Search alternatives:
networks » network (Expand Search)
Showing 661 - 680 results of 740 for search '"Computer Networks"', query time: 0.11s Refine Results
  1. 661

    Monitoring of clinical signs of intravenous infusion patients with ZigBee wireless technology by Xiaobo Zhu, Yunlong Ye

    Published 2022-04-01
    “…The monitoring system of infusion patient’s physical signs is integrated with sensor technology, bio-electronic technology, and computer network technology. By means of sensor detection, program control and data processing, the automatic detection and control of intravenous infusion process and real-time monitoring of the pulse information are realized. …”
    Get full text
    Article
  2. 662

    Ranking network of a captive rhesus macaque society: a sophisticated corporative kingdom. by Hsieh Fushing, Michael P McAssey, Brianne Beisner, Brenda McCowan

    Published 2011-03-01
    “…We develop a three-step computing approach to explore a hierarchical ranking network for a society of captive rhesus macaques. The computed network is sufficiently informative to address the question: Is the ranking network for a rhesus macaque society more like a kingdom or a corporation? …”
    Get full text
    Article
  3. 663

    Secure mobile agents for efficient medical information retrieval: A verifiable variable threshold secret sharing approach. by Pradeep Kumar, Sur Singh Rawat, Kakoli Banerjee, Ayodeji Olalekan Salau, Gyanendra Kumar, Niraj Singhal

    Published 2025-01-01
    “…Many applications, such as e-commerce, parallel computing, network management, and health care, use mobile agents. …”
    Get full text
    Article
  4. 664

    Predicting Student Behavior Using a Neutrosophic Deep Learning Model by Ahmed Mohamed Shitaya, Mohamed El Syed Wahed, Saied Helemy Abd El Khalek, Amr Ismail, Mahmoud Y. Shams, A. A. Salama

    Published 2025-02-01
    “…We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed database management system (DDBMS) for easy access. …”
    Get full text
    Article
  5. 665

    COMISET: Dataset for the analysis of malicious events in Windows systemsZenodo by Antonio Pérez-Sánchez, Rafael Palacios, Gregorio López López

    Published 2025-08-01
    “…To create the dataset the experiments have been performed in two different scenarios: a laboratory emulating the infrastructure of a small company, and a computer network commonly used by students at Comillas University. …”
    Get full text
    Article
  6. 666

    Choosing a video conferencing service and its adaptation for educational institution by A. N. Markov, R. O. Ihnatovich, A. I. Paramonov

    Published 2021-12-01
    “…The load graphs for the central processing unit, random access memory and local computer network are presented. Problems of service operation at the stage of load increase are formulated.…”
    Get full text
    Article
  7. 667

    Dynamic Edge Loading Balancing with Edge Node Activity Prediction and Accelerating the Model Convergence by Wen Chen, Sibin Liu, Yuxiao Yang, Wenjing Hu, Jinming Yu

    Published 2025-02-01
    “…In mobile edge computing networks, achieving effective load balancing across edge server nodes is essential for minimizing task processing latency. …”
    Get full text
    Article
  8. 668

    Design and Application of Multimedia Technology-Based Curriculum for Visual Communication Majors by Chibo Zhang, Yongli Zhao

    Published 2023-01-01
    “…The rapid change of technology has driven the information industry to advance and develop, and the computer network technology has been greatly improved, which also promotes the artistic expression of visual communication to develop in the direction of diversification and enrichment, providing designers with more sufficient performance carriers in visual communication design. …”
    Get full text
    Article
  9. 669

    Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades by Mohammadjavad Tasharrofi, Mojtaba Heidarian Shahri, Ali Madadi

    Published 2025-02-01
    “…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
    Get full text
    Article
  10. 670
  11. 671
  12. 672
  13. 673
  14. 674
  15. 675
  16. 676

    Security scheme for time-critical TRDP message by CUI Yulong, WU Xuechao, CHENG Youlin, LU Xiang

    Published 2025-06-01
    “…However, with the introduction of the Ethernet architecture, traditional computer network security risks were also brought into the train communication network. …”
    Get full text
    Article
  17. 677
  18. 678
  19. 679
  20. 680