Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
241
Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy
Published 2021-01-01“…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
Get full text
Article -
242
A Survey of Data Mining Implementation in Smart City Applications
Published 2021-04-01Get full text
Article -
243
-
244
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. …”
Get full text
Article -
245
Chip Design of PTP Time Synchronization for Industrial IoT
Published 2025-01-01“…Its core concept is to apply technologies such as computer networking, big data, artificial intelligence and cloud services to manufacturing. …”
Get full text
Article -
246
Network Digital Twin Toward Networking, Telecommunications, and Traffic Engineering: A Survey
Published 2025-01-01“…Network Digital Twin (NDT) is an evolving technology that provides a framework through which a network administrator can have a virtual representation of a computer network. As a result, analysis, monitoring, testing, running new protocols, and more can be performed using the NDT before the final deployment of the developed approach. …”
Get full text
Article -
247
-
248
-
249
Analisis Pengembangan Jaringan Komputer UIN Sunan Kalijaga Yogyakarta Menggunakan Perbandingan Protokol Routing Statik dan Routing Dinamis OSPF
Published 2021-03-01“…Abstract This study describes the comparison of routing as one of computer network management. The purpose of this study is to analyze static routing protocols with OSPF dynamic routing on computer networks in the State Islamic University of Sunan Kalijaga Yogyakarta with literature study methods and interviews in data collection. …”
Get full text
Article -
250
Designing of multimedia learning using lectora inspire for informatics education students
Published 2021-02-01“…This study aims to design multimedia learning on the subject of Computer Networks and Data Communication for informatics education students. …”
Get full text
Article -
251
An Energy Efficient Anchor-Free Localization Algorithm for No-Identity Wireless Sensor Networks
Published 2015-12-01Get full text
Article -
252
Studies of Connected Networks via Fractional Metric Dimension
Published 2022-01-01“…Metric dimension is an effective tool to study different distance-based problems in the field of telecommunication, robotics, computer networking, integer programming, chemistry, and electrical networking. …”
Get full text
Article -
253
Network Diffusion Framework to Simulate Spreading Processes in Complex Networks
Published 2024-09-01“…With the advancement of computational network science, its research scope has significantly expanded beyond static graphs to encompass more complex structures. …”
Get full text
Article -
254
AN ONTOLOGY SEARCH FOR VIETNAMESE ACADEMIC DOCUMENTS IN COMPUTER SCIENCE
Published 2017-09-01“…The proposed artefacts were evaluated using Vietnamese documents in three areas: Software engineering; Programming; and Computer networking. The evaluation results were presented and discussed.…”
Get full text
Article -
255
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
Get full text
Article -
256
On Some Properties of Multiplicative Topological Indices in Silicon-Carbon
Published 2021-01-01“…The use of graph theory can be visualized in nanochemistry, computer networks, Google maps, and molecular graph which are common areas to elaborate application of this subject. …”
Get full text
Article -
257
Computing Fault-Tolerant Metric Dimension of Connected Graphs
Published 2022-01-01“…For a connected graph, the concept of metric dimension contributes an important role in computer networking and in the formation of chemical structures. …”
Get full text
Article -
258
On Face Index of Silicon Carbides
Published 2020-01-01“…Several graph invariants have been defined and studied, which present applications in nanochemistry, computer networks, and other areas of science. One vastly studied class of the graph invariants is the class of the topological indices, which helps in the studies of chemical, biological, and physical properties of a chemical structure. …”
Get full text
Article -
259
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
Get full text
Article -
260
The Application of Clothing Intelligent 3D Display with Uncertainty Models Technology in Clothing Marketing
Published 2022-01-01“…As a result of the development of new technologies such as satellite communication, digitalization, and multimedia computer networks, new media such as blogs, online magazines, and wireless network media have sparked a lot of interest. …”
Get full text
Article