Showing 281 - 300 results of 380 for search '"Computer network"', query time: 0.05s Refine Results
  1. 281
  2. 282

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
    Get full text
    Article
  3. 283

    Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update by Luis Enrique Jiménez Franco, Dianelys María Gutiérrez Pérez, Milagros Lisset León Regal, Claudia González Martínez, Lucía Baños Leyva, Arionnis Matos Olivero

    Published 2023-02-01
    “…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
    Get full text
    Article
  4. 284

    INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK by Edin Osmanbegović, Nedžad Pirić, Mirza Suljić

    Published 2017-11-01
    “…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
    Get full text
    Article
  5. 285

    INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK by Edin Osmanbegović, Nedžad Pirić, Mirza Suljić

    Published 2017-11-01
    “…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
    Get full text
    Article
  6. 286
  7. 287

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. …”
    Get full text
    Article
  8. 288

    Interface Data Modeling to Detect and Diagnose Intersystem Faults for Designing and Integrating System of Systems by Kyung-Min Seo, Kwang-Phil Park

    Published 2018-01-01
    “…The software that supports the modeling is implemented using the following concepts: (1) a model-view-viewmodel pattern for overall software design and (2) a computer network for representing sequential properties of field interpretations. …”
    Get full text
    Article
  9. 289
  10. 290

    „Nowe” problemy wychowawcze w dobie „nowych” mediów by Arkadiusz Olczyk

    Published 2012-12-01
    “…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
    Get full text
    Article
  11. 291

    An adaptive intrusion detection and prevention system for Internet of Things by Sheikh Tahir Bakhsh, Saleh Alghamdi, Rayan A Alsemmeari, Syed Raheel Hassan

    Published 2019-11-01
    “…The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. …”
    Get full text
    Article
  12. 292

    Analysis of the Effect of Artificial Intelligence on Role Cognition in the Education System by Jianjian Zhu, Chuming Ren

    Published 2022-01-01
    “…The education system targeted by this questionnaire survey involves 8 categories: preschool education, primary education, secondary education, higher education, adult education, computer network education, enterprise education, and social education; the respondents include 368 teachers, 402 students or learners, 118 school managers, and 124 family members of students or learners in all above education categories. …”
    Get full text
    Article
  13. 293
  14. 294

    Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy by Bo Zhang, Rongji Liao

    Published 2021-01-01
    “…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
    Get full text
    Article
  15. 295

    Retracted: Internet of Things Health Detection System in Steel Structure Construction Management by Qinglin Liu, Yongjiang Zhu, Xiongzhou Yuan, Jian Zhang, Rui Wu, Qianwen Dou, Song Liu

    Published 2020-01-01
    “…In recent years, the development of computer network technology, especially the hot Internet of things, has brought great convenience and comfort to people’s life. …”
    Get full text
    Article
  16. 296
  17. 297
  18. 298

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. …”
    Get full text
    Article
  19. 299

    Chip Design of PTP Time Synchronization for Industrial IoT by Yee-Shao Chen, Yuan-Sun Chu, da-Wei Lo, Yen-Ting Chiang, Ting-Chao Hou

    Published 2025-01-01
    “…Its core concept is to apply technologies such as computer networking, big data, artificial intelligence and cloud services to manufacturing. …”
    Get full text
    Article
  20. 300

    Network Digital Twin Toward Networking, Telecommunications, and Traffic Engineering: A Survey by Reza Poorzare, Dimitris N. Kanellopoulos, Varun Kumar Sharma, Poulami Dalapati, Oliver P. Waldhorst

    Published 2025-01-01
    “…Network Digital Twin (NDT) is an evolving technology that provides a framework through which a network administrator can have a virtual representation of a computer network. As a result, analysis, monitoring, testing, running new protocols, and more can be performed using the NDT before the final deployment of the developed approach. …”
    Get full text
    Article