Showing 261 - 280 results of 295 for search '"computer networks"', query time: 0.06s Refine Results
  1. 261

    Influence of Psychological Stress and Moderate Physical Activity in Cardiovascular Reactivity by Milagros Lisset León Regal, Yandy García Álvarez, Rosmari Álvarez Hernández, Cynthia Morales Pérez, Víctor Manuel Regal Cuesta, Hermes David González León

    Published 2018-09-01
    “…For that a total of 30 bibliographic sources, among them 2 books and a number of articles from scientific journals, accessed through the main managers the computer network. It was concluded that psychological stress and aerobic physical exercises influence antagonistically on cardiovascular reactivity.…”
    Get full text
    Article
  2. 262

    Computing Fault-Tolerant Metric Dimension of Connected Graphs by Uzma Ahmad, Sara Ahmed, Muhammad Javaid, Md Nur Alam

    Published 2022-01-01
    “…For a connected graph, the concept of metric dimension contributes an important role in computer networking and in the formation of chemical structures. …”
    Get full text
    Article
  3. 263

    Inflammatory Acute Response. Biochemical and Cellular Considerations by Milagros Lisset León Regal, Ania Alvarado Borges, José Omar de Armas García, Luciano Miranda Alvarado, Javier Antonio Varens Cedeño, José Ángel Cuesta del Sol

    Published 2015-02-01
    “…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
    Get full text
    Article
  4. 264

    Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update by Luis Enrique Jiménez Franco, Dianelys María Gutiérrez Pérez, Milagros Lisset León Regal, Claudia González Martínez, Lucía Baños Leyva, Arionnis Matos Olivero

    Published 2023-02-01
    “…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
    Get full text
    Article
  5. 265

    Network Anomaly Detection System with Optimized DS Evidence Theory by Yuan Liu, Xiaofeng Wang, Kaiyu Liu

    Published 2014-01-01
    “…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
    Get full text
    Article
  6. 266
  7. 267

    Analysis of attacks on device manager in software-defined Internet of Things by Tri-Hai Nguyen, Myungsik Yoo

    Published 2017-08-01
    “…Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. …”
    Get full text
    Article
  8. 268

    Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm by Qingyang Zhang

    Published 2022-01-01
    “…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
    Get full text
    Article
  9. 269

    An adaptive intrusion detection and prevention system for Internet of Things by Sheikh Tahir Bakhsh, Saleh Alghamdi, Rayan A Alsemmeari, Syed Raheel Hassan

    Published 2019-11-01
    “…The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. …”
    Get full text
    Article
  10. 270
  11. 271

    Implementation of lightweight intrusion detection model for security of smart green house and vertical farm by Jun-Ho Huh

    Published 2018-04-01
    “…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
    Get full text
    Article
  12. 272

    The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
    Get full text
    Article
  13. 273

    Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks by MU Siqi, WEN Shuo, LU Yang, AI Bo

    Published 2024-12-01
    “…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
    Get full text
    Article
  14. 274

    INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK by Edin Osmanbegović, Nedžad Pirić, Mirza Suljić

    Published 2017-11-01
    “…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
    Get full text
    Article
  15. 275

    INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK by Edin Osmanbegović, Nedžad Pirić, Mirza Suljić

    Published 2017-11-01
    “…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
    Get full text
    Article
  16. 276

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
    Get full text
    Article
  17. 277

    Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology by K. C. Okafor, Ifeyinwa E. Achumba, Gloria A. Chukwudebe, Gordon C. Ononiwu

    Published 2017-01-01
    “…Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. …”
    Get full text
    Article
  18. 278
  19. 279

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. …”
    Get full text
    Article
  20. 280

    Interface Data Modeling to Detect and Diagnose Intersystem Faults for Designing and Integrating System of Systems by Kyung-Min Seo, Kwang-Phil Park

    Published 2018-01-01
    “…The software that supports the modeling is implemented using the following concepts: (1) a model-view-viewmodel pattern for overall software design and (2) a computer network for representing sequential properties of field interpretations. …”
    Get full text
    Article