Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
541
Integrated Photonics for IoT, RoF, and Distributed Fog–Cloud Computing: A Comprehensive Review
Published 2025-07-01“…Integrated photonics is a transformative technology for enhancing communication and computation in Cloud and Fog computing networks. Photonic integrated circuits (PICs) enable significant improvements in data-processing speed, energy-efficiency, scalability, and latency. …”
Get full text
Article -
542
Soft graph clustering for single-cell RNA sequencing data
Published 2025-07-01Get full text
Article -
543
A Classification Data Packets Using the Threshold Method for Detection of DDoS
Published 2024-06-01“…The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. …”
Get full text
Article -
544
Innovative information technologies and their impact on the performance of the entities which activate in the retail industry
Published 2015-05-01“…The turnover is considered an endogenous variable (underlying the impact of the information technologies on its value) as well as exogenous (the existence of a unique computers network within the company depending on the turnover as a development factor). …”
Get full text
Article -
545
-
546
Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
Published 2024-04-01“…Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network administrators to protect computer network from intruders. …”
Get full text
Article -
547
Alphabet Handwriting Recognition: From Wood‐Framed Hydrogel Arrays Design to Machine Learning Decoding
Published 2024-12-01“…Nonetheless, the design of such a system from scratch with sustainable materials and an easily accessible computing network presents significant challenges. In pursuit of this goal, a flexible, and electrically conductive wood‐derived hydrogel array is developed as a handwriting input panel, enabling recognizing alphabet handwriting assisted by machine learning technique. …”
Get full text
Article -
548
WFQ ENHANCEMENT USING INTELLIGENT DISTRIBUTED QUEUE BASED ANFIS FOR PACKET SWITCHING NETWORK
Published 2019-06-01“…In order to enhance the performance of computer network.…”
Get full text
Article -
549
A Survey on Software Defined Network-Enabled Edge Cloud Networks: Challenges and Future Research Directions
Published 2025-05-01“…To address these challenges, edge cloud-distributed computing networks emerge. Because of the distributed nature of edge cloud networks, many research works considering software defined networks (SDNs) and network–function–virtualization (NFV) could be key enablers for managing, orchestrating, and load balancing resources. …”
Get full text
Article -
550
-
551
A Semi-Supervised Deep Network Embedding Approach Based on the Neighborhood Structure
Published 2019-09-01Get full text
Article -
552
ABOUT PRODUCTION-TRANSPORT PROBLEM REDUCTION TO THE TWO-LEVEL PROBLEM OF DISCRETE OPTIMIZATION AND ITS APPLICATION
Published 2018-06-01“…In this study, the application of the production and transport task is considered to solve the problem of the distribution of the limited capacities of data transmission channels between different nodes of the computer network. A scheme is proposed for reducing the problem to a two-level continuous-discrete optimization problem. …”
Get full text
Article -
553
Method of Optimize Scheduling Under Double Engines about Quantum/Electron Computing Power Networks Resource
Published 2025-03-01“…The research on quantum/electron heterogeneous computing power networks, based on a dual-engine global optimization metric scheduling mechanism and algorithm for quantum/electron computing network resources, demonstrates both foresight and scientific rigor. …”
Get full text
Article -
554
Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"
Published 2022-11-01“…To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.…”
Get full text
Article -
555
A Novel Crowdsourcing-Assisted 5G Wireless Signal Ranging Technique in MEC Architecture
Published 2025-05-01Get full text
Article -
556
5G edge computing technology and application prospects
Published 2019-06-01“…Edge computing is a method of processing data physically close to where data is generated,and it is one of the key technologies of 5G.The development of network technology and the demand of business applications have jointly promoted the maturity of 5G edge computing.The 5G edge computing technology system was elaborated through the perspective of edge infrastructure,edge computing network and edge platform,and the 5G edge computing application was prospected.…”
Get full text
Article -
557
Solar Agro Savior: Smart Agricultural Monitoring Using Drones and Deep Learning Techniques
Published 2025-08-01Get full text
Article -
558
-
559
Human organ trafficking in the cyber space
Published 2009-01-01“…The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. …”
Get full text
Article -
560
Key technology and standardization progress for 5G
Published 2017-11-01“…Under the impetus of the global industry,the 5G technology developes rapidly and has entered the critical stage of standard setting and technical verification.Based on this,the key technologies of 5G and its latest standardization progress was introduced mainly,including massive MIMO,new radio network architecture,ultra dense network,edge computing,network slicing,networking on-demand ,4G and 5G interworking,as well as industry organization and operator dynamics,and ended with some thoughts and suggestions.…”
Get full text
Article