Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
261
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01“…For computer networks to remain secure, intrusion detection is essential. …”
Get full text
Article -
262
Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks
Published 2013-01-01“…The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. …”
Get full text
Article -
263
AsyncBTree: Revisiting Binary Tree Topology for Efficient FPGA-Based NoC Implementation
Published 2019-01-01“…This scheme is very efficient in interconnected networks such as computer networks, which use generic switches for interconnection. …”
Get full text
Article -
264
Query-Based Extractive Multi-Document Summarization Using Paraphrasing and Textual Entailment
Published 2020-09-01“…One of the most common problems with computer networks is the amount of information in these networks. …”
Get full text
Article -
265
Proposed Method for Note Detection and Automatic Identification of the Melody Models (Gusheh) in Iranian Traditional Music with Micro Approach
Published 2020-09-01“…One of the most common problems with computer networks is the amount of information in these networks. …”
Get full text
Article -
266
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. …”
Get full text
Article -
267
A fluid flow model for the software defined wide area networks analysis
Published 2025-01-01“…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
Get full text
Article -
268
The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea
Published 2024-08-01“…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
Get full text
Article -
269
An Efficient Convolution Algorithm for the Non-Markovian Two-Node Cyclic Network
Published 2021-01-01“…This model has several other applications in performance evaluation, manufacturing, computer networks, and in reliability studies as it can be easily used to compute system availability. …”
Get full text
Article -
270
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
271
Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks
Published 2024-12-01“…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
Get full text
Article -
272
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article -
273
Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology
Published 2017-01-01“…Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. …”
Get full text
Article -
274
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“… While this dependence on interconnected computer networks and the web requires robust cybersecurity. …”
Get full text
Article -
275
Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades
Published 2025-02-01“…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
Get full text
Article -
276
Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital.
Published 2024“…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
Get full text
Thesis -
277
Energy-saving route optimizationin a software-defined wireless sensor network
Published 2018-10-01Get full text
Article -
278
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
Get full text
Article -
279
Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm
Published 2019-11-01Get full text
Article -
280
A Comparative Study of Three Resolving Parameters of Graphs
Published 2021-01-01“…It is used to monitor the movement of robots on a network, to debug computer networks, to develop algorithms, and to analyze the structural properties of chemical structures, among other things. …”
Get full text
Article