Showing 241 - 260 results of 295 for search '"Computer network"', query time: 0.07s Refine Results
  1. 241

    Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy by Bo Zhang, Rongji Liao

    Published 2021-01-01
    “…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
    Get full text
    Article
  2. 242
  3. 243
  4. 244

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. …”
    Get full text
    Article
  5. 245

    Chip Design of PTP Time Synchronization for Industrial IoT by Yee-Shao Chen, Yuan-Sun Chu, da-Wei Lo, Yen-Ting Chiang, Ting-Chao Hou

    Published 2025-01-01
    “…Its core concept is to apply technologies such as computer networking, big data, artificial intelligence and cloud services to manufacturing. …”
    Get full text
    Article
  6. 246

    Network Digital Twin Toward Networking, Telecommunications, and Traffic Engineering: A Survey by Reza Poorzare, Dimitris N. Kanellopoulos, Varun Kumar Sharma, Poulami Dalapati, Oliver P. Waldhorst

    Published 2025-01-01
    “…Network Digital Twin (NDT) is an evolving technology that provides a framework through which a network administrator can have a virtual representation of a computer network. As a result, analysis, monitoring, testing, running new protocols, and more can be performed using the NDT before the final deployment of the developed approach. …”
    Get full text
    Article
  7. 247
  8. 248
  9. 249

    Analisis Pengembangan Jaringan Komputer UIN Sunan Kalijaga Yogyakarta Menggunakan Perbandingan Protokol Routing Statik dan Routing Dinamis OSPF by Rahmadhan Gatra, Bambang Sugiantoro

    Published 2021-03-01
    “…Abstract This study describes the comparison of routing as one of computer network management. The purpose of this study is to analyze static routing protocols with OSPF dynamic routing on computer networks in the State Islamic University of Sunan Kalijaga Yogyakarta with literature study methods and interviews in data collection. …”
    Get full text
    Article
  10. 250

    Designing of multimedia learning using lectora inspire for informatics education students by Elfi Tasrif

    Published 2021-02-01
    “…This study aims to design multimedia learning on the subject of Computer Networks and Data Communication for informatics education students. …”
    Get full text
    Article
  11. 251
  12. 252

    Studies of Connected Networks via Fractional Metric Dimension by Hassan Zafar, Muhammad Javaid, Ebenezer Bonyah

    Published 2022-01-01
    “…Metric dimension is an effective tool to study different distance-based problems in the field of telecommunication, robotics, computer networking, integer programming, chemistry, and electrical networking. …”
    Get full text
    Article
  13. 253

    Network Diffusion Framework to Simulate Spreading Processes in Complex Networks by Michał Czuba, Mateusz Nurek, Damian Serwata, Yu-Xuan Qiu, Mingshan Jia, Katarzyna Musial, Radosław Michalski, Piotr Bródka

    Published 2024-09-01
    “…With the advancement of computational network science, its research scope has significantly expanded beyond static graphs to encompass more complex structures. …”
    Get full text
    Article
  14. 254

    AN ONTOLOGY SEARCH FOR VIETNAMESE ACADEMIC DOCUMENTS IN COMPUTER SCIENCE by Nguyễn Hữu Vĩnh

    Published 2017-09-01
    “…The proposed artefacts were evaluated using Vietnamese documents in three areas: Software engineering; Programming; and Computer networking. The evaluation results were presented and discussed.…”
    Get full text
    Article
  15. 255

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
    Get full text
    Article
  16. 256

    On Some Properties of Multiplicative Topological Indices in Silicon-Carbon by Abid Mahboob, Sajid Mahboob, Mohammed M. M. Jaradat, Nigait Nigar, Imran Siddique

    Published 2021-01-01
    “…The use of graph theory can be visualized in nanochemistry, computer networks, Google maps, and molecular graph which are common areas to elaborate application of this subject. …”
    Get full text
    Article
  17. 257

    Computing Fault-Tolerant Metric Dimension of Connected Graphs by Uzma Ahmad, Sara Ahmed, Muhammad Javaid, Md Nur Alam

    Published 2022-01-01
    “…For a connected graph, the concept of metric dimension contributes an important role in computer networking and in the formation of chemical structures. …”
    Get full text
    Article
  18. 258

    On Face Index of Silicon Carbides by Xiujun Zhang, Ali Raza, Asfand Fahad, Muhammad Kamran Jamil, Muhammad Anwar Chaudhry, Zahid Iqbal

    Published 2020-01-01
    “…Several graph invariants have been defined and studied, which present applications in nanochemistry, computer networks, and other areas of science. One vastly studied class of the graph invariants is the class of the topological indices, which helps in the studies of chemical, biological, and physical properties of a chemical structure. …”
    Get full text
    Article
  19. 259

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
    Get full text
    Article
  20. 260

    The Application of Clothing Intelligent 3D Display with Uncertainty Models Technology in Clothing Marketing by Zhonglin Xu, Trip Huwan

    Published 2022-01-01
    “…As a result of the development of new technologies such as satellite communication, digitalization, and multimedia computer networks, new media such as blogs, online magazines, and wireless network media have sparked a lot of interest. …”
    Get full text
    Article