期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
Research and Design of IPv6 Network Management and Operations Support System
1
作者 Chen Bin Ji Wenchong Qiu Zhonghui (China Network Communications Group Corporation, Beijing 100032, China) 《ZTE Communications》 2006年第1期16-20,共5页
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a... IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition. 展开更多
关键词 work Research and Design of IPv6 network management and Operations Support System Design RFC IETF NMS MIB RMON NGI SNMP ICMP
下载PDF
Design of Power Communication Data Network Management System and Implementation of Data Acquisition Module
2
作者 Yue Zhang Zefeng Jian Hao Wang 《Journal of Electronic Research and Application》 2021年第6期1-5,共5页
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem... The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data. 展开更多
关键词 Electric power communication network management system design Data acquisition
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
3
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
4
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
Gym-ANM: Reinforcement learning environments for active network management tasks in electricity distribution systems
5
作者 Robin Henry Damien Ernst 《Energy and AI》 2021年第3期171-193,共23页
Active network management(ANM)of electricity distribution networks include many complex stochastic sequential optimization problems.These problems need to be solved for integrating renewable energies and distributed s... Active network management(ANM)of electricity distribution networks include many complex stochastic sequential optimization problems.These problems need to be solved for integrating renewable energies and distributed storage into future electrical grids.In this work,we introduce Gym-ANM,a framework for designing reinforcement learning(RL)environments that model ANM tasks in electricity distribution networks.These environments provide new playgrounds for RL research in the management of electricity networks that do not require an extensive knowledge of the underlying dynamics of such systems.Along with this work,we are releasing an implementation of an introductory toy-environment,ANM6-Easy,designed to emphasize common challenges in ANM.We also show that state-of-the-art RL algorithms can already achieve good performance on ANM6-Easy when compared against a model predictive control(MPC)approach.Finally,we provide guidelines to create new Gym-ANM environments differing in terms of(a)the distribution network topology and param-eters,(b)the observation space,(c)the modeling of the stochastic processes present in the system,and(d)a set of hyperparameters influencing the reward signal.Gym-ANM can be downloaded at https://github.com/robinhenr y/gym-anm. 展开更多
关键词 Gym-ANM Reinforcement learning Active network management Distribution networks Renewable energy
下载PDF
Network traffic identification in packet sampling environment
6
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 network measurement Application identification Packet sampling Application behavior CHARACTERISTIC Metric correlation network management
下载PDF
Development Methodologies for Network Softwarization: A Comparison of DevOps, NetOps, and Verification
7
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2023年第5期97-104,共8页
This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provid... This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provides recommendations for organizations looking to adopt network softwarization. 展开更多
关键词 Development Methodologies network Softwarization DevOps NetOps VERIFICATION Software-Defined networking network Function Virtualization Automation COLLABORATION Testing Validation network Operations network management
下载PDF
Machine learning-based zero-touch network and service management:a survey 被引量:2
8
作者 Jorge Gallego-Madrid Ramon Sanchez-Iborra +1 位作者 Pedro M.Ruiz Antonio F.Skarmeta 《Digital Communications and Networks》 SCIE CSCD 2022年第2期105-123,共19页
The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosio... The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosion along the end-to-end network chain has increased the complexity in the coordinated orchestration of different segments composing the whole infrastructure.The Zero-touch Network and Service Management(ZSM)concept has recently emerged to automatically orchestrate and manage network resources while assuring the Quality of Experience(QoE)demanded by users.Machine Learning(ML)is one of the key enabling technologies that many ZSM frameworks are adopting to bring intelligent decision making to the network management system.This paper presents a comprehensive survey of the state-of-the-art application of ML-based techniques to improve ZSM performance.To this end,the main related standardization activities and the aligned international projects and research efforts are deeply examined.From this dissection,the skyrocketing growth of the ZSM paradigm can be observed.Concretely,different standardization bodies have already designed reference architectures to set the foundations of novel automatic network management functions and resource orchestration.Aligned with these advances,diverse ML techniques are being currently exploited to build further ZSM developments in different aspects,including multi-tenancy management,traffic monitoring,and architecture coordination,among others.However,different challenges,such as the complexity,scalability,and security of ML mechanisms,are also identified,and future research guidelines are provided to accomplish a firm development of the ZSM ecosystem. 展开更多
关键词 Zero-touch network and service management(ZSM) Next generation networks(NGN) Artificial intelligence(AI) Machine learning(ML)
下载PDF
Management and Control of Outsourcing in Dispersed Network Manufacturing Systems
9
作者 Rob Dekkers Luping Wang 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期249-,共1页
The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at t... The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at tention to the management of the total value chain and therefore puts emphasis o n outsourcing. In fact, outsourcing is an efficient way of utilizing available r esources and has become one key aspect of the manufacturing strategy. Improved d ecision and organization on outsourcing will result in cost production and short er lead-times. However, most concepts and practice of traditional outsourcing do not adapt to t he changing environment and meet increasing performance requirements. On the oth er hand, virtual organisations might display instability between pure outsourcin g and establishing alliance. Balance and trade-off between independent agents a nd creating alliance are thus required. Therefore, the purpose of this paper is to develop a model to support decision-making, management and control on outsou rcing in a dispersed network manufacturing system and to discuss several key iss ues that are relevant to the relationship between the agents of the network. Dev elopment of the model will deploy Applied System Theory and will be built on fou ndations of earlier research on industrial management such the theories of Outso urcing, Order Entry Points, Design of Organisations and Logistic Control. The is sues that will be addressed in this paper are: · The selection of suppliers and co-makers; · Communication between suppliers and clients; · The mechanisms for profit-sharing between agents; · The product data management to integrate the knowledge of the different agent s into product design. Industrial companies will benefit from this research by the practical methods an d implementation extending their business models beyond concepts for outsourcing and alliances. Additionally, the exploration will lead to proactive contributio n of manufacturing during engineering, which would improve management and contro l of dispersed manufacturing systems. 展开更多
关键词 management and Control of Outsourcing in Dispersed network Manufacturing SYSTEMS
下载PDF
Inventory Management and Demand Forecasting Improvement of a Forecasting Model Based on Artificial Neural Networks
10
作者 Cisse Sory Ibrahima Jianwu Xue Thierno Gueye 《Journal of Management Science & Engineering Research》 2021年第2期33-39,共7页
Forecasting is predicting or estimating a future event or trend.Supply chains have been constantly growing in most countries ever since the industrial revolution of the 18th century.As the competitiveness between supp... Forecasting is predicting or estimating a future event or trend.Supply chains have been constantly growing in most countries ever since the industrial revolution of the 18th century.As the competitiveness between supply chains intensifies day by day,companies are shifting their focus to predictive analytics techniques to minimize costs and boost productivity and profits.Excessive inventory(overstock)and stock outs are very significant issues for suppliers.Excessive inventory levels can lead to loss of revenue because the company's capital is tied up in excess inventory.Excess inventory can also lead to increased storage,insurance costs and labor as well as lower and degraded quality based on the nature of the product.Shortages or out of stock can lead to lost sales and a decline in customer contentment and loyalty to the store.If clients are unable to find the right products on the shelves,they may switch to another vendor or purchase alternative items.Demand forecasting is valuable for planning,scheduling and improving the coordination of all supply chain activities.This paper discusses the use of neural networks for seasonal time series forecasting.Our objective is to evaluate the contribution of the correct choice of the transfer function by proposing a new form of the transfer function to improve the quality of the forecast. 展开更多
关键词 Inventory management Demand forecasting Seasonal time series Artificial neural networks Transfer function Inventory management Demand forecasting Seasonal time series Artificial neural networks Transfer function
下载PDF
Coordinated Management of 5G Core Slices by MANO and OSS/BSS
11
作者 Wei-Cheng Chang Fuchun Joseph Lin 《Journal of Computer and Communications》 2021年第6期52-72,共21页
To manage and orchestrate Network Slices (NSs) for 5G Core (5GC), the MANO (MANagement and Orchestration) framework is proposed by European Telecommunications Standard Institute (ETSI). In most research testbeds, MANO... To manage and orchestrate Network Slices (NSs) for 5G Core (5GC), the MANO (MANagement and Orchestration) framework is proposed by European Telecommunications Standard Institute (ETSI). In most research testbeds, MANO systems such as Tacker, OSM and ONAP are used to initiate network slices. However, this doesn’t comply with the 3GPP 5G standards as MANO should only be responsible for dynamic management of NSs, and the static management such as provisioning or unprovisioning a network slice should be left to OSS/BSS (Operation/Business Support System). Thus, in our testbed, an integrated architecture was designed in which the management of network slices will be coordinated by both MANO and OSS/BSS. MANO would handle on-boarding, instantiating, scaling and terminating of network slices while OSS/BSS is responsible for static management of slices including provisioning and unprovisioning of network slices. To evaluate our system, it was compared with the management systems equipped with only OSS/BSS or MANO in order to analyze the shortfalls of those systems when used to deploy network slices. Through this analysis, this research confirms the necessity of applying both OSS/BSS and MANO for the coordinated management of 5G core slices as adopted by 3GPP. 展开更多
关键词 network Slice 5G MANO OSS/BSS network management
下载PDF
Security,Controllability,Manageability and Survivability in Trustworthy Network
12
作者 Wang Sheng, Yu Hongfang, Xu Du (School of Communication and Information Engineering ,University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China) 《ZTE Communications》 2008年第1期33-38,共6页
The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming m... The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming more and more obvious. Although the Internet community came up with a consensus that the future network should be trustworthy, the concept of "trustworthy networks" and the ways leading us to a trustworthy network are not yet clear. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy network. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. The network trustworthiness could and should be eventually achieved. 展开更多
关键词 Security Controllability Manageability and Survivability in Trustworthy network NET
下载PDF
Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN
13
作者 M.Manikandan S.Sakthivel V.Vivekanandhan 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3169-3185,共17页
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed network.This closed network is intended to share sensitive location-centric information from a source node ... Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed network.This closed network is intended to share sensitive location-centric information from a source node to the base station through efficient routing mechanisms.The efficiency of the sensor node is energy bounded,acts as a concentrated area for most researchers to offer a solution for the early draining power of sensors.Network management plays a significant role in wireless sensor networks,which was obsessed with the factors like the reliability of the network,resource management,energy-efficient routing,and scalability of services.The topology of the wireless sensor networks acts dri-ven factor for network efficiency which can be effectively maintained by perform-ing the clustering process effectively.More solutions and clustering algorithms have been offered by various researchers,but the concern of reduced efficiency in the routing process and network management still exists.This research paper offers a hybrid algorithm composed of a memetic algorithm which is an enhanced version of a genetic algorithm integrated with the adaptive hill-climbing algorithm for performing energy-efficient clustering process in the wireless sensor networks.The memetic algorithm employs a local searching methodology to mitigate the premature convergence,while the adaptive hill-climbing algorithm is a local search algorithm that persistently migrates towards the increased elevation to determine the peak of the mountain(i.e.,)best cluster head in the wireless sensor networks.The proposed hybrid algorithm is compared with the state of art clus-tering algorithm to prove that the proposed algorithm outperforms in terms of a network life-time,energy consumption,throughput,etc. 展开更多
关键词 Wireless sensor networks TOPOLOGY CLUSTERING memetic algorithm adaptive hill climbing algorithm network management energy consumption THROUGHPUT
下载PDF
Network Meets ChatGPT:Intent Autonomous Management,Control and Operation
14
作者 Jingyu Wang Lei Zhang +6 位作者 Yiran Yang Zirui Zhuang Qi Qi Haifeng Sun Lu Lu Junlan Feng Jianxin Liao 《Journal of Communications and Information Networks》 EI CSCD 2023年第3期239-255,共17页
Telecommunication has undergone significant transformations due to the continuous advancements in internet technology,mobile devices,competitive pricing,and changing customer preferences.Specifically,the most recent i... Telecommunication has undergone significant transformations due to the continuous advancements in internet technology,mobile devices,competitive pricing,and changing customer preferences.Specifically,the most recent iteration of OpenAI’s large language model chat generative pre-trained transformer(ChatGPT)has the potential to propel innovation and bolster operational performance in the telecommunications sector.Nowadays,the exploration of network resource management,control,and operation is still in the initial stage.In this paper,we propose a novel network artificial intelligence architecture named language model for network traffic(NetLM),a large language model based on a transformer designed to understand sequence structures in the network packet data and capture their underlying dynamics.The continual convergence of knowledge space and artificial intelligence(AI)technologies constitutes the core of intelligent network management and control.Multi-modal representation learning is used to unify the multi-modal information of network indicator data,traffic data,and text data into the same feature space.Furthermore,a NetLM-based control policy generation framework is proposed to refine intent incrementally through different abstraction levels.Finally,some potential cases are provided that NetLM can benefit the telecom industry. 展开更多
关键词 network management and control architecture generative pre-trained transformer intent-based networking NetLM network knowledge
原文传递
Application of GIS and GPS technologies in managing a statewide groundwater monitoring and assessment network in the state of Minnesota,USA
15
《Global Geology》 1998年第1期85-85,共1页
关键词 GIS GPS Application of GIS and GPS technologies in managing a statewide groundwater monitoring and assessment network in the state of Minnesota USA USA
下载PDF
无线传感网中轻型简单网络管理协议(英文) 被引量:2
16
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
下载PDF
Self-healing and SDN:bridging the gap
17
作者 Leonardo Ochoa-Aday Cristina Cervell o-Pastor Adriana Fernaandez-Fernaandez 《Digital Communications and Networks》 SCIE 2020年第3期354-368,共15页
Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,ma... Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,maintaining accurate knowledge of the network after a failure is one of the largest challenges in the SDN.Motivated by this reality,this paper focuses on the use of self-healing properties to boost the SDN robustness.This approach,unlike traditional schemes,is not based on proactively configuring multiple(and memory-intensive)backup paths in each switch or performing a reactive and time-consuming routing computation at the controller level.Instead,the control paths are quickly recovered by local switch actions and subsequently optimized by global controller knowledge.Obtained results show that the proposed approach recovers the control topology effectively in terms of time and message load over a wide range of generated networks.Consequently,scalability issues of traditional fault recovery strategies are avoided. 展开更多
关键词 Software-defined network Autonomic network management Protocol design Fault tolerance network management
下载PDF
A Multi-Interface Remote Monitoring and Control System Architecture Based on Embedded Server 被引量:3
18
作者 He Liu Lei Wang +1 位作者 Sheng-Peng Sun Ya-Dong Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第6期67-76,共10页
This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen ... This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen as the CPU of the embedded server with a linux operation system( OS) environment. The embedded server provides multiple interfaces for supporting various application scenarios. The whole network is based on local area network and adopts the Browser / Server( B / S) model. The monitoring and control node is as a browser endpoint and the remote node with an embedded server is as a server endpoint. Users can easily acquire various sensors information through writing Internet protocol address of remote node on the computer browser. Compared with client / server( C / S) mode,B / S model needs less maintain and can be applicable to large user group. In addition,a simple network management protocol( SNMP) is used for management of devices in Internet protocol( IP) networks. The results of the demonstration experiment show that the proposed system gives good support to manage the network from different user terminals and allows the users to better interact with the ambient environment. 展开更多
关键词 MULTI-INTERFACE remote monitoring and control embedded server simple network management protocol(SNMP
下载PDF
Managing System Losses to Improve Energy Efficiency within the Electricity Company of Ghana (ECG) Limited 被引量:1
19
作者 Vincent Kwame Osei-Appiah Jones Lewis Arthur 《Smart Grid and Renewable Energy》 2022年第6期121-136,共16页
The inability to achieve the target of universal access to electricity is influenced by several factors including funding limitations, the use of obsolete equipment, power theft, and system losses confronting the elec... The inability to achieve the target of universal access to electricity is influenced by several factors including funding limitations, the use of obsolete equipment, power theft, and system losses confronting the electricity distribution services of the Electricity Company of Ghana Limited (ECG). The study assessed the components of system losses within the ECG by determining and computing the percentage of system losses within ECG, examining the causes of both commercial and technical losses in ECG, and determining ways to improve energy efficiency by reducing system losses in the most cost-efficient manner. The study adopted deductive reasoning and a quantitative approach to guide data collection and analysis of the research output. A sample of 345 technical and non-technical staff of ECG in the Greater Accra Metropolis was selected from a population of 2500. Purposive, simple random, and cluster sampling techniques were used in identifying and accessing respondents for the study. Descriptive statistics were applied to measure central tendency and degrees of dispersion and the Relative Importance Index (RII) to predict criterion and predictor variables. The impact of low voltage network losses can adversely contribute to technical losses (20%) and reduce energy efficiency in power or electricity distribution companies. Non-technical losses are mainly caused by illegal connections, meter problems, and billing problems. Each of the non-technical losses contributes a maximum of 10% to system losses. Contributors to system losses at ECG are ranked first for power theft and least for lack of incentives. System losses at ECG include metering inaccuracies, bad workmanship, unmetered supply, and lengthy distribution lines, each recording a mean value of above 3.5. Measures to improve monitoring of the networks and systems at ECG and discourage power theft should include an extensive quantification, patrolling, and inspection of the entire network to assess the extent of the network and conditions relevant for the placement of systematically planned maintenance programmes. 展开更多
关键词 network management System Losses ELECTRICITY Cost Efficiency Energy management
下载PDF
An Efficient Internet Traffic Classification System Using Deep Learning for IoT 被引量:1
20
作者 Muhammad Basit Umair Zeshan Iqbal +3 位作者 Muhammad Bilal Jamel Nebhen Tarik Adnan Almohamad Raja Majid Mehmood 《Computers, Materials & Continua》 SCIE EI 2022年第4期407-422,共16页
Internet of Things(IoT)defines a network of devices connected to the internet and sharing a massive amount of data between each other and a central location.These IoT devices are connected to a network therefore prone... Internet of Things(IoT)defines a network of devices connected to the internet and sharing a massive amount of data between each other and a central location.These IoT devices are connected to a network therefore prone to attacks.Various management tasks and network operations such as security,intrusion detection,Quality-of-Service provisioning,performance monitoring,resource provisioning,and traffic engineering require traffic classification.Due to the ineffectiveness of traditional classification schemes,such as port-based and payload-based methods,researchers proposed machine learning-based traffic classification systems based on shallow neural networks.Furthermore,machine learning-based models incline to misclassify internet traffic due to improper feature selection.In this research,an efficient multilayer deep learning based classification system is presented to overcome these challenges that can classify internet traffic.To examine the performance of the proposed technique,Moore-dataset is used for training the classifier.The proposed scheme takes the pre-processed data and extracts the flow features using a deep neural network(DNN).In particular,the maximum entropy classifier is used to classify the internet traffic.The experimental results show that the proposed hybrid deep learning algorithm is effective and achieved high accuracy for internet traffic classification,i.e.,99.23%.Furthermore,the proposed algorithm achieved the highest accuracy compared to the support vector machine(SVM)based classification technique and k-nearest neighbours(KNNs)based classification technique. 展开更多
关键词 Deep learning internet traffic classification network traffic management QoS aware application classification
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部