Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
621
Optimizing Server Load Distribution in Multimedia IoT Environments through LSTM-Based Predictive Algorithms
Published 2025-01-01“…As the volume of data continues to surge and the number of connected devices grows exponentially, internet traffic has reached unprecedented levels, resulting in challenges such as server overloads and deteriorating service quality. Traditional computer network architectures were not designed to accommodate this rapid increase in demand, leading to the necessity for innovative solutions. …”
Get full text
Article -
622
Des cités hallucinées à la grille invisible, William Gibson et les métamorphoses du cyberespace
Published 2017-11-01“…In his first novels, cyberspace is at the same time a narrative trick to depict a global computer network and an element of a more global investigation of the relationship between geographic space and technology. …”
Get full text
Article -
623
Hybrid ANN-Based and Text Similarity Method for Automatic Short-Answer Grading in Polish
Published 2025-02-01“…This concept has been implemented in the interactive e-test system operating in the local computer network of the Institute of Applied Computer Science at the Lodz University of Technology. …”
Get full text
Article -
624
Research on the internal logic and solution of the “Channel Computing Resources from the East to the West” project
Published 2023-09-01“…The "Channel Computing Resources from the East to the West" project is a major strategic project to build a balance of computing resources and on-demand scheduling in China's territorial space.Since the full launch of the Chinese"Channel Computing Resources from the East to the West" project construction, a series of problems have been exposed on many different fields, such as the supply side, demand side, energy side, technology side, and mechanism side.It is urgent to re-analyze and define the internal logic of the "Channel Computing Resources from the East to the West"project from a theoretical level.The internal logic of "Channel Computing Resources from the East to the West", that is, the infrastructure of Chinese computing, was analyzed from different perspectives such as economic form, technological trend, technological competition, and cost-benefit.It also proposed to build a new type of infrastructure for the Chinese national computing network, called computing NET, and build a national computing NET construction path from the aspects of policy layout, network direct connection, technical support, and mechanism innovation.…”
Get full text
Article -
625
A Hybrid Mechanism to Detect DDoS Attacks in Software Defined Networks
Published 2024-02-01“…DDoS (Distributed Denial-of-Service) attacks are among the cyberattacks that are increasing day by day and have caused problems for computer network servers. With the advent of SDN networks, they are not immune to these attacks, and due to the software-centric nature of these networks, this type of attack can be much more difficult for them, ignoring effective parameters such as port and Source IP in detecting attacks, providing costly solutions which are effective in increasing CPU load, and low accuracy in detecting attacks are of the problems of previously presented methods in detecting DDoS attacks. …”
Get full text
Article -
626
Fuzzy Guiding of Roulette Selection in Evolutionary Algorithms
Published 2025-02-01“…The algorithm can be an effective tool in solving a wide range of optimization problems, for example, optimization of computer network infrastructure.…”
Get full text
Article -
627
A SOVEREIGN STATE IN THE XXI CENTURY: NEW CHALLENGES AND THREATS
Published 2023-01-01“…The emergence of illegal and state-controlled sectors of the global computer network Internet, through which illegal DARRNET information is distributed. …”
Get full text
Article -
628
Geo-computation techniques for identifying spatio-temporal patterns of reported oil spills along crude oil pipeline networks
Published 2025-08-01“…Pipeline data were transformed into 500-metre lixels (linear pixels) to compute network distances and generate density estimates. …”
Get full text
Article -
629
A node deployment and resource optimization method for CPDS based on cloud‐fog‐edge collaboration
Published 2024-11-01“…In this article, fog computing is introduced into the computing network of the power distribution system, and a cloud‐fog‐edge collaborative computing architecture for intelligent power distribution networks is proposed. …”
Get full text
Article -
630
Unveiling the social fabric through a temporal, nation-scale social network and its characteristics
Published 2025-05-01“…We show how to aggregate and combine the layers, and how to efficiently compute network measures such as shortest paths in large administrative networks. …”
Get full text
Article -
631
Retracted: Internet of Things Health Detection System in Steel Structure Construction Management
Published 2020-01-01“…In recent years, the development of computer network technology, especially the hot Internet of things, has brought great convenience and comfort to people’s life. …”
Get full text
Article -
632
-
633
A data forwarding algorithm based on Markov thought in underwater wireless sensor networks
Published 2017-02-01Get full text
Article -
634
Prediction of Individual Halo Concentrations Across Cosmic Time Using Neural Networks
Published 2025-01-01Get full text
Article -
635
Sparse Signal Recovery by Stepwise Subspace Pursuit in Compressed Sensing
Published 2013-08-01Get full text
Article -
636
An Analytical Study to Justify the Transformation from Traditional to Software-Defined Network in Terms of QoS Parameters
Published 2025-06-01“…Ping is defined as a simple Internet application that lets users check whether a specific target IP address is available and able to receive requests in computer network administration. Moreover, Ping is also used as a diagnostic tool to make sure the host machine that the user is attempting to contact is up and running. …”
Get full text
Article -
637
G-CTRNN: A Trainable Low-Power Continuous-Time Neural Network for Human Activity Recognition in Healthcare Applications
Published 2025-07-01“…Compared to conventional RNNs, G-CTRNN achieves superior classification accuracy with fewer parameters and greater stability—enabling continuous, real-time HAR on low-power platforms such as MEMS computing networks. The proposed framework provides a pathway toward on-device AI for remote patient monitoring, elderly care, and personalized healthcare in resource-constrained environments.…”
Get full text
Article -
638
Ultralow energy adaptive neuromorphic computing using reconfigurable zinc phosphorus trisulfide memristors
Published 2025-07-01“…Leveraging these device characteristics, we developed a reservoir computing network that integrates dynamic physical reservoirs with steady-weighted readouts, successfully achieving 99% accuracy in electrocardiogram classification. …”
Get full text
Article -
639
Design of a home video behavior recognition system based on visual privacy security mechanism
Published 2025-04-01“…The rapid development of the Internet and advanced technology has brought great convenience to people’s lives; However, real-time video and other privacy information obtained from computers can be leaked, resulting in economic losses and not conducive to the construction of computer network security. In response to the above issues, this study introduces compressed perception theory and temporal adaptive modules to achieve visual shielding, and based on this, designs a home video behavior system based on visual privacy security mechanism. …”
Get full text
Article -
640
Development of Mathematics Learning Methods Through E-Learning Media in SMP Amir Hamzah Medan
Published 2024-07-01“…This research aims to develop an e-learning-based method of learning mathematics through a network (computer network). The e-learning method in learning mathematics is intended to deliver a series of learning solutions that can attract learning interest, and increase knowledge and skills. …”
Get full text
Article