This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders… (More)
As networks grow in size, heterogeneity, and complexity of applications and network services, an efficient network management system needs to work effectively even in face of incomplete management information , uncertain situations and dynamic changes. We use Bayesian networks to model the network management and consider the probabilis-tic backward… (More)
The growing complexity of distributed systems in terms of hardware components, operating system, communication and application software and the huge amount of dependencies among them have caused an increase in demand for distributed management systems. An efficient distributed management system needs to work effectively even in face of incomplete management… (More)
Bayesian network is a complete model for the variables and their relationships, it can be used to answer probabilistic queries about them. A Bayesian network can thus be considered a mechanism for automatically applying Bayes' theorem to complex problems. In the application of Bayesian networks, most of the work is related to probabilistic inferences. Any… (More)
An on-line monitoring system of transmission line conductor de-icing based on GSM SMS and Zigbee is firstly designed and produced, the composition and the technical features of which are described. The meteorology such as the temperature, the humidity, the wind speed, the rain and snow, and the air pressure etc., the icing status of transmission lines such… (More)
With the rising popularity of the Internet, the resulting increase in the number of available vulnerable machines, and the elevated sophistication of the malicious code itself, the detection and prevention of unknown malicious codes meet great challenges. Traditional anti-virus scanner employs static features to detect malicious executable codes and is hard… (More)
—Recent years, requirements in network management and control have been amended by emerging network and etc. This paper presents a survey of the evolution of networks and their trends, the challenges of management for emerging networks and services, and the evolution of network management strategies and solutions in network management.