data networks is Internet, a packet-switched network developed by the U.S. department of defense called the ARPANET, which is considered the precursor to the information superhighway. Now almost all countries and regions have joined the Internet. In order for information to be transmitted correctly over the Internet to its destination, each computer

Halavachou Yury, Fei Xu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 28–35

Research Article | 27-December-2017

A NOVEL PACKET QUEUING AND SCHEDULING ALGORITHM AND ITS LINK SHARING PERFORMANCE FOR HOME ROUTER

A home router, or a home gateway, is the node that resides between a public network and a home network for computers to share Internet connections. To insert customized queuing and scheduling codes into the embedded Linux kernel is a way to make the Linux-based home routers support Quality of Service (QoS). It is desirable that the small Linux kernel adopts an efficient queuing and scheduling algorithm to support link sharing, priority and traffic shaping. The algorithm presented in this paper

Jin Yan, Chen Xiaoyuan

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 1, 135–160

Article | 01-September-2014

THE IMPLEMENTATION FOR THE INTELLIGENT HOME CONTROL SYSTEM BASED ON THE ANDROID AND ZIGBEE

The intelligent home system finished the wireless or remote control for all the indoor electric devices through the intelligent terminals. The description about the integrated network architecture and the interconnecting mechanisms for the reliable measurement of parameters by smart sensors and transmission of data via internet is being presented. The wireless communication technology includes the WiFi, Zigbee and mobile communications. The system presented the design of the hardware part and

Xin Zhenghua, Chen Guolong, Hong Li, Qixiang Song, Chen Lei, Shi Yaqi, Wu Gang

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1095–1113

Article | 19-April-2021

Research on User Dynamic Selection Network Technology

I. USER DYNAMIC SELECTION NETWORK Regional Internet Service Provider (ISP) provides services for community ISP who is similar to a unified relay station provides directly network support for users. In this way, the packet cannot be transmitted directly, but are transmitted after some preprocessing in the middle [1]. There are three methods for users to choose the Internet. One is that the network ports provided by the community ISP and a regional ISP only is connected, as shown in Figure 1(a

Wang Jian, Wang Yubian

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 28–34

Article | 30-November-2018

A Solution to Incompatibility Between IPv6 and IPv4 Communications

IPv10 is the proposed name as IPv10 = IPv4 + IPv6. The draft specification can be found at IETF.org and will expire in March 2018. I. SPECIFICATION A. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http

Khaled Omar Ibrahim Omar

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 80–87

research-article | 30-November-2020

Research on Data Collection and Analysis of Second Hand House in China Based on Python

Hejing Wu, Ran Cui

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 37–47

Article | 07-April-2018

Review on RFID Identity Authentication Protocols Based on Hash Function

Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols.

Yang Bing, Liu Baolong, Chen Hua

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 72–82

Research Article | 15-February-2020

Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications

Data integrity is a term used when referring to the accuracy and reliability of data. It ensures that data is not altered during operations, such as transfer, storage, or retrieval. Any changes to the data for example malicious intention, unpredicted hardware failure or human error would results in failure of data integrity. Cryptographic hash functions are generally used for the verification of data integrity. For many Internet of Things (IoT) applications, hardware implementations of

Muzaffar Rao, Thomas Newe, Ian Grout

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6

Article | 10-April-2018

Novel Model of E-commerce Marketing Based on Big Data Analysis and Processing

The amount of information on the Internet is getting larger and larger, and the energy of the consumer and the ability to deal with information is limited. Electricity supplier enterprises in the development process to do are to use big data for personalized shopping guide. This paper analyzes the situation of the development of e-commerce industry in the background of big data, and puts forward the improvement method. The paper presents novel model of e-commerce marketing based on big data

Hongsheng Xu, Ke Li, Ganglong Fan

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 40–44

Article | 30-November-2018

Art and contemporary Irish emigrants: Aesthetics and networks of affect in David Monahan’s ‘Leaving Dublin’

and aesthetics in the contemporary Irish experience of migration. I will explore the series from the perspective of Actor-Network Theory. As described by sociologist John Law, actor-network theory considers ‘everything in the social and natural worlds as a continuously generated effect of the webs of relations within which they are located’ (Law 2009, p. 141). I will consider how the Internet has changed both experiences of migration and the creation and distribution of art by altering networks of

Rachel L. Williams

Borderlands, Volume 18 , ISSUE 1, 12–38

Research Article | 01-June-2017

FEATURES, OPERATION PRINCIPLE AND LIMITS OF SPI
AND I2C COMMUNICATION PROTOCOLS FOR SMART OBJECTS: A NOVEL SPI-BASED HYBRID PROTOCOL
ESPECIALLY SUITABLE FOR IoT APPLICATIONS

The Internet of Things (IoT) is an expression, sometimes abused by companies given the absence of an unambiguous meaning, that indicates the upcoming evolution of Internet as it has been known so far. In fact, all objects will have network capabilities which will be exploited to overcome, in certain situations, human intervention. Thanks to the direct cooperation of new class of devices, aware of their operating scenario and interconnected in subnetworks, our life style will be strongly

P. Visconti, G. Giannotta, R. Brama, P. Primiceri, A. Malvasi, A. Centuori

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 2, 262–295

Article | 11-January-2021

Imperative to Build Network Security System and Speed Up the Future Network Construction

innovation is the core benefit of the development of China’s information and communication technology, and it is imperative! II. THE STRUCTURAL FLAWS OF THE INTERNET ARE WELL KNOWN AROUND THE WORLD China is no exception to the threat posed by state-level organized and high-intensity cyber confrontation to all countries in the world. In order to cope with state-level cyber confrontation, it is impossible not to change the situation that core technologies and key cyber infrastructure are in the hands of

Aiqun Wu, Zhangxing Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 75–81

Article | 30-November-2018

The Shortcomings of Ipv6 and Upgrade of Ipv4

IPv6 is a solution to the problem of running out of IPv4 addresses. In other words, it is to upgrade the IP address because the original number of IPv4 addresses is not enough to assign to more computers. The first version of IPv6 appeared in 1995, at that time the internet is in its infancy, with the development of Internet of things, big data and cloud storage technologies being gradually applied in the last decade, IPv6 has certain defects in the design of its address structure by the

Tao Wang, Jiaqiong Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 1–9

Article | 30-November-2018

On the RFID Information Query Technology Based on IPV9

information query process of interconnection between decimal network and Internet network and the domain name conversion rules obtained by decimal network query server. II. IPV9 IPV9, short for decimal network and the new generation of Internet, is the result of China’s independent innovation of core technologies which has IPV9 protocol, IPV9 addressing, digital domain name system and other core technologies are adopted with original and independent intellectual property rights. Full digital text is

Li Guiping, Xue Lei

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 74–79

Article | 26-March-2020

NEW IDEAS FOR INLAND INTERMODAL TRANSPORT

Béla ILLÉS, Antal VÉHA, Laszlo VIDA

Transport Problems, Volume 15 , ISSUE 1, 117–130

Article | 30-November-2018

Crawler Technology Based on Scrapy Framework

I. INTRODUCTION With the development of the times and the popularization of scientific and technological products, the Internet has become inseparable from our lives, and search engines have become a daily necessity of people. Users can search information by inputting keywords into search engines to find information related to keywords. But with the explosive growth of network information, it becomes more difficult to find the desired information accurately. In order to meet the growing needs

Hejing Wu

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 25–31

Research Article | 15-February-2020

Reprogramming Embedded Systems at Run-Time

The dynamic re-programming of embedded systems is a long-standing problem in the field.  With the advent of wireless sensor networks and the ‘Internet of Things’ it has now become necessary to be able to reprogram at run-time due to the difficulty of gaining access to such systems once deployed.  The issues of power consumption, flexibility, and operating system protections are examined for a range of approaches, and a critical comparison is given.  A combination of

Richard Oliver, Adriana Wilde, Ed Zaluska

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6

Article | 30-November-2019

Research and Implementation of Future Network IPV9

I. IP A. The Introduction of IP IP(Internet Protocol), is the network layer Protocol in the TCP/IP architecture. When we use the Internet, the most important question is whether my messages and actions can be successfully sent and whether I can receive messages from the outside. Today, our needs are fundamentally assured through IP. Sending and receiving is actually a kind of information transmission, our various operations will be various applications in the form of packets for transmission

Liu Zhang, Wang Yubian

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 47–57

research-article | 31-August-2020

IoT enabled sensor node: a tutorial paper

Alice James, Avishkar Seth, Subhas C. Mukhopadhyay

International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–18

Article | 05-June-2013

MODEL BASED APPLICATION LEVEL MIDDLEWARE FOR DESIGN OF WIRELESS SMART CITY

The Wireless Smart City (WSC), an emerging concept in Smart Grid and Internet of Things, has attracted an increasing number of customers and developers - based with its promise of low cost implementation and flexibility. At the same time, the challenges faced with in the field applications hinder the progress of WSC from researches into commercial production. A model based application level auxiliary platform is presented to help the development of WSC. This middleware together with the

Yujie Liang, Rendong Ying, Peilin Liu

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 1180–1199

Article | 30-November-2018

Research on IPv6 Address Space and Super IP Upgrade

this problem not seen at all. If a huge number of IPv6 terminals appear on the Internet and the problem of using the MAC generation interface ID discovered by the user and all turned to the randomly generated interface ID, the address conflict problem becomes more and more obvious. III. RESEARCH ON THE NUMBER OF IPV6 ADDRESSES The fundamental purpose of developing IPv6 is to solve the problem of insufficient IPv4 address space, and when faced with the problem of insufficient IPv4 address space

Tao Wang, Xiaodong Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 7–14

Article | 11-January-2021

Review of Anomaly Detection Based on Log Analysis

I. INTRODUCTION With the development of the Internet, big data and artificial intelligence have penetrated into people’s lives, unknowingly changing the way people live, food, and transportation, making people’s lives faster, more efficient, and easier. Research in various fields of computer is moving towards bionics, including human-like big data processing, human-like computer vision and image processing, human-like voice input, etc. These studies make the computer in a domain not only

Xudong Wu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 40–49

Research Article | 01-December-2017

PLANNING OF REMOTE EXPERIMENTAL RESEARCH ON EFFECTS OF GREENHOUSE MICROCLIMATE PARAMETERS ON VEGETABLE CROP-PRODUCING

The article presents a plan on experimental studies on substantiation of structural and algorithmic organization of computer-aided systems of remote adaptive monitoring and control of microclimate parameters of commercial greenhouses. There was developed a program component for remote monitoring of physicochemical parameters of greenhouse microclimate using the ‘Internet of Thing’ technology and modern mobile devices. There was offered a hardware component architecture of the system

I.S. Laktionov, O.V. Vovna, A.A. Zori

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 4, 845–862

Article | 07-May-2018

Design and Development of the Mass Image Storage Platform Based on Hadoop

With fast development and deep appliance of the Internet, problem of mass image data storage stand out, so the problem of low management efficiency, low storage ability and high cost of traditional storage framework has appeared. The appearance of Hadoop provides a new thought. However, Hadoop itself is not suit for the handle of small files. This paper puts forward a storage framework of mass image files based on Hadoop, and solved the internal storage bottleneck of NameNode when small files

Xiaoqing Zhou, Jiangjing Gou, Zhiyong Zhou, Jiaxiu Sun

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 80–83

Article | 30-November-2018

Application Research Based on 5G Wireless Communication Technology

base station is a data exchange function. Switch network. The macro base station side has cloud computing functions and big data storage functions, and calculations that cannot be processed in time will be submitted to the network cloud computing center. There are more forms of base stations or terminals, such as inter-machine communication supporting Internet of Things, multimedia communication between people, communication between people and machines, and remote wireless control functions

Junying Bai, Yongli An, Ruihua Sun

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 86–92

Article | 11-April-2018

Intrusion Detection Based on Self-adaptive Differential Evolutionary Extreme Learning Machine

Nowadays with the rapid development of network-based services and users of the internet in everyday life, intrusion detection becomes a promising area of research in the domain of security. Intrusion detection system (IDS) can detect the intrusions of someone who is not authorized to the present computer system automatically, so intrusion detection system has emerged as an essential component and an important technique for network security. Extreme learning machine (ELM) is an interested area

Junhua Ku, Bing Zheng, Dawei Yun

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 54–60

Article | 30-November-2020

The Design of Remote Control System Based on the Embedded Web Server

dynamic interaction between the field data and embedded Web server, eventually, embedded devices meet needs of networking with Internet directly, the real-time monitoring network has a good foundation to achieve [5]. Embedded WEB server has the advantage of small size, low price, and good platform migration and so on, which the WEB server does not have. In the system, in addition to considering its above advantages, the optional of embedded WEB server is more important to take into account the

Xu Shuping, Yue Hongqing, Yang Fan, Wan Yajuan

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 41–49

Research Article | 30-November-2012

Online and Offline Friendship Among Italian Adolescent Girls Following a Non-Traditional School Track

use to enhance adolescent social skills and to promote appropriate use of the Internet will be discussed.

Giulia Zucchetti, Fabrizia Giannotta, Emanuela Rabaglietti

Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 1 , ISSUE 1, 24–32

Article | 01-December-2016

THE IMPLEMENTATION OF A CLOUD SYSTEM FOR ELECTRONICS LEARNING IN A MOROCCAN PUBLIC UNIVERSITY

integrate the information and communication technologies ICT into the engineering sciences learning. Nowadays, there are two types of online labs, virtual and remote labs. Virtual labs that provide simulation environments for experimentations, remote labs are based on conducting the experimentation remotely through the Internet. In this paper, an example of a successful development and deployment of a cloud based remote lab in the field of engineering education, integrated in the Moodle platform, using

Khalid Ghoulam, Belaid Bouikhalene, Zakaria Harmouch, Hicham Mouncif

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 2051–2068

Article | 30-November-2018

A New Method of Improving the Traditional Traffic Identification and Accuracy

I. INTRODUCTION Due to the rapid development of the Internet, Internet business has greatly facilitated and enriched people's lives, learning and work, and has attracted more and more users. With the new application patterns (such as P2P) and application demand emerging in the Internet[1], the pressure of huge data transmission is becoming more and more heavy, and the occurrence of network failures is becoming more and more frequent, which leads to a series of network failures, such as packet

Wang Zhongsheng, Gao Jiaqiong

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 53–60

research-article | 31-October-2020

ENERGY OPTIMISATION OF RESEARCH BUILDINGS IN VIENNA WITH A PHOTOVOLTAIC FAÇADE.

Joanna BIEDROŃSKA

Architecture, Civil Engineering, Environment, Volume 13 , ISSUE 3, 5–12

research-article | 31-August-2021

Research on ISPs Selection Technology Based on Network Quality Monitoring

client the user agent. The answering server stores some resources, such as HTML files and images. We call this reply server the origin server. There may be multiple “middle layers” between the user agent and the source server, such as proxy server, gateway or tunnel. Although TCP / IP is the most popular application on the Internet, HTTP protocol does not specify that it must be used. In fact, HTTP can be implemented on any internet protocol or other networks. HTTP assumes that its underlying

Jian Wang, Zhongsheng Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 3, 36–41

Article | 01-March-2015

CONSTRUCTION OF TRACEABILITY SYSTEM FOR MAINTENANCE OF QUALITY AND SAFETY OF BEEF

, including the individual identification of cattle, data encoding, data synchronization technology between the business and the central database and multi-platform tracing techniques. Through the use of RFID technology, all aspects of information for each head of beef cattle from breeding, slaughtering, processing, cold chain storage and transportation can be tracked and traced, and a quality retrospective file which can be queried on the Internet network for each head of beef cattle is formed. Solve the

Wanli Zhang, Xiaoying Yang, Qixiang Song

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 782–800

Article | 10-April-2018

Multi - point Cooperative Multicast Video Design and Research

Internet era in the context of increasing popularity of mobile terminals, network video browsing has become an indispensable feature of wireless terminals. However, in order to improve the reliability of video multicast, this paper increases the gain system from the overlapping access points in the coverage area, because of the low reliability of the inter-link interference between the wireless networks. Improve the fairness of the system, and propose and design a multi-point broadcast scheme

Wang Tao

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 72–75

Research Article | 05-July-2017

Child self-report and parent ratings for the Strengths and Difficulties Questionnaire: Norms and agreement in a Swedish random population sample

Bojing Liu, Karin Engström, Isabel Jadbäck, Sara Ullman, Anne H. Berman

Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 5 , ISSUE 1, 13–27

Article | 01-June-2016

TRUST AWARE DATA AGGREGATION AND INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKS

Aggregation for Internet of Things) method.

P. Raghu Vamsi, Krishna Kant

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 537–562

Article | 20-July-2021

Evaluation of treatment risks and the quality of information contained within the websites of specialist orthodontists

Objective: To evaluate the treatment risks and the quality of information contained within the websites of specialist orthodontists in Australia. Methods: The term ‘specialist orthodontic practice’ was entered into three internet search engines. Websites satisfying inclusion and exclusion criteria were evaluated for orthodontic treatment risk information against nine common treatment risks. For website reliability and quality, the DISCERN instrument was used along with the HON

Maurice J. Meade, Craig W. Dreyer

Australasian Orthodontic Journal, Volume 35 , ISSUE 2, 143–151

research-article | 30-November-2020

Energy harvested end nodes and performance improvement of LoRa networks

The evolution of the Internet of Things (IoT) has taken the idea of connectivity to a very different level due to the rapid development of the platforms that will connect billions of the devices (Bor et al., 2016). With the merger of pervasive sensing along with remote power computations on these platforms, it is possible to collect and process data of numerous applications related to smart cities, agriculture, healthcare, and logistics. The utilization in numerous applications increases

Gunjan Gupta, Robert Van Zyl

International Journal on Smart Sensing and Intelligent Systems, Volume 14 , ISSUE 1, 1–15

Research Article | 01-December-2017

LOAD AWARE CHANNEL ESTIMATION AND CHANNEL SCHEDULING FOR 2.4GHZ FREQUENCY BAND BASED WIRELESS NETWORKS FOR SMART GRID APPLICATIONS

The advanced monitoring and control applications consider Wireless Sensor Networks (WSN) as a promising technology for modern applications like the Internet of Things (IoT), Smart Grid and Wireless Body Area Networks (WBAN). The WSN has important features like less cost, low power usage, supportable data rates and complexity. There is a need for continuous research on improving characteristics and abilities of WSN. The reliable performance of WSN depends on the latency necessities depending on

Vikram K, Sarat Kumar Sahoo

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 4, 879–902

Review Paper | 09-December-2014

Encephalopathy with Electrical Status Epilepticus in Slow Wave Sleep – a review with an emphasis on regional (perisylvian) aspects

Aim. The aim of this article is to review criticaly the Electrical Status Epilepticus in Slow Sleep (ESES) phenomenon from a neurophysiological mechanisms aspect as well as terminological and classification issues. Methods. The review includes all the relevant papers published during the last 43 years on the subject of ESES and Continous Spike – Wave in Sleep (CSWS).These papers were identified in various large databases via the internet. Rewiev and remarks. ESES/CSWS phenomena can be

Peter Halász, Márta Hegyi, Zsuzsa Siegler, András Fogarasi

Journal of Epileptology, Volume 22 , ISSUE 2, 71–87

No Record Found..
Page Actions