Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
281
-
282
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01“…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
Get full text
Article -
283
Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update
Published 2023-02-01“…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
Get full text
Article -
284
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
285
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
286
-
287
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. …”
Get full text
Article -
288
Interface Data Modeling to Detect and Diagnose Intersystem Faults for Designing and Integrating System of Systems
Published 2018-01-01“…The software that supports the modeling is implemented using the following concepts: (1) a model-view-viewmodel pattern for overall software design and (2) a computer network for representing sequential properties of field interpretations. …”
Get full text
Article -
289
-
290
„Nowe” problemy wychowawcze w dobie „nowych” mediów
Published 2012-12-01“…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
Get full text
Article -
291
An adaptive intrusion detection and prevention system for Internet of Things
Published 2019-11-01“…The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. …”
Get full text
Article -
292
Analysis of the Effect of Artificial Intelligence on Role Cognition in the Education System
Published 2022-01-01“…The education system targeted by this questionnaire survey involves 8 categories: preschool education, primary education, secondary education, higher education, adult education, computer network education, enterprise education, and social education; the respondents include 368 teachers, 402 students or learners, 118 school managers, and 124 family members of students or learners in all above education categories. …”
Get full text
Article -
293
-
294
Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy
Published 2021-01-01“…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
Get full text
Article -
295
Retracted: Internet of Things Health Detection System in Steel Structure Construction Management
Published 2020-01-01“…In recent years, the development of computer network technology, especially the hot Internet of things, has brought great convenience and comfort to people’s life. …”
Get full text
Article -
296
A Survey of Data Mining Implementation in Smart City Applications
Published 2021-04-01Get full text
Article -
297
-
298
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. …”
Get full text
Article -
299
Chip Design of PTP Time Synchronization for Industrial IoT
Published 2025-01-01“…Its core concept is to apply technologies such as computer networking, big data, artificial intelligence and cloud services to manufacturing. …”
Get full text
Article -
300
Network Digital Twin Toward Networking, Telecommunications, and Traffic Engineering: A Survey
Published 2025-01-01“…Network Digital Twin (NDT) is an evolving technology that provides a framework through which a network administrator can have a virtual representation of a computer network. As a result, analysis, monitoring, testing, running new protocols, and more can be performed using the NDT before the final deployment of the developed approach. …”
Get full text
Article