Showing 341 - 360 results of 380 for search '"Computer network"', query time: 0.06s Refine Results
  1. 341

    Query-Based Extractive Multi-Document Summarization Using Paraphrasing and Textual Entailment by Ali Naserasadi

    Published 2020-09-01
    “…One of the most common problems with computer networks is the amount of information in these networks. …”
    Get full text
    Article
  2. 342

    Proposed Method for Note Detection and Automatic Identification of the Melody Models (Gusheh) in Iranian Traditional Music with Micro Approach by Amir Vafaeian, Keivan Borna, Hamed Sajedi, Dariush Alimohammadi, Pouya Sarai

    Published 2020-09-01
    “…One of the most common problems with computer networks is the amount of information in these networks. …”
    Get full text
    Article
  3. 343

    Challenges and key technologies of new Ethernet for intelligent computing center by DUAN Xiaodong, LI Jieyu, CHENG Weiqiang, LI Han, WANG Ruixue, WANG Haojie

    Published 2024-06-01
    “…In the process of AI large model training and inferencing, providing high performance and high security transmission of data are the two core requirements of AI business for intelligent computing network. Efficient load balancing, congestion control technologies and network security protocols are the key network technologies. …”
    Get full text
    Article
  4. 344

    Analysis of attacks on device manager in software-defined Internet of Things by Tri-Hai Nguyen, Myungsik Yoo

    Published 2017-08-01
    “…Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. …”
    Get full text
    Article
  5. 345

    A fluid flow model for the software defined wide area networks analysis by Karol Marszałek, Adam Domański

    Published 2025-01-01
    “…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
    Get full text
    Article
  6. 346

    Reliability modeling and planning of energy harvesting based on uncertainty theory by Zhe WANG, Taoshen LI, Jin YE, Zhihui GE, Min WU

    Published 2018-05-01
    “…Energy harvesting network is a new form of computer networks.It can convert the environmental energy into usable electric energy,and supply the electrical energy as a primary or secondary power source to the electronic device for network communication.However,the energy harvesting process has great volatility and uncertainty,the traditional analytical method based on probability distribution function to describe the energy collection process can not accurately simulate the actual situation,resulting in higher depletion probability of nodes,then the reliability cannot be guaranteed as a result.For this,the energy harvesting reliability of energy harvesting nodes was defined,represented with the degree of normal operation,respectively set up the node reliability models with no battery and infinite battery.As an example for maximum node achievable rate,the uncertain multilevel programming model based on node reliability was put forward,then the network efficiency was improved under the premise of ensuring node reliability.An energy average allocation (EAA) algorithm was proposed and the upper bound of competitive ratio of the algorithm was proved theoretically.Finally,the actual wind power data was taken as an example to verify the feasibility and effectiveness of the proposed model and method.…”
    Get full text
    Article
  7. 347

    Geo-computation techniques for identifying spatio-temporal patterns of reported oil spills along crude oil pipeline networks by Seyi Adewale Adebangbe, Deborah Dixon, Brian Barrett

    Published 2025-12-01
    “…Pipeline data were transformed into 500-metre lixels (linear pixels) to compute network distances and generate density estimates. …”
    Get full text
    Article
  8. 348
  9. 349

    The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea by Liivi Aarma

    Published 2024-08-01
    “…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
    Get full text
    Article
  10. 350

    An Efficient Convolution Algorithm for the Non-Markovian Two-Node Cyclic Network by Muhammad El-Taha, Thomas Michaud

    Published 2021-01-01
    “…This model has several other applications in performance evaluation, manufacturing, computer networks, and in reliability studies as it can be easily used to compute system availability. …”
    Get full text
    Article
  11. 351

    Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations by Erwin Alexander Leal Piedrahita

    Published 2019-11-01
    “…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
    Get full text
    Article
  12. 352

    Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks by MU Siqi, WEN Shuo, LU Yang, AI Bo

    Published 2024-12-01
    “…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
    Get full text
    Article
  13. 353

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
    Get full text
    Article
  14. 354

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…Fog computing is an emerging technology that extends the capability and efficiency of cloud computing networks by acting as a bridge among the cloud and the device. …”
    Get full text
    Article
  15. 355

    Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology by K. C. Okafor, Ifeyinwa E. Achumba, Gloria A. Chukwudebe, Gordon C. Ononiwu

    Published 2017-01-01
    “…Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. …”
    Get full text
    Article
  16. 356

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “… While this dependence on interconnected computer networks and the web requires robust cybersecurity. …”
    Get full text
    Article
  17. 357

    Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades by Mohammadjavad Tasharrofi, Mojtaba Heidarian Shahri, Ali Madadi

    Published 2025-02-01
    “…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
    Get full text
    Article
  18. 358

    Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital. by Hashakimana, Obed

    Published 2024
    “…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
    Get full text
    Thesis
  19. 359
  20. 360

    Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects by Airong Yang, Guoxin Yu

    Published 2022-01-01
    “…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
    Get full text
    Article