Search alternatives:
networks » network (Expand Search)
Showing 421 - 440 results of 740 for search '"Computer Networks"', query time: 0.11s Refine Results
  1. 421

    Modeling and analysis of performance reliability for communication networks based on traffic dynamics by ZHAO Juan1, GUO Ping1, DENG Hong-zhong2, WU Jun2, TAN Yue-jin2, LI Jian-ping1

    Published 2011-01-01
    “…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
    Get full text
    Article
  2. 422

    Fault-Tolerant Resolvability in Some Classes of Subdivision Graphs by Muhammad Faheem, Zohaib Zahid, Dalal Alrowaili, Imran Siddique, Aiyared Iampan

    Published 2022-01-01
    “…The concept of resolving sets (RSs) and metric dimension (MD) invariants have a wide range of applications in robot navigation, computer networks, and chemical structure. RS has been used as a sensor in an indoor positioning system to find an interrupter. …”
    Get full text
    Article
  3. 423

    Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs by Adel Issa

    Published 2011-07-01
    “…With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. …”
    Get full text
    Article
  4. 424

    On Graph-Transversal Designs and Graph-Authentication Codes Based on Mutually Orthogonal Graph Squares by A. El-Mesady, Omar Bazighifan, H. M. Shabana

    Published 2022-01-01
    “…Combinatorial designs have many interesting and genuine wide applications in areas including analysis and design of algorithms, cryptography, analysis and design of experiments, storage system design, tournament scheduling, optical communications, and computer networks to mention just a few areas. In this paper, we are concerned with the transversal designs and authentication codes as direct applications of combinatorial designs. …”
    Get full text
    Article
  5. 425

    Development and influence of European and American university libraries by Irena Sapač

    Published 2000-01-01
    “…Not until the second half of the 19th and especially the 20th century did the American university libraries achieve such high levels of cataloguing, classification, co-operation, organisation, computer networks, information holders, education and constructing library buildings that the European libraries started assuming their methods.…”
    Get full text
    Article
  6. 426
  7. 427
  8. 428

    Closed Gordon – Newell network with single-line poles and exponentially limited request waiting time by Yu. V. Malinkovsky, V. A. Nemilostivaya

    Published 2023-12-01
    “…It is very important in the design and modernization of information and computer networks.…”
    Get full text
    Article
  9. 429
  10. 430

    The Beginning of the Registration of Estonian Books in Printed Works as Compared with that of the Other Nations of the Baltic Sea by Liivi Aarma

    Published 2024-08-01
    “…Here l would emphasise that it is the historical phenomenon of networking, much similar to that of modem computer networks. Despite the fact that the fruits of typography were accessible only for quite a limited part of the society the ideas and models spread everywhere, evoking analogous phenomena in various countries and places. …”
    Get full text
    Article
  11. 431

    The Laplacian Energy of an Intuitionistic Fuzzy Rough Graph and its Utilisation in Decision-Making by Shaik Noorjahan, Shaik Sharief Basha

    Published 2025-01-01
    “…It uses lower and upper approximation spaces in various fields, including science, technology, database systems, computer networks, and expert system architecture. The matrix of adjacency of an intuitionistic fuzzy rough graph is described in the article. …”
    Get full text
    Article
  12. 432

    The Influence and Analysis of Multimedia Interaction on the Development of Dance by Haijian Wu, Yan Leng

    Published 2022-01-01
    “…It can be seen that multimedia interaction is of great significance to the development of dance; with the rapid development of science and technology, multimedia technologies such as computer networks are widely used in all walks of life. …”
    Get full text
    Article
  13. 433
  14. 434

    Silicon Snake Oil Revisited by Joel Maloff

    Published 2024-03-01
    “…Case in point: “I don’t believe that phone books, newspapers, magazines, or corner video stores will disappear as computer networks spread. Nor do I think that my telephone will merge with my computer, to become some sort of information appliance.” …”
    Get full text
    Article
  15. 435

    METHOD FOR DETERMININGPARAMETERS FOR EVALUATIONDATA INTERMEDIATE NODES FOR ROUTING IN HIERARCHICALNETWORKS WITH DIFFERENT TOPOLOGIES by Aleksandr V. Grachev, Tamara V. Kiseleva, Roman S. Koynov, Alexey S. Dobrynin

    Published 2016-08-01
    “…This applies both to computer networks, and for managing networks. The results of the method are comprehensive assessment, which results in the treatment of accumulated statistics for making assessment of the route based on the task at hand. …”
    Get full text
    Article
  16. 436

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
    Get full text
    Article
  17. 437
  18. 438

    Innovative computing and blockchain technologies in agriculture for accelerating economic integration among Russia, China, and the Republic of Belarus by A. Yu. Mikhailov

    Published 2024-12-01
    “…Cloud infrastructure includes computer networks, servers, data warehouses, and operating systems. …”
    Get full text
    Article
  19. 439

    Queuing Delay Reduction based on Network Traffic Patterns: A Predictive QoS Framework For Point-To-Point Communications by Espinal Albert, Sanchez Padilla V.

    Published 2025-04-01
    “…Ensuring optimal quality of service (QoS) in computer networks requires a detailed assessment of performance metrics, with data network queuing delay within intermediate devices being critical parameters. …”
    Get full text
    Article
  20. 440

    Validity of Goods And Services Sale and Purchase Agreements by Online by Muhammad Aldi, Rahmatul Hidayati, Sunardi, Budi Parmono

    Published 2024-08-01
    “…This process is further made possible by worldwide internet computer networks. International society in general and Indonesian society in particular have greatly benefited from using electronic transaction media, or e-commerce, in the trade industry. …”
    Get full text
    Article