network management system
Recently Published Documents


TOTAL DOCUMENTS

459
(FIVE YEARS 35)

H-INDEX

12
(FIVE YEARS 1)

2022 ◽  
Vol 2146 (1) ◽  
pp. 012024
Author(s):  
Wei Qi ◽  
Chun Ying ◽  
Sheng Yong ◽  
Guizhi Zhao ◽  
Lihua Wang

Abstract With the development and popularization of computer artificial intelligence technology, more and more intelligent machines are gradually produced. These intelligent machines have brought great convenience to people’s lives. This paper studies the control method of snake robot based on environment adaptability, which mainly explains the construction and stability of multi-modal CPG model. In addition, this paper also studies the trajectory tracking and dynamic obstacle avoidance of mobile robot based on deep learning.


2021 ◽  
Vol 7 (4) ◽  
pp. 31-42
Author(s):  
A. Kanaev ◽  
E. Oparin ◽  
E. Oparina

This article provides an overview of the interaction between the warring parties and the main stages of the confrontation between the organized attacker and the information security system in the implementation of an attack on the network management system of clock network synchronization. A simulation model has been developed that reflects all stages of the struggle, which allows, depending on the resources of an organized attacker and the information security system, to obtain probabilistic and temporal characteristics of the results of the confrontation. Simulation has been carried out for various scenarios of organizing an attack at all stages of the confrontation, from the overwhelming advantage of an organized malefactor to the overwhelming advantage of an information security system. The results obtained in the general case can be used by security administrators and network administrators to make adjustments to the strategy of organizing the protection of the network management system of clock network synchronization.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Mohammad Alsaffar ◽  
Abdulsattar Abdullah Hamad ◽  
Abdullah Alshammari ◽  
Gharbi Alshammari ◽  
Tariq S. Almurayziq ◽  
...  

The Internet of Things (IoT) has the potential to transform the public sector by combining the leading technical and business trends of mobility, automation, and data analysis to dramatically alter the way public bodies collect data and information. Embedded sensors, actuators, and other devices that capture and transmit information about network activity in real-time are used in the Internet of Things to connect networks of physical objects. The design of a network management system for an IoT network is presented in this paper, which uses the edge computing model. This design is based on the Internet management model, which uses the SNMP protocol to communicate between managed devices, and a gateway, which uses the SOAP protocol to communicate with a management application. This work allowed for the identification and analysis of the primary network management system initiatives for IoT networks, in which there are four fundamental device management requirements for any deployment of IoT devices: provisioning and authentication, configuration and control, monitoring and diagnostics, and software updates and maintenance.


2021 ◽  
Vol 5 (6) ◽  
pp. 1-5
Author(s):  
Yue Zhang ◽  
Zefeng Jian ◽  
Hao Wang

The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation. This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis, for the reference of relevant personnel, in order to better promote the collection of power grid communication network data.


2021 ◽  
pp. 324-331
Author(s):  
Dafei Wu

Firewall and intrusion detection system are widely used network security protection equipment, which plays a vital role in preventing network attack and intrusion. However, they have inevitable defects, which reduces the protection function provided in actual use. Therefore, in order to further improve network security, this paper designs a new network security protection technology which can integrate the advantages of multiple security technologies and make up for their shortcomings. This paper proposes a network security defense model based on the combination strategy of firewall and IPS. The purpose of policy based intrusion prevention system (pb-ips) is to realize the real combination of security management and network management system. This can take the network management system as the intermediary, integrate the firewall technology and intrusion detection technology, and realize a new network security protection measures.


Sign in / Sign up

Export Citation Format

Share Document