Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
421
Modeling and analysis of performance reliability for communication networks based on traffic dynamics
Published 2011-01-01“…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
Get full text
Article -
422
Fault-Tolerant Resolvability in Some Classes of Subdivision Graphs
Published 2022-01-01“…The concept of resolving sets (RSs) and metric dimension (MD) invariants have a wide range of applications in robot navigation, computer networks, and chemical structure. RS has been used as a sensor in an indoor positioning system to find an interrupter. …”
Get full text
Article -
423
Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs
Published 2011-07-01“…With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. …”
Get full text
Article -
424
On Graph-Transversal Designs and Graph-Authentication Codes Based on Mutually Orthogonal Graph Squares
Published 2022-01-01“…Combinatorial designs have many interesting and genuine wide applications in areas including analysis and design of algorithms, cryptography, analysis and design of experiments, storage system design, tournament scheduling, optical communications, and computer networks to mention just a few areas. In this paper, we are concerned with the transversal designs and authentication codes as direct applications of combinatorial designs. …”
Get full text
Article -
425
Development and influence of European and American university libraries
Published 2000-01-01“…Not until the second half of the 19th and especially the 20th century did the American university libraries achieve such high levels of cataloguing, classification, co-operation, organisation, computer networks, information holders, education and constructing library buildings that the European libraries started assuming their methods.…”
Get full text
Article -
426
Dissection of an Approval-Based Trusted-Token Fraud Scheme Used Across Multiple Blockchain Systems
Published 2025-01-01Get full text
Article -
427
Challenges in adjusting scoring matrices when comparing functional motifs with non-standard compositions
Published 2024-12-01Get full text
Article -
428
Closed Gordon – Newell network with single-line poles and exponentially limited request waiting time
Published 2023-12-01“…It is very important in the design and modernization of information and computer networks.…”
Get full text
Article -
429
Neural Models for Imputation of Missing Ozone Data in Air-Quality Datasets
Published 2018-01-01Get full text
Article -
430
The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea
Published 2024-08-01“…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
Get full text
Article -
431
The Laplacian Energy of an Intuitionistic Fuzzy Rough Graph and its Utilisation in Decision-Making
Published 2025-01-01“…It uses lower and upper approximation spaces in various fields, including science, technology, database systems, computer networks, and expert system architecture. The matrix of adjacency of an intuitionistic fuzzy rough graph is described in the article. …”
Get full text
Article -
432
The Influence and Analysis of Multimedia Interaction on the Development of Dance
Published 2022-01-01“…It can be seen that multimedia interaction is of great significance to the development of dance; with the rapid development of science and technology, multimedia technologies such as computer networks are widely used in all walks of life. …”
Get full text
Article -
433
Hybrid Cryptosystem with Computational Ghost Imaging Based on Integer Wavelet Transform and Chaotic Maps
Published 2025-06-01Get full text
Article -
434
Silicon Snake Oil Revisited
Published 2024-03-01“…Case in point: “I don’t believe that phone books, newspapers, magazines, or corner video stores will disappear as computer networks spread. Nor do I think that my telephone will merge with my computer, to become some sort of information appliance.” …”
Get full text
Article -
435
METHOD FOR DETERMININGPARAMETERS FOR EVALUATIONDATA INTERMEDIATE NODES FOR ROUTING IN HIERARCHICALNETWORKS WITH DIFFERENT TOPOLOGIES
Published 2016-08-01“…This applies both to computer networks, and for managing networks. The results of the method are comprehensive assessment, which results in the treatment of accumulated statistics for making assessment of the route based on the task at hand. …”
Get full text
Article -
436
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article -
437
A High Efficient and Real Time Data Aggregation Scheme for WSNs
Published 2015-06-01Get full text
Article -
438
Innovative computing and blockchain technologies in agriculture for accelerating economic integration among Russia, China, and the Republic of Belarus
Published 2024-12-01“…Cloud infrastructure includes computer networks, servers, data warehouses, and operating systems. …”
Get full text
Article -
439
Queuing Delay Reduction based on Network Traffic Patterns: A Predictive QoS Framework For Point-To-Point Communications
Published 2025-04-01“…Ensuring optimal quality of service (QoS) in computer networks requires a detailed assessment of performance metrics, with data network queuing delay within intermediate devices being critical parameters. …”
Get full text
Article -
440
Validity of Goods And Services Sale and Purchase Agreements by Online
Published 2024-08-01“…This process is further made possible by worldwide internet computer networks. International society in general and Indonesian society in particular have greatly benefited from using electronic transaction media, or e-commerce, in the trade industry. …”
Get full text
Article