Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
341
Query-Based Extractive Multi-Document Summarization Using Paraphrasing and Textual Entailment
Published 2020-09-01“…One of the most common problems with computer networks is the amount of information in these networks. …”
Get full text
Article -
342
Proposed Method for Note Detection and Automatic Identification of the Melody Models (Gusheh) in Iranian Traditional Music with Micro Approach
Published 2020-09-01“…One of the most common problems with computer networks is the amount of information in these networks. …”
Get full text
Article -
343
Challenges and key technologies of new Ethernet for intelligent computing center
Published 2024-06-01“…In the process of AI large model training and inferencing, providing high performance and high security transmission of data are the two core requirements of AI business for intelligent computing network. Efficient load balancing, congestion control technologies and network security protocols are the key network technologies. …”
Get full text
Article -
344
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. …”
Get full text
Article -
345
A fluid flow model for the software defined wide area networks analysis
Published 2025-01-01“…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
Get full text
Article -
346
Reliability modeling and planning of energy harvesting based on uncertainty theory
Published 2018-05-01“…Energy harvesting network is a new form of computer networks.It can convert the environmental energy into usable electric energy,and supply the electrical energy as a primary or secondary power source to the electronic device for network communication.However,the energy harvesting process has great volatility and uncertainty,the traditional analytical method based on probability distribution function to describe the energy collection process can not accurately simulate the actual situation,resulting in higher depletion probability of nodes,then the reliability cannot be guaranteed as a result.For this,the energy harvesting reliability of energy harvesting nodes was defined,represented with the degree of normal operation,respectively set up the node reliability models with no battery and infinite battery.As an example for maximum node achievable rate,the uncertain multilevel programming model based on node reliability was put forward,then the network efficiency was improved under the premise of ensuring node reliability.An energy average allocation (EAA) algorithm was proposed and the upper bound of competitive ratio of the algorithm was proved theoretically.Finally,the actual wind power data was taken as an example to verify the feasibility and effectiveness of the proposed model and method.…”
Get full text
Article -
347
Geo-computation techniques for identifying spatio-temporal patterns of reported oil spills along crude oil pipeline networks
Published 2025-12-01“…Pipeline data were transformed into 500-metre lixels (linear pixels) to compute network distances and generate density estimates. …”
Get full text
Article -
348
Challenges in adjusting scoring matrices when comparing functional motifs with non-standard compositions
Published 2024-12-01Get full text
Article -
349
The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea
Published 2024-08-01“…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
Get full text
Article -
350
An Efficient Convolution Algorithm for the Non-Markovian Two-Node Cyclic Network
Published 2021-01-01“…This model has several other applications in performance evaluation, manufacturing, computer networks, and in reliability studies as it can be easily used to compute system availability. …”
Get full text
Article -
351
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
352
Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks
Published 2024-12-01“…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
Get full text
Article -
353
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article -
354
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…Fog computing is an emerging technology that extends the capability and efficiency of cloud computing networks by acting as a bridge among the cloud and the device. …”
Get full text
Article -
355
Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology
Published 2017-01-01“…Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. …”
Get full text
Article -
356
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“… While this dependence on interconnected computer networks and the web requires robust cybersecurity. …”
Get full text
Article -
357
Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades
Published 2025-02-01“…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
Get full text
Article -
358
Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital.
Published 2024“…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
Get full text
Thesis -
359
Energy-saving route optimizationin a software-defined wireless sensor network
Published 2018-10-01Get full text
Article -
360
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
Get full text
Article