Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
201
Wavelength Tuning Free Transceiver Module in OLT Downstream Multicasting 4λ × 10 Gb/s TWDM-PON System
Published 2014-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
202
A Novel SLM Scheme for PAPR Reduction in OFDM Systems
Published 2011-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
203
Infrastructure Sharing as an Opportunity to Promote Competition in Local Access Networks
Published 2012-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
204
Learning-Based Spectrum Sensing for Cognitive Radio Systems
Published 2012-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
205
Pemanfaatan media pembelajaran berbasis augmented reality menggunakan aplikasi Ar_Jarkom pada mata kuliah instalasi jaringan komputer
Published 2020-12-01“…This study aims to determine the level of practicality, effectiveness, and influence of the application of learning media based on Augmented Reality (AR) in the Computer Network Installation course using a mobile application called AR_JARKOM_INFORMATIKA_UNP. …”
Get full text
Article -
206
A Novel Deep Hybrid Recommender System Based on Auto-encoder with Neural Collaborative Filtering
Published 2018-09-01Get full text
Article -
207
Prompting Large Language Models with Knowledge-Injection for Knowledge-Based Visual Question Answering
Published 2024-09-01Get full text
Article -
208
A Semi-Supervised Deep Network Embedding Approach Based on the Neighborhood Structure
Published 2019-09-01Get full text
Article -
209
-
210
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
211
Efficiency of Semantic Web Implementation on Cloud Computing: A Review
Published 2021-06-01Get full text
Article -
212
A Modified Resource Distribution Fairness Measure
Published 2013-01-01“…An important issue of resource distribution is the fairness of the distribution. For example, computer network management wishes to distribute network resource fairly to its users. …”
Get full text
Article -
213
EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET
Published 2021-02-01“…Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. …”
Get full text
Article -
214
On Elegant Labelling and Magic Labelling of Large-Scale Graphs
Published 2022-01-01Get full text
Article -
215
Privacy in the Internet: Myth or reality
Published 2016-01-01“…What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.…”
Get full text
Article -
216
Recurrence Relations and Hilbert Series of the Monoid Associated with Star Topology
Published 2020-01-01“…Star network is one of the most common in computer network topologies. In this work, we study star topology Sn and associate a Coxeter structure of affine type on it. …”
Get full text
Article -
217
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
218
Influence of Psychological Stress and Moderate Physical Activity in Cardiovascular Reactivity
Published 2018-09-01“…For that a total of 30 bibliographic sources, among them 2 books and a number of articles from scientific journals, accessed through the main managers the computer network. It was concluded that psychological stress and aerobic physical exercises influence antagonistically on cardiovascular reactivity.…”
Get full text
Article -
219
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…With the development of information technology, computer networks have become a part of people’s lives and work. …”
Get full text
Article -
220
Network Anomaly Detection System with Optimized DS Evidence Theory
Published 2014-01-01“…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
Get full text
Article