Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
501
Relationship of Community Mobility, Vital Space, and Faller Status in Older Adults
Published 2024-11-01Get full text
Article -
502
Training of Mid-Level Specialists in the Telecommunications Area Based on a Trusted Technical Solution
Published 2024-07-01“…At the same time, based on the extensive experience in the educational activities of D Link Trade specialists, the T-COM company decided to create a training course “Data transmission and switching in computer networks” together with its technology partner, to support the educational process in Rosatom laboratory at Sirius University College. …”
Get full text
Article -
503
Combining Supervised and Reinforcement Learning to Build a Generic Defensive Cyber Agent
Published 2025-05-01“…Sophisticated mechanisms for attacking computer networks are emerging, making it crucial to have equally advanced mechanisms in place to defend against these malicious attacks. …”
Get full text
Article -
504
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
505
The Main Directions of Improving Higher Education in the Republic of Uzbekistan in the Context of Digital Transformation of the Economy
Published 2021-03-01“…When writing the paper, methods of analysis, synthesis, special methods of working with computer networks and computer databases were used. Results. …”
Get full text
Article -
506
Enhanced anomaly network intrusion detection using an improved snow ablation optimizer with dimensionality reduction and hybrid deep learning model
Published 2025-04-01“…Abstract With the enlarged utilization of computer networks, security has become one of the critical issues. …”
Get full text
Article -
507
Multitask Learning-Based Pipeline-Parallel Computation Offloading Architecture for Deep Face Analysis
Published 2025-01-01Get full text
Article -
508
Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python
Published 2022-02-01“…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
Get full text
Article -
509
Identification of the structure of bioinformation technologies in the paradigm of the quality of information systems
Published 2019-11-01“…The object of the study was the process of preparing bachelors in the direction of “Business Informatics", focusing on “Applied Informatics in the Humanitarian Sphere", masters in the direction of “Applied Informatics", focusing on: “Data and Knowledge Management in Computer Networks".Materials and Research Methods. The article analyzes the properties of bioinformation technologies. …”
Get full text
Article -
510
Prospects for the Use of Information and Communication Technologies in the Provision of New Types of Insurance in the Republic of Uzbekistan
Published 2021-07-01“…In the course of preparing the material for this article, the methods of system analysis, economic and mathematical methods and models, special methods of working with information systems and computer networks of various levels were used. All materials of the article are based on the use of factual material of the insurance company “Ishonch” of the Republic of Uzbekistan.Results. …”
Get full text
Article -
511
Reforms in the Field of Statistics of the Republic of Uzbekistan: Results and Development Prospects
Published 2021-03-01“…In the process of writing this article, factual materials of the State Committee of the Republic of Uzbekistan on Statistics, comparative, systemic analysis, methods of monographic research, as well as modern methods of working with computer networks and WEB-sites, specialized software products were used.Results. …”
Get full text
Article -
512
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
Get full text
Article -
513
Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1
Published 2020-02-01“…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
Get full text
Article -
514
Statistical Assessment of The Implementation of Socio-Economic Development Strategies of The Republic of Uzbekistan in the Context of Digital Transformation
Published 2022-06-01“…In the course of writing this article, the authors used the methods of system analysis, synthesis, statistical sampling and grouping, induction, deduction, methods of working with computer networks and digital platforms, special methods and tools necessary to optimize the work of the portal of the State Committee of the Republic of Uzbekistan on Statistics, as well as when working on this article, methods of working with digital technologies, specialized software products, web services were reflected.Results. …”
Get full text
Article -
515
An Incident Management System Design to Protect Critical Infrastructures from Cyber Attacks
Published 2024-08-01“…Network devices in computer networks possess the capability to log events. …”
Get full text
Article -
516
Mixed photonic/electronic neural network based on microLED arrays
Published 2025-01-01Get full text
Article -
517
A forestry investigation: Exploring factors behind improved tree species classification using bark images
Published 2025-03-01Get full text
Article -
518
VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY
Published 2020-12-01“…An anthropological prerequisite for virtual reality is the ability of the man’s creative imagination to calculate and choose the best model from many mental design ones, using, among other things, horizontal computer networks, which form a virtual identity. Originality. …”
Get full text
Article -
519
Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia)
Published 2020-02-01“…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
Get full text
Article -
520
Change paradigm of money system: from centralization to decentralization
Published 2018-06-01“…The author analyzes the new trends in the emergence of a decentralized monetary system in the world economy based on public and private digital currencies issued by users of distribution computer networks. The article shows the mechanism and technology of crypto currency emission, which implies the use of public or private blockchain without any participation of the Central bank and other financial intermediation institutions.Scientific novelty: for the first time, the article shows that the era of centralized monetary system based on monopoly issue by Central banks, has come to its logical end; a decentralized monetary system is emerging in the world economy today, based on public and private issue of digital currency; in the course of legalization, growth of scalability, confidentiality, validation and tokenization of real assets, the crypto currencies will become a liquid and less volatile monetary asset.Practical significance: the main provisions and conclusions of the article can be used to clarify the target mandates, tools, channels and mechanisms of monetary policy of the Bank of Russia, capable of launching a decentralized crypto currency market, acting as a built-in stabilizer of financial sustainability and elastic regulation of trade and financial imbalances within the country and between countries.…”
Get full text
Article