Search alternatives:
networks » network (Expand Search)
Showing 601 - 620 results of 740 for search '"Computer Networks"', query time: 0.12s Refine Results
  1. 601

    Reconceptualisation of Architects’ Intentionality in Computational Form Generation: A Tripartite Model by Duygu Tüntaş Karaman

    Published 2018-04-01
    “…Initially defined in the field of computation, network and communication sciences for management and organisation of information, the proposed model – composed of centralised, partial and distributed approaches – is operational in responding to different forms and degrees of design intentionality within computational processes in architecture.…”
    Get full text
    Article
  2. 602

    Botnets’ similarity analysis based on communication features and D-S evidence theory by ZANG Tian-ning1, YUN Xiao-chun1, ZHANG Yong-zheng2, MEN Chao-guang1, CUI Xiang2

    Published 2011-01-01
    “…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
    Get full text
    Article
  3. 603

    Hikikomori - japanese syndrome of social withdrawal as a problem of contemporary students of polish schools. Analysis of the phenomenon in the light of research on the subject lite... by Kinga Frączkowska

    Published 2022-04-01
    “…Technical progress makes access to the computer network easier and easier. Children and adolescents especially often use the Internet to find answers to their questions. …”
    Get full text
    Article
  4. 604

    For the security of telecommunication networks on the application program package OPNET Modeler v.14.5 and the use of the «NetDoctor» module by М.З. Якубова, Т.Г. Сериков

    Published 2023-11-01
    “…Wireless communications, therefore, should be considered not a complete alternative to cable networks, but only an alternative technology for the implementation of individual segments or even entire levels of the designed, extensible or modernizing computer network. Detection of used erroneous technologies in the process of building and modeling of telecommunication networks ensures the security of their functioning and predicts their reliable building structure at their design. …”
    Get full text
    Article
  5. 605

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  6. 606

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  7. 607
  8. 608

    Capacity Expansion and Reliability Evaluation on the Networks Flows with Continuous Stochastic Functional Capacity by F. Hamzezadeh, H. Salehi Fathabadi

    Published 2014-01-01
    “…In many systems such as computer network, fuel distribution, and transportation system, it is necessary to change the capacity of some arcs in order to increase maximum flow value from source s to sink t, while the capacity change incurs minimum cost. …”
    Get full text
    Article
  9. 609

    ANALISIS PERILAKU KONSUMSI PADA MARKETPLACE (SHOPEE & TOKOPEDIA) MENGGUNAKAN MODEL UTAUT by Ni Putu Suci Meinarni, Ni Putu Ratih Pradnya Dewi, Wayan Gede Suka Parwita

    Published 2022-04-01
    “…Customer data security is the most important thing that must be considered in order to avoid computer network crimes or commonly known as cybercrime. …”
    Get full text
    Article
  10. 610
  11. 611
  12. 612

    An Elastic Fine-Tuning Dual Recurrent Framework for Non-Rigid Point Cloud Registration by Munan Yuan, Xiru Li, Haibao Tan

    Published 2025-06-01
    “…At first, we transform a non-rigid transformation into a series of combinations of rigid transformations using an outer recurrent computational network. Then, the inner loop layer computes elastic-controlled rigid incremental transformations by controlling the threshold to obtain a finely coherent rigid transformation. …”
    Get full text
    Article
  13. 613

    Brain systems for probabilistic and dynamic prediction: computational specificity and integration. by Jill X O'Reilly, Saad Jbabdi, Matthew F S Rushworth, Timothy E J Behrens

    Published 2013-09-01
    “…A region in parietal cortex, which was sensitive to the divergence between the predictions of the models and anatomically connected to both computational networks, is proposed to mediate integration of the two predictive modes to produce a single behavioral output.…”
    Get full text
    Article
  14. 614

    Development and Application of UAV VR Panoramic Display System for Datengxia Water Project by ZHANG Yao, HUANG Pengjia, ZHU Changfu

    Published 2021-01-01
    “…With the rapid development of computer network technology,panoramic technology has been widely applied in many fields such as tourism,real estate,engineering construction,and virtual education.It realizes the all-round interactive viewing and browsing in real scenes,with the sense of the scene and interaction.This paper obtains the panoramic images by the UAV aerial photography and image stitching technology,develops the UAV VR panoramic display system of Datengxia Water Project based on krpano engine and geographic information technology for realizing many functions including panoramic data storage management,online editing,releasing,etc.After the system is applied to the panoramic data management of Datengxia,there are lots of good feedback,and the work efficiency is greatly improved.In addition,this panoramic system provides data support for the virtual monitoring of the Datengxia Water Project construction,promotes the classification and efficient retrieval of panoramic data in the project,improves the efficiency of users in making panoramic projects and managing panoramic data,and offers an operation platform for building the Datengxia Water Project exhibition site and the VR display project of the Datengxia Museum.…”
    Get full text
    Article
  15. 615

    Recommendations for using a methodology for assessing the security of an automated control system for critical information infrastructure from DDoS attacks based on Monte Carlo sim... by V. A. Voevodin, V. S. Chernyaev, I. V. Vinogradov

    Published 2023-10-01
    “…The methodology allows the decision-maker to obtain an assessment of the risk of exposure of the computer network (CN) to DDoS attacks and take necessary actions to reduce the risk of this threat.Method. …”
    Get full text
    Article
  16. 616
  17. 617

    Direct laser writing of graphene oxide for ultra-low power consumption memristors in reservoir computing for digital recognition by Chen Min, Wan Zhengfen, Dong Hao, Chen Qinyu, Gu Min, Zhang Qiming

    Published 2022-08-01
    “…Meanwhile, the Pt/GO/rGO memristor array is applied in the reservoir computing network, performing the digital recognition with a high accuracy of 95.74%. …”
    Get full text
    Article
  18. 618

    Analysis of periodic wave soliton structure for the wave propagation in nonlinear low–pass electrical transmission lines through analytical technique by Mujahid Iqbal, Jianqiao Liu, Aly R. Seadawy, Huda Daefallh Alrashdi, Reem Algethamie, Abeer Aljohani, Ce Fu

    Published 2025-09-01
    “…The nonlinear LPETLs model having important implications in sciences and engineering such as communication and electronic engineering included system of signal distribution in cable television, connection system of radio receiver and transmitter and its antennas, computer networking connected system, routing call truck lines of telephone switching centers, high speed data buses in computers and many others. …”
    Get full text
    Article
  19. 619

    Dynamic Traffic Engineering for Cooperative Fog-Cloud Environment: Trade-off Analysis of Cost and Utilization Under Different Load Conditions by Md. Rahinur Rahman, Mirza Mohd Shahriar Maswood

    Published 2024-09-01
    “…The key contributions include the formulation of an optimization model that optimizes resource allocation, addresses blocking factors in fog networks, and offers valuable insights for managing dynamic traffic in fog computing networks.…”
    Get full text
    Article
  20. 620

    Leveraging AI-enabled mobile learning platforms to enhance the effectiveness of English teaching in universities by Shanshan Guo, Huzaina Binti Abdul Halim, Mohd Rashid Bin Mohd Saad

    Published 2025-05-01
    “…It explores how AI-driven platforms, using soft computing networks, can improve students’ critical thinking skills and foster deeper engagement with academic subjects. …”
    Get full text
    Article