Showing 201 - 220 results of 295 for search '"computer networks"', query time: 0.05s Refine Results
  1. 201
  2. 202

    A Novel SLM Scheme for PAPR Reduction in OFDM Systems by Tian-Ming Ma, Yu-Song Shi, Ying-Guan Wang

    Published 2011-01-01
    “…Journal of Computer Networks and Communications…”
    Get full text
    Article
  3. 203

    Infrastructure Sharing as an Opportunity to Promote Competition in Local Access Networks by João Paulo Pereira, Pedro Ferreira

    Published 2012-01-01
    “…Journal of Computer Networks and Communications…”
    Get full text
    Article
  4. 204

    Learning-Based Spectrum Sensing for Cognitive Radio Systems by Yasmin Hassan, Mohamed El-Tarhuni, Khaled Assaleh

    Published 2012-01-01
    “…Journal of Computer Networks and Communications…”
    Get full text
    Article
  5. 205
  6. 206

    Designing of multimedia learning using lectora inspire for informatics education students by Elfi Tasrif

    Published 2021-02-01
    “…This study aims to design multimedia learning on the subject of Computer Networks and Data Communication for informatics education students. …”
    Get full text
    Article
  7. 207

    Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT by Sepehr Sharifi, Soulmaz Gheisari

    Published 2024-02-01
    “…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
    Get full text
    Article
  8. 208

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
    Get full text
    Article
  9. 209

    On Some Properties of Multiplicative Topological Indices in Silicon-Carbon by Abid Mahboob, Sajid Mahboob, Mohammed M. M. Jaradat, Nigait Nigar, Imran Siddique

    Published 2021-01-01
    “…The use of graph theory can be visualized in nanochemistry, computer networks, Google maps, and molecular graph which are common areas to elaborate application of this subject. …”
    Get full text
    Article
  10. 210

    The Application of Clothing Intelligent 3D Display with Uncertainty Models Technology in Clothing Marketing by Zhonglin Xu, Trip Huwan

    Published 2022-01-01
    “…As a result of the development of new technologies such as satellite communication, digitalization, and multimedia computer networks, new media such as blogs, online magazines, and wireless network media have sparked a lot of interest. …”
    Get full text
    Article
  11. 211

    AsyncBTree: Revisiting Binary Tree Topology for Efficient FPGA-Based NoC Implementation by Kizheppatt Vipin

    Published 2019-01-01
    “…This scheme is very efficient in interconnected networks such as computer networks, which use generic switches for interconnection. …”
    Get full text
    Article
  12. 212

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…With the development of information technology, computer networks have become a part of people’s lives and work. …”
    Get full text
    Article
  13. 213

    The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea by Liivi Aarma

    Published 2024-08-01
    “…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
    Get full text
    Article
  14. 214

    Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations by Erwin Alexander Leal Piedrahita

    Published 2019-11-01
    “…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
    Get full text
    Article
  15. 215

    A fluid flow model for the software defined wide area networks analysis by Karol Marszałek, Adam Domański

    Published 2025-01-01
    “…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
    Get full text
    Article
  16. 216

    On Fault-Tolerant Resolving Sets of Some Families of Ladder Networks by Hua Wang, Muhammad Azeem, Muhammad Faisal Nadeem, Ata Ur-Rehman, Adnan Aslam

    Published 2021-01-01
    “…In computer networks, vertices represent hosts or servers, and edges represent as the connecting medium between them. …”
    Get full text
    Article
  17. 217

    On Face Index of Silicon Carbides by Xiujun Zhang, Ali Raza, Asfand Fahad, Muhammad Kamran Jamil, Muhammad Anwar Chaudhry, Zahid Iqbal

    Published 2020-01-01
    “…Several graph invariants have been defined and studied, which present applications in nanochemistry, computer networks, and other areas of science. One vastly studied class of the graph invariants is the class of the topological indices, which helps in the studies of chemical, biological, and physical properties of a chemical structure. …”
    Get full text
    Article
  18. 218

    Query-Based Extractive Multi-Document Summarization Using Paraphrasing and Textual Entailment by Ali Naserasadi

    Published 2020-09-01
    “…One of the most common problems with computer networks is the amount of information in these networks. …”
    Get full text
    Article
  19. 219

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
    Get full text
    Article
  20. 220

    An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection by zahra asgari varzaneh, soodeh hosseini

    Published 2024-12-01
    “…For computer networks to remain secure, intrusion detection is essential. …”
    Get full text
    Article