Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
201
Wavelength Tuning Free Transceiver Module in OLT Downstream Multicasting 4λ × 10 Gb/s TWDM-PON System
Published 2014-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
202
A Novel SLM Scheme for PAPR Reduction in OFDM Systems
Published 2011-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
203
Infrastructure Sharing as an Opportunity to Promote Competition in Local Access Networks
Published 2012-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
204
Learning-Based Spectrum Sensing for Cognitive Radio Systems
Published 2012-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
205
An Energy Efficient Anchor-Free Localization Algorithm for No-Identity Wireless Sensor Networks
Published 2015-12-01Get full text
Article -
206
Designing of multimedia learning using lectora inspire for informatics education students
Published 2021-02-01“…This study aims to design multimedia learning on the subject of Computer Networks and Data Communication for informatics education students. …”
Get full text
Article -
207
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
Get full text
Article -
208
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
Get full text
Article -
209
On Some Properties of Multiplicative Topological Indices in Silicon-Carbon
Published 2021-01-01“…The use of graph theory can be visualized in nanochemistry, computer networks, Google maps, and molecular graph which are common areas to elaborate application of this subject. …”
Get full text
Article -
210
The Application of Clothing Intelligent 3D Display with Uncertainty Models Technology in Clothing Marketing
Published 2022-01-01“…As a result of the development of new technologies such as satellite communication, digitalization, and multimedia computer networks, new media such as blogs, online magazines, and wireless network media have sparked a lot of interest. …”
Get full text
Article -
211
AsyncBTree: Revisiting Binary Tree Topology for Efficient FPGA-Based NoC Implementation
Published 2019-01-01“…This scheme is very efficient in interconnected networks such as computer networks, which use generic switches for interconnection. …”
Get full text
Article -
212
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…With the development of information technology, computer networks have become a part of people’s lives and work. …”
Get full text
Article -
213
The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea
Published 2024-08-01“…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
Get full text
Article -
214
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
215
A fluid flow model for the software defined wide area networks analysis
Published 2025-01-01“…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
Get full text
Article -
216
On Fault-Tolerant Resolving Sets of Some Families of Ladder Networks
Published 2021-01-01“…In computer networks, vertices represent hosts or servers, and edges represent as the connecting medium between them. …”
Get full text
Article -
217
On Face Index of Silicon Carbides
Published 2020-01-01“…Several graph invariants have been defined and studied, which present applications in nanochemistry, computer networks, and other areas of science. One vastly studied class of the graph invariants is the class of the topological indices, which helps in the studies of chemical, biological, and physical properties of a chemical structure. …”
Get full text
Article -
218
Query-Based Extractive Multi-Document Summarization Using Paraphrasing and Textual Entailment
Published 2020-09-01“…One of the most common problems with computer networks is the amount of information in these networks. …”
Get full text
Article -
219
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article -
220
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01“…For computer networks to remain secure, intrusion detection is essential. …”
Get full text
Article