Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering


eISSN: 2470-8038



Quadrotor Formation Control Method Based on Graph and Consistency Theory
Advanced Dynamic Autonomous Knowledge Learning Method for Distance Learning

VOLUME 4 , ISSUE 3 (Nov 2019) - List of articles

Research on the System Structure of IPV9 Based on TCP/IP/M

Jianguo Wang/ Zhongsheng Wang/ Jianping Xie/ Wei Zhong

Abstract Network system structure is the basis of network communication. The design of network model can change the network structure from the root, solve the deficiency of the original network system, and meet the new demand of the future network. TCP/IP as the core network technology is successful, it has shortcomings but is a reasonable existence, will continue to play a role. Considering the compatibility with the original network, the new network model needs to be compatible with the existi(..)

DOI: 10.21307/ijanmc-2019-054

Design and Research of Healthy Ecology System Framework Based on IPV9

Qinyu Li/ Hongwen Zhao/ An Geng/ Lei Han

Abstract With the improvement of living standard and the change of life, people’s health awareness has been enhanced as a whole, and the health demand has changed from single medical service to multiple services such as disease prevention, health promotion, healthcare and rehabilitation. The wisdom medical system, Internet + medical service mode and digital hospital have become the direction of medical development. In order to build Tai’an healthy big data ecological domain, accelerate the tradi(..)

DOI: 10.21307/ijanmc-2019-055

Crawler Technology Based on Scrapy Framework

Hejing Wu

Abstract With the development of the times and the popularization of scientific and technological products, the Internet has become inseparable from our lives, and search engines have become a daily necessity of people.In view of the growing needs。This topic requires the design of a prototype crawler system based on Scrapy framework. The specific requirements and contents are as follows: analyzing the structure and rules of the target website, looking for data items that need to be crawled. Base(..)

DOI: 10.21307/ijanmc-2019-056

Global Internet Come into a New DNS Era

Mou Chengjin

Abstract DNS, short for Domain Name System, is an analytic central system, which transfers domain names into IP addresses that can be identified by the Internet. DNS has internal traits within it to conduct commands and regulations in network communication, as well as centralized ones that are inherently political. Unlike other Internet protocols, DNS protocols penetrate the Application Layer, the Internet Layer, the Transport Layer, and provide even more complicated, tailored low-level software(..)

DOI: 10.21307/ijanmc-2019-057

Street View House Number Identification Based on Deep Learning

Haoqi Yang/ Hongge Yao

Abstract In this paper, the difficult problem of character recognition in natural scenes caused by many factors such as variability of light in the natural scene, background clutter and inaccurate viewing angle, and inconsistent resolution. Based on the deep learning framework PyTorch, a convolutional neural network is implemented. Based on the classic LeNet-5 network, the network optimizes the input layer to accept three-channel images, changes the pooling method to maximum pooling to simplify (..)

DOI: 10.21307/ijanmc-2019-058

Assessment of a Non-Optical Water Quality Property Using Space-based Imagery in Egyptian Coastal Lake

Hala O. Abayazid/ Ahmed El-Adawy

Abstract Progressive anthropogenic intrusion and increasing water demand necessitate frequent water quality monitoring for sustainability management. Unlike laborious, time consuming field-based measurements, remote sensing-based water quality retrieval proved promising to overcome difficulties with temporal and spatial coverage. However, remotely estimated water quality parameters are mostly related to visibility characteristic and optically active property of water. This study presents results(..)

DOI: 10.21307/ijanmc-2019-059

Design of a Vibration Detection Terminal

Guoshao Chen/ Fei Xu

Abstract By detecting the vibration of bridge deck, the information of passing vehicles can be obtained indirectly, which is of great significance to grasp the dynamics of the enemy. In this paper, a micro-power wireless vibration detection terminal is designed. In order to reduce the overall power consumption of the terminal, which use two sensors, one is spring switch and another is acceleration sensor. When no vehicle passes by, the terminal is in a dormant state. When a vehicle passes by, th(..)

DOI: 10.21307/ijanmc-2019-060

Research and Development of Millimeter Wave Technology

Bai Junying/ An Yongli

Abstract This paper introduces the concept of millimeter wave, analyzes the advantages and disadvantages and propagation characteristics of millimeter wave, and expounds the research status of millimeter wave ground communication and millimeter wave satellite communication. The military application of millimeter wave communication technology in electronic countermeasures is taken as an example. Finally, the outlook for millimeter wave communication technology will open up new application fields (..)

DOI: 10.21307/ijanmc-2019-061

Comparative Research on Key Technologies from IPv4, IPv6 to IPV9

Sun Huai/ Liu Zhang

Abstract Since the United States developed the IPv4 protocol based on TCP/IP in the 1970s, it has been more than 30 years old. IPv4 is the “fourth edition of the Internet Protocol.” From a technical point of view, although IPv4 has a brilliant performance in the past, it seems to have revealed many drawbacks. With the addition of multimedia data streams and security considerations, IPv4’s address space is running out of crisis, and IPv4 is no longer sufficient. Under such circumstances, IPv6 was(..)

DOI: 10.21307/ijanmc-2019-062

Cyber Security Cookbook for Practitioners

Devesh Mishra

Abstract The scope of this paper is to provide the essential framework to C-suite/Management executives in the case of cyber events. This paper will further analyze the various threat vectors from the operational perspective and provide the remediation plan during the case of cyber-attacks.

DOI: 10.21307/ijanmc-2019-063

No Record Found..
Page Actions