Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
601
Reconceptualisation of Architects’ Intentionality in Computational Form Generation: A Tripartite Model
Published 2018-04-01“…Initially defined in the field of computation, network and communication sciences for management and organisation of information, the proposed model – composed of centralised, partial and distributed approaches – is operational in responding to different forms and degrees of design intentionality within computational processes in architecture.…”
Get full text
Article -
602
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
603
Hikikomori - japanese syndrome of social withdrawal as a problem of contemporary students of polish schools. Analysis of the phenomenon in the light of research on the subject lite...
Published 2022-04-01“…Technical progress makes access to the computer network easier and easier. Children and adolescents especially often use the Internet to find answers to their questions. …”
Get full text
Article -
604
For the security of telecommunication networks on the application program package OPNET Modeler v.14.5 and the use of the «NetDoctor» module
Published 2023-11-01“…Wireless communications, therefore, should be considered not a complete alternative to cable networks, but only an alternative technology for the implementation of individual segments or even entire levels of the designed, extensible or modernizing computer network. Detection of used erroneous technologies in the process of building and modeling of telecommunication networks ensures the security of their functioning and predicts their reliable building structure at their design. …”
Get full text
Article -
605
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
606
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
607
-
608
Capacity Expansion and Reliability Evaluation on the Networks Flows with Continuous Stochastic Functional Capacity
Published 2014-01-01“…In many systems such as computer network, fuel distribution, and transportation system, it is necessary to change the capacity of some arcs in order to increase maximum flow value from source s to sink t, while the capacity change incurs minimum cost. …”
Get full text
Article -
609
ANALISIS PERILAKU KONSUMSI PADA MARKETPLACE (SHOPEE & TOKOPEDIA) MENGGUNAKAN MODEL UTAUT
Published 2022-04-01“…Customer data security is the most important thing that must be considered in order to avoid computer network crimes or commonly known as cybercrime. …”
Get full text
Article -
610
Adaptive Cooperative Quality Weight Spectrum Sensing for Mitigating Byzantine Attacks in Cognitive Radio
Published 2025-01-01Get full text
Article -
611
-
612
An Elastic Fine-Tuning Dual Recurrent Framework for Non-Rigid Point Cloud Registration
Published 2025-06-01“…At first, we transform a non-rigid transformation into a series of combinations of rigid transformations using an outer recurrent computational network. Then, the inner loop layer computes elastic-controlled rigid incremental transformations by controlling the threshold to obtain a finely coherent rigid transformation. …”
Get full text
Article -
613
Brain systems for probabilistic and dynamic prediction: computational specificity and integration.
Published 2013-09-01“…A region in parietal cortex, which was sensitive to the divergence between the predictions of the models and anatomically connected to both computational networks, is proposed to mediate integration of the two predictive modes to produce a single behavioral output.…”
Get full text
Article -
614
Development and Application of UAV VR Panoramic Display System for Datengxia Water Project
Published 2021-01-01“…With the rapid development of computer network technology,panoramic technology has been widely applied in many fields such as tourism,real estate,engineering construction,and virtual education.It realizes the all-round interactive viewing and browsing in real scenes,with the sense of the scene and interaction.This paper obtains the panoramic images by the UAV aerial photography and image stitching technology,develops the UAV VR panoramic display system of Datengxia Water Project based on krpano engine and geographic information technology for realizing many functions including panoramic data storage management,online editing,releasing,etc.After the system is applied to the panoramic data management of Datengxia,there are lots of good feedback,and the work efficiency is greatly improved.In addition,this panoramic system provides data support for the virtual monitoring of the Datengxia Water Project construction,promotes the classification and efficient retrieval of panoramic data in the project,improves the efficiency of users in making panoramic projects and managing panoramic data,and offers an operation platform for building the Datengxia Water Project exhibition site and the VR display project of the Datengxia Museum.…”
Get full text
Article -
615
Recommendations for using a methodology for assessing the security of an automated control system for critical information infrastructure from DDoS attacks based on Monte Carlo sim...
Published 2023-10-01“…The methodology allows the decision-maker to obtain an assessment of the risk of exposure of the computer network (CN) to DDoS attacks and take necessary actions to reduce the risk of this threat.Method. …”
Get full text
Article -
616
Deep Federated Learning Based Convergence Analysis in Relaying-Aided MEC-IoT Networks
Published 2022-01-01“…The work in this paper can provide some theoretical foundation for deep federated learning and computing networks.…”
Get full text
Article -
617
Direct laser writing of graphene oxide for ultra-low power consumption memristors in reservoir computing for digital recognition
Published 2022-08-01“…Meanwhile, the Pt/GO/rGO memristor array is applied in the reservoir computing network, performing the digital recognition with a high accuracy of 95.74%. …”
Get full text
Article -
618
Analysis of periodic wave soliton structure for the wave propagation in nonlinear low–pass electrical transmission lines through analytical technique
Published 2025-09-01“…The nonlinear LPETLs model having important implications in sciences and engineering such as communication and electronic engineering included system of signal distribution in cable television, connection system of radio receiver and transmitter and its antennas, computer networking connected system, routing call truck lines of telephone switching centers, high speed data buses in computers and many others. …”
Get full text
Article -
619
Dynamic Traffic Engineering for Cooperative Fog-Cloud Environment: Trade-off Analysis of Cost and Utilization Under Different Load Conditions
Published 2024-09-01“…The key contributions include the formulation of an optimization model that optimizes resource allocation, addresses blocking factors in fog networks, and offers valuable insights for managing dynamic traffic in fog computing networks.…”
Get full text
Article -
620
Leveraging AI-enabled mobile learning platforms to enhance the effectiveness of English teaching in universities
Published 2025-05-01“…It explores how AI-driven platforms, using soft computing networks, can improve students’ critical thinking skills and foster deeper engagement with academic subjects. …”
Get full text
Article