Real-Time Subscriber Session Management on 5G NSA Wireless Network Systems

Author(s):  
Kwan Young Park ◽  
Onur Soyer
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 134055-134062 ◽  
Author(s):  
Zhifang Wang ◽  
Jianguo Yu ◽  
Shangjing Lin ◽  
Junguo Dong ◽  
Zhen Yu

2012 ◽  
Vol 241-244 ◽  
pp. 2504-2509
Author(s):  
Yan Li ◽  
Qiao Xiang Gu

The equipment, called detection platform of the cylinders, is used for detecting cylinders so that cylinders can be at ease use. In order to transmit the real-time detection data to PC for further processing, the platform should be connected with PC. Cable connection, in some production and environmental conditions, is limited. Under the circumstance, building wireless network is the better choice. Through comparative studying, ZigBee is chosen to be the technology for building wireless network. ZigBee chip and ZigBee2006 protocol stack are the core components in the ZigBee nodes.


2003 ◽  
Author(s):  
William Frederick Young ◽  
David Patrick Duggan

2019 ◽  
Vol 2 (2) ◽  
pp. 64-80
Author(s):  
Saleh Dwiyatno ◽  
Ayu Purnama Sari ◽  
Agus Irawan ◽  
Safig Safig

Information security is very important in today's technology. Information storage and crossing is currently no longer using paper media, but has used a lot of computer and internet media. PT. Torini Jaya Abadi is one that uses computer and internet media for information storage and crossing. However, there are disturbances such as heavy server access, which cannot be accessed and sometimes it cannot enter into the database server from the indication that the server might be exposed to a virus or DDoS (Distributed Danial of Service) type attacks occur on the server. Based on these problems, the author uses a honeypot to detect an attack based on alerts that have been accommodated in the log and can also provide information about the attacks that occur, from the results obtained honeyd is able to resemble an original system that pretends to have services that are not real , also able to detect attacks in real time and provide information from attackker, honeyd can emulate virtual hosts that are similar to the original computer, by obtaining logs from the honeyd admin system to find out information that occurs on the server, with honeyd network systems can help detect attacks in real time.


Author(s):  
Omar Faruk Riyad ◽  
Ahraf Sharif ◽  
Arif Ur Rahman Chowdhury Suhan ◽  
Mohammad Monirujjaman Khan
Keyword(s):  

Author(s):  
Salman H. Khan ◽  
Arsalan H. Khan ◽  
Zeashan H. Khan

The role of computational intelligence techniques in applied sciences and engineering is becoming popular today. It is essential because the autonomous engineering applications require intelligent decision in real time in order to achieve the desired goal. This chapter discusses some of the approaches to demonstrate various applications of computational intelligence in dependable networked control systems and a case study of teleoperation over wireless network. The results have shown that computational intelligence algorithms can be successfully implemented on an embedded application to offer an improved online performance. The different approaches have been compared and could be chosen as per application requirements.


Author(s):  
Nidhi Sharma ◽  
Priyanka Ahlawat

The 5th Generation of wireless network technology (5G) is a rising set of cellular technologies, specifications and projected standards that promise to dramatically improve the speed and responsiveness of wireless networks. The arrival of 5G guarantees new architectures for connecting billions of IoT (Internet of Things) devices and introduces a bunch of development challenges for sensible applications. Enterprises measure are trying to find out the solutions for omnipresent property and near-real-time remote solutions and management capabilities for mission-critical IoT systems and 5G is here to answer that decision.


2014 ◽  
Vol 1022 ◽  
pp. 392-395 ◽  
Author(s):  
Rang Yong Zhang ◽  
Geng Ma ◽  
Guang He Cheng

CNC equipment distributed monitoring system based on cloud computing technology provides a sable and reliable remote real time monitoring system to monitoring a mount of CNC equipment distributed in a large wide area by wireless network and GPRS communication technology which can be used to remote diagnostics and improve service respond speed.


Sign in / Sign up

Export Citation Format

Share Document