Search alternatives:
networks » network (Expand Search)
Showing 541 - 560 results of 740 for search '"Computer Networks"', query time: 0.18s Refine Results
  1. 541

    Integrated Photonics for IoT, RoF, and Distributed Fog–Cloud Computing: A Comprehensive Review by Gerardo Antonio Castañón Ávila, Walter Cerroni, Ana Maria Sarmiento-Moncada

    Published 2025-07-01
    “…Integrated photonics is a transformative technology for enhancing communication and computation in Cloud and Fog computing networks. Photonic integrated circuits (PICs) enable significant improvements in data-processing speed, energy-efficiency, scalability, and latency. …”
    Get full text
    Article
  2. 542
  3. 543

    A Classification Data Packets Using the Threshold Method for Detection of DDoS by Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, Muhammad Nur Faiz, Arif Wirawan Muhammad, Santi Purwaningrum, Laura Sari

    Published 2024-06-01
    “…The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. …”
    Get full text
    Article
  4. 544

    Innovative information technologies and their impact on the performance of the entities which activate in the retail industry by Valentin-Florentin Dumitru, Gabriel Jinga, Florin Mihai, Aurelia Stefănescu

    Published 2015-05-01
    “…The turnover is considered an endogenous variable (underlying the impact of the information technologies on its value) as well as exogenous (the existence of a unique computers network within the company depending on the turnover as a development factor). …”
    Get full text
    Article
  5. 545
  6. 546

    Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity by Tati Ernawati, Idham Kholid, Dahlan, Dini Rohmayani

    Published 2024-04-01
    “…Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network administrators to protect computer network from intruders. …”
    Get full text
    Article
  7. 547

    Alphabet Handwriting Recognition: From Wood‐Framed Hydrogel Arrays Design to Machine Learning Decoding by Guihua Yan, Xichen Hu, Ziyue Miao, Yongde Liu, Xianhai Zeng, Lu Lin, Olli Ikkala, Bo Peng

    Published 2024-12-01
    “…Nonetheless, the design of such a system from scratch with sustainable materials and an easily accessible computing network presents significant challenges. In pursuit of this goal, a flexible, and electrically conductive wood‐derived hydrogel array is developed as a handwriting input panel, enabling recognizing alphabet handwriting assisted by machine learning technique. …”
    Get full text
    Article
  8. 548

    WFQ ENHANCEMENT USING INTELLIGENT DISTRIBUTED QUEUE BASED ANFIS FOR PACKET SWITCHING NETWORK by Sh. A. Ali, K. A. Nassar

    Published 2019-06-01
    “…In order to enhance the performance of computer network.…”
    Get full text
    Article
  9. 549

    A Survey on Software Defined Network-Enabled Edge Cloud Networks: Challenges and Future Research Directions by Baha Uddin Kazi, Md Kawsarul Islam, Muhammad Mahmudul Haque Siddiqui, Muhammad Jaseemuddin

    Published 2025-05-01
    “…To address these challenges, edge cloud-distributed computing networks emerge. Because of the distributed nature of edge cloud networks, many research works considering software defined networks (SDNs) and network–function–virtualization (NFV) could be key enablers for managing, orchestrating, and load balancing resources. …”
    Get full text
    Article
  10. 550
  11. 551
  12. 552

    ABOUT PRODUCTION-TRANSPORT PROBLEM REDUCTION TO THE TWO-LEVEL PROBLEM OF DISCRETE OPTIMIZATION AND ITS APPLICATION by E. Ivokhin, V. Navrodskiy, D. Apanasenko

    Published 2018-06-01
    “…In this study, the application of the production and transport task is considered to solve the problem of the distribution of the limited capacities of data transmission channels between different nodes of the computer network. A scheme is proposed for reducing the problem to a two-level continuous-discrete optimization problem. …”
    Get full text
    Article
  13. 553

    Method of Optimize Scheduling Under Double Engines about Quantum/Electron Computing Power Networks Resource by CHENG Qiyue, LU Jun

    Published 2025-03-01
    “…The research on quantum/electron heterogeneous computing power networks, based on a dual-engine global optimization metric scheduling mechanism and algorithm for quantum/electron computing network resources, demonstrates both foresight and scientific rigor. …”
    Get full text
    Article
  14. 554

    Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks" by A. R. Gazizov

    Published 2022-11-01
    “…To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.…”
    Get full text
    Article
  15. 555
  16. 556

    5G edge computing technology and application prospects by Hongyuan MA, Ziyu XIAO, Zhonggui BU, Yuan ZHAO

    Published 2019-06-01
    “…Edge computing is a method of processing data physically close to where data is generated,and it is one of the key technologies of 5G.The development of network technology and the demand of business applications have jointly promoted the maturity of 5G edge computing.The 5G edge computing technology system was elaborated through the perspective of edge infrastructure,edge computing network and edge platform,and the 5G edge computing application was prospected.…”
    Get full text
    Article
  17. 557
  18. 558
  19. 559

    Human organ trafficking in the cyber space by Vuletić Dejan

    Published 2009-01-01
    “…The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. …”
    Get full text
    Article
  20. 560

    Key technology and standardization progress for 5G by Qingyang WANG, Peirong XIE, Shangkun XIONG, Yao WEI, Yu LIU, Wenyi LI, Jinlian WU

    Published 2017-11-01
    “…Under the impetus of the global industry,the 5G technology developes rapidly and has entered the critical stage of standard setting and technical verification.Based on this,the key technologies of 5G and its latest standardization progress was introduced mainly,including massive MIMO,new radio network architecture,ultra dense network,edge computing,network slicing,networking on-demand ,4G and 5G interworking,as well as industry organization and operator dynamics,and ended with some thoughts and suggestions.…”
    Get full text
    Article