Search alternatives:
networks » network (Expand Search)
Showing 501 - 520 results of 740 for search '"Computer Networks"', query time: 0.16s Refine Results
  1. 501
  2. 502

    Training of Mid-Level Specialists in the Telecommunications Area Based on a Trusted Technical Solution by Elena Smirnova, Vladimir Shibanov, Pavel Romasevich

    Published 2024-07-01
    “…At the same time, based on the extensive experience in the educational activities of D Link Trade specialists, the T-COM company decided to create a training course “Data transmission and switching in computer networks” together with its technology partner, to support the educational process in Rosatom laboratory at Sirius University College. …”
    Get full text
    Article
  3. 503

    Combining Supervised and Reinforcement Learning to Build a Generic Defensive Cyber Agent by Muhammad Omer Farooq, Thomas Kunz

    Published 2025-05-01
    “…Sophisticated mechanisms for attacking computer networks are emerging, making it crucial to have equally advanced mechanisms in place to defend against these malicious attacks. …”
    Get full text
    Article
  4. 504

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  5. 505

    The Main Directions of Improving Higher Education in the Republic of Uzbekistan in the Context of Digital Transformation of the Economy by S. S. Sadykov

    Published 2021-03-01
    “…When writing the paper, methods of analysis, synthesis, special methods of working with computer networks and computer databases were used. Results. …”
    Get full text
    Article
  6. 506
  7. 507
  8. 508

    Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python by Setiya Nugroho, Bambang Pujiarto

    Published 2022-02-01
    “…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
    Get full text
    Article
  9. 509

    Identification of the structure of bioinformation technologies in the paradigm of the quality of information systems by G. N. Isaev, A. A. Roganov

    Published 2019-11-01
    “…The object of the study was the process of preparing bachelors in the direction of “Business Informatics", focusing on “Applied Informatics in the Humanitarian Sphere", masters in the direction of “Applied Informatics", focusing on: “Data and Knowledge Management in Computer Networks".Materials and Research Methods. The article analyzes the properties of bioinformation technologies. …”
    Get full text
    Article
  10. 510

    Prospects for the Use of Information and Communication Technologies in the Provision of New Types of Insurance in the Republic of Uzbekistan by A. B. Abdusalomov

    Published 2021-07-01
    “…In the course of preparing the material for this article, the methods of system analysis, economic and mathematical methods and models, special methods of working with information systems and computer networks of various levels were used. All materials of the article are based on the use of factual material of the insurance company “Ishonch” of the Republic of Uzbekistan.Results. …”
    Get full text
    Article
  11. 511

    Reforms in the Field of Statistics of the Republic of Uzbekistan: Results and Development Prospects by B. A. Begalov, O. T. Mamadaliev

    Published 2021-03-01
    “…In the process of writing this article, factual materials of the State Committee of the Republic of Uzbekistan on Statistics, comparative, systemic analysis, methods of monographic research, as well as modern methods of working with computer networks and WEB-sites, specialized software products were used.Results. …”
    Get full text
    Article
  12. 512

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
    Get full text
    Article
  13. 513

    Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1 by Widya Sayekti, Juliana Ermawati, Renny Sari Dewi

    Published 2020-02-01
    “…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
    Get full text
    Article
  14. 514

    Statistical Assessment of The Implementation of Socio-Economic Development Strategies of The Republic of Uzbekistan in the Context of Digital Transformation by B. A. Begalov, I. E. Zhukovskaya

    Published 2022-06-01
    “…In the course of writing this article, the authors used the methods of system analysis, synthesis, statistical sampling and grouping, induction, deduction, methods of working with computer networks and digital platforms, special methods and tools necessary to optimize the work of the portal of the State Committee of the Republic of Uzbekistan on Statistics, as well as when working on this article, methods of working with digital technologies, specialized software products, web services were reflected.Results. …”
    Get full text
    Article
  15. 515

    An Incident Management System Design to Protect Critical Infrastructures from Cyber Attacks by Zeynep Gürkaş Aydın, Uğur Gürtürk

    Published 2024-08-01
    “…Network devices in computer networks possess the capability to log events. …”
    Get full text
    Article
  16. 516
  17. 517
  18. 518

    VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY by Y. V. Lyubiviy, R. V. Samchuk

    Published 2020-12-01
    “…An anthropological prerequisite for virtual reality is the ability of the man’s creative imagination to calculate and choose the best model from many mental design ones, using, among other things, horizontal computer networks, which form a virtual identity. Originality. …”
    Get full text
    Article
  19. 519

    Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia) by Achmmad Mustofa, Desi Ramayanti

    Published 2020-02-01
    “…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
    Get full text
    Article
  20. 520

    Change paradigm of money system: from centralization to decentralization by S. A. Andryushin

    Published 2018-06-01
    “…The author analyzes the new trends in the emergence of a decentralized monetary system in the world economy based on public and private digital currencies issued by users of distribution computer networks. The article shows the mechanism and technology of crypto currency emission, which implies the use of public or private blockchain without any participation of the Central bank and other financial intermediation institutions.Scientific novelty: for the first time, the article shows that the era of centralized monetary system based on monopoly issue by Central banks, has come to its logical end; a decentralized monetary system is emerging in the world economy today, based on public and private issue of digital currency; in the course of legalization, growth of scalability, confidentiality, validation and tokenization of real assets, the crypto currencies will become a liquid and less volatile monetary asset.Practical significance: the main provisions and conclusions of the article can be used to clarify the target mandates, tools, channels and mechanisms of monetary policy of the Bank of Russia, capable of launching a decentralized crypto currency market, acting as a built-in stabilizer of financial sustainability and elastic regulation of trade and financial imbalances within the country and between countries.…”
    Get full text
    Article