Search alternatives:
networks » network (Expand Search)
Showing 581 - 600 results of 740 for search '"Computer Networks"', query time: 0.12s Refine Results
  1. 581

    Computation of the Double Metric Dimension in Convex Polytopes by Liying Pan, Muhammad Ahmad, Zohaib Zahid, Sohail Zafar

    Published 2021-01-01
    “…Source localization has much importance in order to model many real-world phenomena, for instance, spreading of a virus in a computer network, epidemics in human beings, and rumor spreading on the internet. …”
    Get full text
    Article
  2. 582

    A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment by Liping Feng, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, Qi Han

    Published 2021-01-01
    “…Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. …”
    Get full text
    Article
  3. 583

    Security risk analysis of power 5G hybrid networking by Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO

    Published 2022-01-01
    “…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
    Get full text
    Article
  4. 584

    KRIVIČNOPRAVNA REAKCIJA NA DEČIJU PORNOGRAFIJU/PORNOGRAFIJU MALOLETNIH LICA - PLASIRANU/NASTALU ZLOUPOTREBOM RAČUNARSKE MREŽE/KOMUNIKACIJE DRUGIM TEHNIČKIM SREDSTVIMA by Milan Škulić

    Published 2022-06-01
    “… In the article are explained the basic characteristics of the criminal law reaction to child pornography, i.e. pornography of minors/juveniles, especially when it is realised using appropriate so-called high technology, which boils down to the misuse of a computer network or communication by other technical means. …”
    Get full text
    Article
  5. 585

    Computation of Resolvability Parameters for Benzenoid Hammer Graph by Ali Ahmad, Al-Nashri Al-Hossain Ahmad

    Published 2022-01-01
    “…This idea was delivered in various problems of computer networking as well as in chemical graph theory. …”
    Get full text
    Article
  6. 586

    Inflammatory Acute Response. Biochemical and Cellular Considerations by Milagros Lisset León Regal, Ania Alvarado Borges, José Omar de Armas García, Luciano Miranda Alvarado, Javier Antonio Varens Cedeño, José Ángel Cuesta del Sol

    Published 2015-02-01
    “…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
    Get full text
    Article
  7. 587

    Load Balancer Operation Analyses of Video-Conference Service by A. N. Markov, A. I. Paramonov

    Published 2022-09-01
    “…The graphs of the load on the hardware components of the virtual server at three stages of testing for the central processor, RAM, and network interfaces both within the service and in the structure of the local computer network are given. The results of the analysis of graphs are described in order to identify the key features of the operation of the video conferencing service with a load balancer. …”
    Get full text
    Article
  8. 588

    INTERPRETABLE PREDICTIVE MODEL OF NETWORK INTRUSION USING SEVERAL MACHINE LEARNING ALGORITHMS by Muhammad Ahsan, Arif Khoirul Anam, Erdi Julian, Andi Indra Jaya

    Published 2022-03-01
    “…Network intrusion is any unauthorized activity on a computer network. Attacks on the network computer system can be devastating and affect networks and company establishments. …”
    Get full text
    Article
  9. 589

    Heterogeneous resource cooperative game in space-ground computing power network by Yutong ZHANG, Yuming PENG, Boya DI, Lingyang SONG

    Published 2023-12-01
    “…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
    Get full text
    Article
  10. 590

    Runtime collaborative scheduling of resources in computing power network oriented to the wide-area distributed intelligent computing environment by SONG Yao, SONG Ping, GAO Wei, LIU Shu, HUO Zhisheng

    Published 2025-05-01
    “…The key task selection and backfilling, network traffic scheduling of core flow, and adaptive data placement strategies are designed. The usage of computing, network, and storage resources in the computing power network are comprehensively analyzed, and the strategies are collaboratively implemented to optimized the global utilization of resources. …”
    Get full text
    Article
  11. 591

    An improved Chang cryptography scheme by XU Ming, YING Jing, CHEN Chun

    Published 2000-11-01
    “…Digital signature and fault tolerance are two important issues in modern computer network communication. In most case, they are addressed and implemented separately. …”
    Get full text
    Article
  12. 592

    A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks by Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh

    Published 2017-07-01
    “…Thus, fast and fault tolerant leader election is a major concern and popular area of research in distributed computing networks, in general, and wireless ad hoc networks, in particular. …”
    Get full text
    Article
  13. 593

    Autonomous computing and network convergence:architecture, technologies, and prospects by Xiaomao ZHOU, Qingmin JIA, Yujiao HU, Kai GUO, Qianpiao MA, Hui LIU, Renchao XIE

    Published 2023-12-01
    “…., intent-driven computing network, the autonomous system operation and the adaptive co-evolution of communication, computing intelligence, were summarized from the proposed Auto-CNC.Meanwhile, the reference architecture and key technologies of Auto-CNC were described, which were followed by several preliminary exploration cases.Finally, future research trends and technical advice were discussed and recommended.…”
    Get full text
    Article
  14. 594

    Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update by Luis Enrique Jiménez Franco, Dianelys María Gutiérrez Pérez, Milagros Lisset León Regal, Claudia González Martínez, Lucía Baños Leyva, Arionnis Matos Olivero

    Published 2023-02-01
    “…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
    Get full text
    Article
  15. 595

    Research on intelligent modeling and policy making of CNC brain by Jun ZHOU, Keqing LIU, Shikui WANG, Ling YANG

    Published 2023-08-01
    “…As a future-oriented new network architecture, the core idea of computing and network convergence is to manage cloud-edge-end computing network resources in a centralized or distributed way by centering on the deep integration of computing force and network resources, so as to provide computing service for users’ needs.Although the CNC has made some progress in standard setting and industrial promotion, the overall development still faces many challenges, and there are still many scientific and engineering problems to be broken through.Research on CNC and its brain was carried out, the latest progress in related fields in the industry was analyzed, and the idea of building intelligent CNC brain was put forward, hoping to throw a brick at the table, jointly promote the implementation of AI in CNC, and truly realize intelligent CNC.…”
    Get full text
    Article
  16. 596
  17. 597

    Probabilistic models for evaluating network edge's resistance against scan and foothold attack by Shuo Wang, Qingqi Pei, Yang Xiao, Feng Shao, Shuai Yuan, Jiang Chu, Renjie Liao

    Published 2024-12-01
    “…Abstract The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which greatly affects the application and development of edge computing network architecture. However, existing works focus on the implementation of specific technologies that resist the SFANE but ignore the effectiveness analysis of them. …”
    Get full text
    Article
  18. 598

    Monophasic and biphasic neurodynamics of bi-S-type locally active memristor by Xinyi Wang, Yujiao Dong, Guangyi Wang, Guangyi Wang, Ziyu Zhou, Yidan Mao, Peipei Jin, Yan Liang

    Published 2025-05-01
    “…Hardware emulation validates neurodynamics under varying stimuli from theoretical analyses, offering a unit module and theoretical reference for energy-efficient neuromorphic computing network.…”
    Get full text
    Article
  19. 599

    5G industry wireless private network technology and business requirement model by Xuezhi ZHANG, Jingbo ZHAO, Huijie ZHAO

    Published 2021-08-01
    “…5G industry wireless private network has become one of the most important services for operators enabling the vertical industry.The gradual maturity of virtualization, multi-access edge computing, network slicing and other technologies have provided a key technical guarantee for the development of 5G industry wireless private network.The development status, key technology, requirement model, challenges and development recommendations of 5G industry wireless private network were introduced.The concept and classification of 5G industry wireless private network were introduced, the key technologies were generalized, and the design ideas and the main reference index were put forward aiming at business requirement.Finally, the challenges faced by operators when developing 5G wireless private network services were summarized and development suggestions were given.…”
    Get full text
    Article
  20. 600

    METHOD FOR THE DIAGNOSTICS OF SYNCHRONIZATION DISTURBANCES IN THE TELECOMMUNICATIONS NETWORK OF A CRITICAL USED COMPUTER SYSTEM by Vladimir Rudnytsky, Mykhailo Mozhaiev, Nina Kuchuk

    Published 2020-03-01
    “…The analysis and classification of the causes of computer network synchronization failure of a critical application computer system is carried out. …”
    Get full text
    Article