Publications

Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering

GET ALERTS

eISSN: 2470-8038

DESCRIPTION

FEATURED ARTICLES

Quadrotor Formation Control Method Based on Graph and Consistency Theory
Advanced Dynamic Autonomous Knowledge Learning Method for Distance Learning

VOLUME 4 , ISSUE 2 (Oct 2019) - List of articles

IPV9 is the Foundation of the Future Digital World

Peide Lou/ Fei Xu

Abstract The share of the network economy has already accounted for 22% of China’s GDP, and its importance is self-evident. The two biggest problems involved in the network are network sovereignty and broadband charges, and the sovereignty of cyberspace is the “life gate” of the network. China’s cyber sovereignty is subject to the United States, resulting in political oppression, security, and economic exploitation. Therefore, without cyber sovereignty, there would be no national security withou(..)

DOI: 10.21307/ijanmc-2019-041

Research on IPv6 Address Space and Super IP Upgrade

Tao Wang/ Xiaodong Wang

Abstract The IPv6 address space design is not a 128-bit address space that people think. Its special address structure leads IPv6 to go through three significantly different transitional versions if it is really implement 128bits address space. The transition between the three versions is the same as going through three different IP protocols from IPv4 to IPv6. It is often unscientific to say that IPv6 can assign an IP address to every grain of sand on the planet. This paper studies the IPv6 add(..)

DOI: 10.21307/ijanmc-2019-042

Radix-8 Design Alternatives of Fast Two Operands Interleaved Multiplication with Enhanced Architecture

Mohammad M. Asad/ Ibrahim Marouf/ Qasem Abu Al-Haija

Abstract In this paper, we proposed different comparable reconfigurable hardware implementations for the radix-8 fast two operands multiplier coprocessor using Karatsuba method and Booth recording method by employing carry save (CSA) and kogge stone adders (KSA) on Wallace tree organization. The proposed designs utilized ALTERA Cyclone IV FPGA family with target chip device EP4CGX–22CF19C7 along with simulation package. Also, the proposed designs were synthesized and benchmarked in terms of the (..)

DOI: 10.21307/ijanmc-2019-043

Application of Wavelet Analysis in The Prediction of Telemetry Data

Jiangtao Xu/ Pingping Liu

Abstract With the rapid development of space technology, the increasing number of spacecraft, in-orbit risk also increases, how to ensure that the spacecraft safety and reliability is particularly important. Prediction technology can predict the failure of the spacecraft in advance, and it has won valuable time for the fault of the spacecraft troubleshooting, thereby increasing the safety and reliability of spacecraft operation. In this paper, based on the non-stationary and periodicity of telem(..)

DOI: 10.21307/ijanmc-2019-044

Violence Cracking Technology of SSH Service Based on Kali-Linux

Limei Ma/ Dongmei Zhao/ Yijun Gao/ Chen Zhao

Abstract In this paper, the current popular SSH password brute force cracking tool is researched, analyzed and summarized. The ssh_login module in Metasploit is used to brute force the SSH service to finally obtain the password. The Brute Spray tool is used to automatically call Medusa to blast the service, demonstrating SSH. The process of brute force cracking has certain reference value for penetration attack testing and security defense.

DOI: 10.21307/ijanmc-2019-045

Research on the Technology of Assign IP Address to the Connected Computer Based IPV9

Hui Wang/ Lingwen Liu/ Zhikai Yu/ Ming Li

Abstract With the widely application of Internet and the distribution is not reasonable in the beginning, the IPv4 address space is becoming less and less and there are fewer available IP addresses, in order to expand the address space, IPv6 was appeared, but it did not consider the network security in the first designing and have some shortcomings, it has not widely used in the world in its 20 years. LETF proposed some basic dreams of IPv9 in 1994, and looked forward to the idea of network in t(..)

DOI: 10.21307/ijanmc-2019-046

Research on IPv4, IPv6 and IPV9 Address Representation

Halavachou YURY/ Yubian Wang

Abstract The new generation network architecture (IPV9) is designed to solve a series of problems such as the shortage of address space and the danger of information security. IPv4 addresses have a length of 32 bits and a theoretically expressible address space of 232, while IPv6 addresses extend to 128 bits and theoretically an address space of 2128. In this paper, by studying IPv4, IPv6 address structure focuses on the new generation of network IPV9 address representation method. This method a(..)

DOI: 10.21307/ijanmc-2019-047

Application of Wireless Return Topology Planning Based on K-Means

Weixia Yang/ He Li/ Yuan Chen/ Fei Xu

Abstract With the development of communication technology and the general trend of interconnection and intercommunication, people’s demand for high-quality information and communication is increasing day by day. Therefore, the intensive deployment of base stations has become the development trend of the construction of a new generation of communication network. In this paper, in order to solve the urban and rural electric scenarios such as traditional transport unreachable problem, on the basis (..)

DOI: 10.21307/ijanmc-2019-048

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

Oladayo Olufemi Olakanmi/ Aminat Shodipo

Abstract Crypto-authentication schemes become unreliable whenever the private key is compromised, making them unfit for any system or network that requires high level of confidentiality. Key compromise is inevitable due to the wider space of operability of key in most of the cryptography based authentication schemes. To improve the performance of any authentication system, there is need to narrow its key operability to the key owner, that is eliminating the influence of other parties in the key (..)

DOI: 10.21307/ijanmc-2019-049

Research on Trust-Role Access Control Model in Cloud Computing

Yuchen Wu/ Pingping Liu

Abstract In order to ensure the security of data in cloud computing, a trust-role-based hybrid cloud computing access control model is proposed based on the combination of role-based and trust-based access control models. The model introduces the calculation of trust based on the role-based access control, that is, the user needs to verify the trust value in order to obtain the permission to access the data. Through the application in the local business system, it shows that the model can effect(..)

DOI: 10.21307/ijanmc-2019-050

Hazard Grading Model of Terrorist Attack Based on Machine Learning

Jun Yu/ Tong Xian/ Zhiyi Hu/ Yutong Liu

Abstract In this paper, there is no unified grading standard for the harm of terrorist attacks. A classification model of terrorist incidents based on machine learning is proposed. First, the data related to the hazard in the Global Terrorism Database (GTD) is extracted and preprocessed. Secondly, the data is extracted by principal component analysis, and all events are aggregated into 5 by K-means clustering. Again, the entropy method is used to calculate the weighting coefficient of each indic(..)

DOI: 10.21307/ijanmc-2019-051

Application Research Based on 5G Wireless Communication Technology

Junying Bai/ Yongli An/ Ruihua Sun

Abstract With the continuous development of science and technology, network technology is changing from each passing day. Nowadays, smart phones and other products are gradually popularized. China’s mobile network technology is also developing rapidly. The development of communication technology has driven the development of society. Nowadays, the development of 5G wireless communication technology has greatly promoted the research of related technologies. With the advancement of the times, the (..)

DOI: 10.21307/ijanmc-2019-052

Image Transformation Based on Generative Adversarial Networks

Jie Chen/ Li Zhao

Abstract Image transformation is a hot topic in the field of computer vision. Its purpose is to use the existing similar or semblable images to learn the mapping between the input image and the output image. Generative Adversarial Networks model is a powerful generative model with the idea of Zero-sum game theory, Co-training the two through the confrontation learning method of the generator and the discriminator, so as to estimate the potential distribution of data samples and generate new data(..)

DOI: 10.21307/ijanmc-2019-053

No Record Found..
Page Actions