Search alternatives:
networks » network (Expand Search)
Showing 21 - 40 results of 740 for search '"Computer Networks"', query time: 0.14s Refine Results
  1. 21
  2. 22
  3. 23

    Architecture of Hardware and Software for Unidirectional Data Transmission in Computer Networks by Y. I. Varatnitski, R. A. Rumas

    Published 2023-06-01
    “…The results of a study of the architecture of hardware and software for unidirectional data transmission in computer networks are presented. The architecture is presented in the form of optical galvanic isolation, media converters and proxy servers, excluding bidirectional data transmission at the hardware level. …”
    Get full text
    Article
  4. 24

    Application of Artificial Intelligence Technology in Computer Network Security Communication by Fulin Li

    Published 2022-01-01
    “…In order to cope with the frequent challenges of network security issues, a method of applying artificial intelligence technology to computer network security communication is proposed. First, within the framework of computer network communication, an intelligent protocol reverse analysis method is proposed. …”
    Get full text
    Article
  5. 25

    Application of blockchain in urban rail traffic edge computing network by Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE

    Published 2021-10-01
    Subjects: “…blockchain;edge computing network;security protection mechanism;urban rail traffic…”
    Get full text
    Article
  6. 26

    Survey on rail transit mobile edge computing network security by Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG

    Published 2023-04-01
    “…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
    Get full text
    Article
  7. 27

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  8. 28

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  9. 29
  10. 30

    Juveniles as victims of criminal acts committed under the misuse of computer network by Spasojević Đorđe, Miladinović-Bogavac Živanka

    Published 2018-01-01
    “…A special segment of technological development where such misuses are increasingly present are computer networks. Such fear is further expressed when it comes to juveniles, who, due to the characteristics of this development period, represent easy targets, which often leads to serious and long-term consequences. …”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34

    An Approach to Evaluating Computer Network Security with Intuitionistic Trapezoidal Fuzzy Information by Ming Xue

    Published 2014-01-01
    “…We investigate the multiple attribute decision-making problems for evaluating the computer network security with intuitionistic trapezoidal fuzzy information. …”
    Get full text
    Article
  15. 35
  16. 36

    Dynamic computing offloading strategy in LEO constellation edge computing network by GAO Yufang, JI Zhi, ZHAO Kanglian, LI Wenfeng, HU Peicong

    Published 2024-07-01
    “…In satellite edge computing networks, when too many ground users access the satellite through the same channel, the resulting co-channel interference will lead to edge computing performance degradation. …”
    Get full text
    Article
  17. 37

    Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method by Rusydi Umar, Imam Riadi, Ridho Surya Kusuma

    Published 2021-06-01
    “…The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. …”
    Get full text
    Article
  18. 38

    ANALYSIS OF THE MAIN ASPECTS OF THE IMPACT OF DoS-ATTACKS ON COMPUTER NETWORK PERFORMANCE by Ihor V. Ruban, Yevhenii S. Loshakov, Dmytro V. Prybylnov

    Published 2013-11-01
    “…The ways of their realization for attacks of computer networks and possibilities of protection against them have considered.…”
    Get full text
    Article
  19. 39
  20. 40

    Using The Hybrid GA-Ant Algorithm To Find The Optimal Path In Computer Networks by Ibtisam Turki

    Published 2022-06-01
    “…Cost management is one of the performance standards in computer networks and routing strategies through which we can get effective paths in the computer network, reach the target and perform highly in the network by improving the routing table (jumps). …”
    Get full text
    Article