首页 > 最新文献

Global journal of computer science and technology最新文献

英文 中文
Identification of Anesthesia Stages from EEG Signals using Wavelet Entropy and Backpropagation Neural Network 基于小波熵和反向传播神经网络的脑电信号麻醉阶段识别
Pub Date : 2019-03-26 DOI: 10.34257/GJCSTDVOL19IS1PG17
A. Rasel
This study focuses on entropy based analysis of EEG signals for extracting features for a neural network based solution for identifying anesthetic levels. The process involves an optimized back propagation neural network with a supervised learning method. We provided the extracted features from EEG signals as training data for the neural network. The target outputs provided are levels of anesthesia stages. Wavelet analysis provides more effective extraction of key features from EEG data than power spectral density analysis using Fourier transform. The key features are used to train the Back Propagation Neural Network (BPNN) for pattern classification network. The final result shows that entropy-based feature extraction is an effective procedure for classifying EEG data.
本研究的重点是基于熵的脑电图信号分析,为基于神经网络的麻醉水平识别解决方案提取特征。该过程涉及一个优化的反向传播神经网络与监督学习方法。我们将提取的脑电信号特征作为神经网络的训练数据。提供的目标输出是麻醉阶段的水平。与傅立叶变换的功率谱密度分析相比,小波分析能更有效地提取脑电数据的关键特征。利用这些关键特征来训练用于模式分类网络的反向传播神经网络(BPNN)。结果表明,基于熵的特征提取是一种有效的脑电信号分类方法。
{"title":"Identification of Anesthesia Stages from EEG Signals using Wavelet Entropy and Backpropagation Neural Network","authors":"A. Rasel","doi":"10.34257/GJCSTDVOL19IS1PG17","DOIUrl":"https://doi.org/10.34257/GJCSTDVOL19IS1PG17","url":null,"abstract":"This study focuses on entropy based analysis of EEG signals for extracting features for a neural network based solution for identifying anesthetic levels. The process involves an optimized back propagation neural network with a supervised learning method. We provided the extracted features from EEG signals as training data for the neural network. The target outputs provided are levels of anesthesia stages. Wavelet analysis provides more effective extraction of key features from EEG data than power spectral density analysis using Fourier transform. The key features are used to train the Back Propagation Neural Network (BPNN) for pattern classification network. The final result shows that entropy-based feature extraction is an effective procedure for classifying EEG data.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network IPv6网络中OSPFv3路由协议的研究与优化仿真
Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG11
Md. Anwar Hossain, M. S. Akter
Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.
路由是传递数据包的一种设计方法。用户是在路由配置中分配的路径。路由器在网络中提供动态路由的重要作用。每种路由协议的结构和配置不同。下一代互联网协议IPv6提供了大的地址空间,简单的报头格式。它主要是有效和高效的路由。它既保证了良好的服务质量,又提供了安全保障。对IPv6网络中的路由协议(OSPFv3)进行了研究,并利用“cisco packet tracer”实现了该协议。Ping命令用于检查结果。在Cisco平台上创建的小型虚拟网络,也用于在IPv6网络中测试OSPFv3协议。本文还介绍了路由器和终端设备中IPv6地址分配的逐步配置和说明。在网络中接收和发送数据包是互联网协议层的职责。并在cisco分组虚拟环境的模拟模式下,对OSPFv3上通过IPv6转发报文的数据进行分析,最终确定IPv6环境下安全、快速的协议。
{"title":"Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network","authors":"Md. Anwar Hossain, M. S. Akter","doi":"10.34257/GJCSTEVOL19IS2PG11","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG11","url":null,"abstract":"Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy Efficient Mobile Sink Based Routing Model For Maximizing Lifetime of Wireless Sensor Network 基于节能移动汇聚的无线传感器网络寿命最大化路由模型
Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG1
Naveen Ghorpade, P. Vijayakarthik
{"title":"Energy Efficient Mobile Sink Based Routing Model For Maximizing Lifetime of Wireless Sensor Network","authors":"Naveen Ghorpade, P. Vijayakarthik","doi":"10.34257/GJCSTEVOL19IS2PG1","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG1","url":null,"abstract":"","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129251433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Edge Computing 移动边缘计算
Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG29
M. Sadiku, C. M. M. Kotteti, Sarhan M. Musa
Mobile applications are becoming increasingly computational intensive, while many mobile devices still have limited battery power and cannot support computational intensive tasks. Mobile edge computing (MEC) computing is an extension of edge computing, and it refers to computing at the edge of a network. In mobile edge computing, computing and storage nodes are placed at the Internet's edge near mobile devices. It places the edge clouds at the candidate locations. This paper presents a brief introduction to MEC.
移动应用程序正变得越来越计算密集型,而许多移动设备的电池电量仍然有限,无法支持计算密集型任务。移动边缘计算(MEC)计算是边缘计算的延伸,是指网络边缘的计算。在移动边缘计算中,计算和存储节点被放置在靠近移动设备的互联网边缘。它将边缘云在候选地点。本文对MEC进行了简要介绍。
{"title":"Mobile Edge Computing","authors":"M. Sadiku, C. M. M. Kotteti, Sarhan M. Musa","doi":"10.34257/GJCSTEVOL19IS2PG29","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG29","url":null,"abstract":"Mobile applications are becoming increasingly computational intensive, while many mobile devices still have limited battery power and cannot support computational intensive tasks. Mobile edge computing (MEC) computing is an extension of edge computing, and it refers to computing at the edge of a network. In mobile edge computing, computing and storage nodes are placed at the Internet's edge near mobile devices. It places the edge clouds at the candidate locations. This paper presents a brief introduction to MEC.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Encrypted Text Message Transmission in 5G Compatible Frequency-domain Subband Superposed Scheme Implemented MIMO OFDM Wireless Communication System 基于5G兼容频域子带叠加方案的MIMO OFDM无线通信系统加密短信传输性能评估
Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG17
M. A. Naher, Md. Omor Faruk, Md. Mahbubur Rahman, S. Ullah
In this paper, an investigative study has been made on the performance evaluation of encrypted text message transmission in 5G compatible multiuser frequency-domain subband superposed (FDSS) scheme implemented MIMO OFDM wireless communication system. The 2×2 multiantenna configured simulated system under consideration incorporates modern channel coding (LDPC and Repeat and Accumulate (RA)) and signal detection (Cholesky decomposition based ZF detection, Group Detection (GD) approach aided Efficient Zero-Forcing (ZF) and Lanczos method based efficient signal detection) techniques. In the scenario of transmitting encrypted text message over AWGN and Rayleigh fading channels, it is noticeable that implementation of Repeat and Accumulate channel coding and Group Detection (GD) approach aided Efficient Zero- Forcing (ZF) signal detection techniques is very much robust and effective in retrieving transmitted text messages for all users.
本文对5G兼容多用户频域子带叠加(FDSS)方案实现的MIMO OFDM无线通信系统中加密短信传输的性能评估进行了研究。所考虑的2×2多天线配置仿真系统结合了现代信道编码(LDPC和重复累加(RA))和信号检测(基于Cholesky分解的ZF检测、辅助高效零强迫(ZF)的群检测(GD)方法和基于Lanczos方法的高效信号检测)技术。在AWGN和瑞利衰落信道上传输加密文本消息的场景中,值得注意的是,重复和累积信道编码以及组检测(GD)方法辅助高效零强制(ZF)信号检测技术在检索所有用户传输的文本消息方面非常鲁棒和有效。
{"title":"Performance Evaluation of Encrypted Text Message Transmission in 5G Compatible Frequency-domain Subband Superposed Scheme Implemented MIMO OFDM Wireless Communication System","authors":"M. A. Naher, Md. Omor Faruk, Md. Mahbubur Rahman, S. Ullah","doi":"10.34257/GJCSTEVOL19IS2PG17","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG17","url":null,"abstract":"In this paper, an investigative study has been made on the performance evaluation of encrypted text message transmission in 5G compatible multiuser frequency-domain subband superposed (FDSS) scheme implemented MIMO OFDM wireless communication system. The 2×2 multiantenna configured simulated system under consideration incorporates modern channel coding (LDPC and Repeat and Accumulate (RA)) and signal detection (Cholesky decomposition based ZF detection, Group Detection (GD) approach aided Efficient Zero-Forcing (ZF) and Lanczos method based efficient signal detection) techniques. In the scenario of transmitting encrypted text message over AWGN and Rayleigh fading channels, it is noticeable that implementation of Repeat and Accumulate channel coding and Group Detection (GD) approach aided Efficient Zero- Forcing (ZF) signal detection techniques is very much robust and effective in retrieving transmitted text messages for all users.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125213596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analytic Real-Time Framework for IoT based Home Automation System 基于物联网的家庭自动化系统实时分析框架
Pub Date : 2019-03-14 DOI: 10.34257/GJCSTBVOL19IS1PG13
Nazmul Hossain, Rafia Sultana, Farzana Akter Lima, Md. Arifur Rahman
The Internet of Things or IoT means the ability to connect billions of physical devices around the world that are now linking to the internet for collecting and sharing data. Internet of Things (IoT) technologies is used to sense the real-time primordial manufacture data and included the energy alliance data and the provision circumstance data. The Internet of Things (IoT) will approve any contents to be sensed or monitored remotely wherever there any remaining network infrastructure, making amenities for the integration of the actual world into computer-based systems. Real-time narrates the path of flowing media is processing. In the real-time procedure, anyone can entrance information barring to narrate for it and save our time.
物联网或IoT意味着连接全球数十亿物理设备的能力,这些设备现在连接到互联网以收集和共享数据。利用物联网技术实时感知原始制造数据,包括能源联盟数据和供给环境数据。物联网(IoT)将允许任何内容被远程感知或监控,只要有任何剩余的网络基础设施,为将现实世界整合到基于计算机的系统提供便利。实时叙述流动介质的处理路径。在实时过程中,任何人都可以为其输入信息进行叙述,节省了我们的时间。
{"title":"An Analytic Real-Time Framework for IoT based Home Automation System","authors":"Nazmul Hossain, Rafia Sultana, Farzana Akter Lima, Md. Arifur Rahman","doi":"10.34257/GJCSTBVOL19IS1PG13","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG13","url":null,"abstract":"The Internet of Things or IoT means the ability to connect billions of physical devices around the world that are now linking to the internet for collecting and sharing data. Internet of Things (IoT) technologies is used to sense the real-time primordial manufacture data and included the energy alliance data and the provision circumstance data. The Internet of Things (IoT) will approve any contents to be sensed or monitored remotely wherever there any remaining network infrastructure, making amenities for the integration of the actual world into computer-based systems. Real-time narrates the path of flowing media is processing. In the real-time procedure, anyone can entrance information barring to narrate for it and save our time.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Taxonomy of Schedulers – Operating Systems, Clusters and Big Data Frameworks 调度器的分类——操作系统、集群和大数据框架
Pub Date : 2019-03-14 DOI: 10.34257/GJCSTBVOL19IS1PG25
L. Sliwko
This review analyzes deployed and actively used workload schedulers’ solutions and presents a taxonomy in which those systems are divided into several hierarchical groups based on their architecture and design. While other taxonomies do exist, this review has focused on the key design factors that affect the throughput and scalability of a given solution, as well as the incremental improvements which bettered such an architecture. This review gives special attention to Google’s Borg, which is one of the most advanced and published systems of this kind.
本文分析了已部署和正在使用的工作负载调度器的解决方案,并提出了一种分类法,在这种分类法中,这些系统根据其体系结构和设计分为几个层次结构组。虽然存在其他分类法,但本文主要关注影响给定解决方案的吞吐量和可伸缩性的关键设计因素,以及改进此类体系结构的增量改进。本文特别关注谷歌的Borg,它是此类系统中最先进和已发布的系统之一。
{"title":"A Taxonomy of Schedulers – Operating Systems, Clusters and Big Data Frameworks","authors":"L. Sliwko","doi":"10.34257/GJCSTBVOL19IS1PG25","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG25","url":null,"abstract":"This review analyzes deployed and actively used workload schedulers’ solutions and presents a taxonomy in which those systems are divided into several hierarchical groups based on their architecture and design. While other taxonomies do exist, this review has focused on the key design factors that affect the throughput and scalability of a given solution, as well as the incremental improvements which bettered such an architecture. This review gives special attention to Google’s Borg, which is one of the most advanced and published systems of this kind.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring the Performance on Load Balancing Algorithms 测量负载均衡算法的性能
Pub Date : 2019-03-14 DOI: 10.34257/GJCSTBVOL19IS1PG41
Saumendu Deb Roy, Md. Alam Hossain, Su Sen, Nazmul Hossain, Md. Rashid Al Asif
Load balancing is an integrated aspect of the environment in cloud computing. Cloud computing has lately outgoing technology. It has getting exoteric day by day residence widespread chance in close to posterior. Cloud computing is defined as a massively distributed computing example that is moved by an economic scale in which a repertory of abstracted virtualized energetically. The number of clients in cloud computing is increasing exponentially. The huge amount of user requests attempt to entitle the collection for numerous applications. Which alongside with heavy load not far afield off from cloud server. Whenever particular (Virtual Machine) VMs are overloaded then there are no more duties should be addressed to overloaded VM if under loaded VMs are receivable. For optimizing accomplishment and better response or reaction time the load has to be balanced between overloaded VMs (virtual machines). This Paper describes briefly about the load balancing accession and identifies which is better than others (load balancingalgorithm).
负载平衡是云计算环境的一个集成方面。云计算是一项最新的技术。它在近后有日趋开放的居住广泛机会。云计算被定义为一个大规模分布式计算的例子,它被一个经济规模所移动,在这个经济规模中,一个抽象的储备被大力虚拟化。云计算中的客户端数量呈指数级增长。大量的用户请求试图为众多应用程序命名集合。这与沉重的负载不远处的云服务器。每当特定的(虚拟机)虚拟机过载时,如果负载不足的虚拟机是可收回的,则不应向过载的虚拟机分配更多的任务。为了优化完成和更好的响应或反应时间,负载必须在过载的vm(虚拟机)之间进行平衡。本文简要介绍了负载均衡算法,并指出了负载均衡算法的优劣。
{"title":"Measuring the Performance on Load Balancing Algorithms","authors":"Saumendu Deb Roy, Md. Alam Hossain, Su Sen, Nazmul Hossain, Md. Rashid Al Asif","doi":"10.34257/GJCSTBVOL19IS1PG41","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG41","url":null,"abstract":"Load balancing is an integrated aspect of the environment in cloud computing. Cloud computing has lately outgoing technology. It has getting exoteric day by day residence widespread chance in close to posterior. Cloud computing is defined as a massively distributed computing example that is moved by an economic scale in which a repertory of abstracted virtualized energetically. The number of clients in cloud computing is increasing exponentially. The huge amount of user requests attempt to entitle the collection for numerous applications. Which alongside with heavy load not far afield off from cloud server. Whenever particular (Virtual Machine) VMs are overloaded then there are no more duties should be addressed to overloaded VM if under loaded VMs are receivable. For optimizing accomplishment and better response or reaction time the load has to be balanced between overloaded VMs (virtual machines). This Paper describes briefly about the load balancing accession and identifies which is better than others (load balancing\u0000algorithm).","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117275162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SDN-Based Approach to Evaluate the Best Controller: Internal Controller NOX and External Controllers POX, ONOS, RYU 基于sdn的最佳控制器评估方法:内部控制器NOX和外部控制器POX, ONOS, RYU
Pub Date : 2019-02-07 DOI: 10.34257/GJCSTEVOL19IS1PG21
Mohammad A. Sheikh, Monishanker Halder, Sk. Shalauddin Kabir, Md. Wasim Miah, Sawrnali Khatun
Software Defined Networking (SDN) is a rising technique to deal with replace patrimony network (coupled hardware and software program) control and administration by separating the control plane (software program) from the information plane (hardware). It gives adaptability to the engineers by influencing the focal control to plane straightforwardly programmable. Some new difficulties, for example, single purpose of disappointment, may be experienced because of the original control plane. SDN concentrated on flexibility where the security of the system was not essentially considered. It promises to give a potential method to present Quality of Service (QoS) ideas in the present correspondence networks. SDN automatically changes the behavior and functionality of system devices utilizing a single state program. Its immediate OpenFlow is planned by these properties. The affirmation of Quality of Service (QoS) thoughts winds up possible in a versatile and dynamic path with SDN. It gives a couple of favorable circumstances including, organization and framework versatility, improved exercises and tip-top performances.
软件定义网络(SDN)是一种新兴的技术,通过将控制平面(软件程序)与信息平面(硬件)分离来处理替代传统网络(耦合的硬件和软件程序)的控制和管理。它通过将焦点控制改为平面直接可编程,给工程师提供了适应性。一些新的困难,例如,单一目的的失望,可能会因为原来的控制平面而经历。SDN关注的是灵活性,而不是系统的安全性。它有望为当前通信网络中的服务质量(QoS)思想提供一种潜在的方法。SDN利用单个状态程序自动改变系统设备的行为和功能。它的直接OpenFlow是由这些属性规划的。对服务质量(QoS)思想的肯定最终在SDN的通用和动态路径中成为可能。它提供了一些有利的环境,包括组织和框架的通用性,改进的练习和顶尖的表现。
{"title":"SDN-Based Approach to Evaluate the Best Controller: Internal Controller NOX and External Controllers POX, ONOS, RYU","authors":"Mohammad A. Sheikh, Monishanker Halder, Sk. Shalauddin Kabir, Md. Wasim Miah, Sawrnali Khatun","doi":"10.34257/GJCSTEVOL19IS1PG21","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS1PG21","url":null,"abstract":"Software Defined Networking (SDN) is a rising technique to deal with replace patrimony network (coupled hardware and software program) control and administration by separating the control plane (software program) from the information plane (hardware). It gives adaptability to the engineers by influencing the focal control to plane straightforwardly programmable. Some new difficulties, for example, single purpose of disappointment, may be experienced because of the original control plane. SDN concentrated on flexibility where the security of the system was not essentially considered. It promises to give a potential method to present Quality of Service (QoS) ideas in the present correspondence networks. SDN automatically changes the behavior and functionality of system devices utilizing a single state program. Its immediate OpenFlow is planned by these properties. The affirmation of Quality of Service (QoS) thoughts winds up possible in a versatile and dynamic path with SDN. It gives a couple of favorable circumstances including, organization and framework versatility, improved exercises and tip-top performances.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Systematic Review of Security in Electronic Commerce- Threats and Frameworks 电子商务安全的系统回顾——威胁与框架
Pub Date : 2019-02-07 DOI: 10.34257/GJCSTEVOL19IS1PG33
N. Kuruwitaarachchi, P. Abeygunawardena, L. Rupasingha, S. Udara
There is a remarkable scope for more streamlined living through an increase of e-platforms specially ecommerce, but this coincides with an increase in security concerns since the global market place is virtual and anonymous. Therefore, users have to blindly trust the online providers. In order to overcome this physiological barrier the eplatforms should ensure utmost security. If not the ecommerce industry is unableto perform in the market effectively. Thereby arises the need to perform a systematic review of security issues in the e-commerce industry and to discover how different frameworks address these problems. This paper aims to identifythe main security problems faced by both customers and vendors when interacting with ecommerce platforms and to evaluate general security management frameworks based on the main security areas identified.
随着电子平台尤其是电子商务的增加,人们的生活有了极大的精简空间,但与此同时,由于全球市场是虚拟和匿名的,人们对安全的担忧也在增加。因此,用户不得不盲目信任在线提供商。为了克服这种生理障碍,电子平台必须确保最大的安全性。否则,电子商务行业就无法在市场上有效地发挥作用。因此,需要对电子商务行业中的安全问题进行系统审查,并发现不同的框架如何解决这些问题。本文旨在确定客户和供应商在与电子商务平台交互时面临的主要安全问题,并根据确定的主要安全领域评估一般安全管理框架。
{"title":"A Systematic Review of Security in Electronic Commerce- Threats and Frameworks","authors":"N. Kuruwitaarachchi, P. Abeygunawardena, L. Rupasingha, S. Udara","doi":"10.34257/GJCSTEVOL19IS1PG33","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS1PG33","url":null,"abstract":"There is a remarkable scope for more streamlined living through an increase of e-platforms specially ecommerce, but this coincides with an increase in security concerns since the global market place is virtual and anonymous. Therefore, users have to blindly trust the online providers. In order to overcome this physiological barrier the eplatforms should ensure utmost security. If not the ecommerce industry is unableto perform in the market effectively. Thereby arises the need to perform a systematic review of security issues in the e-commerce industry and to discover how different frameworks address these problems. This paper aims to identifythe main security problems faced by both customers and vendors when interacting with ecommerce platforms and to evaluate general security management frameworks based on the main security areas identified.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Global journal of computer science and technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1