Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
661
Monitoring of clinical signs of intravenous infusion patients with ZigBee wireless technology
Published 2022-04-01“…The monitoring system of infusion patient’s physical signs is integrated with sensor technology, bio-electronic technology, and computer network technology. By means of sensor detection, program control and data processing, the automatic detection and control of intravenous infusion process and real-time monitoring of the pulse information are realized. …”
Get full text
Article -
662
Ranking network of a captive rhesus macaque society: a sophisticated corporative kingdom.
Published 2011-03-01“…We develop a three-step computing approach to explore a hierarchical ranking network for a society of captive rhesus macaques. The computed network is sufficiently informative to address the question: Is the ranking network for a rhesus macaque society more like a kingdom or a corporation? …”
Get full text
Article -
663
Secure mobile agents for efficient medical information retrieval: A verifiable variable threshold secret sharing approach.
Published 2025-01-01“…Many applications, such as e-commerce, parallel computing, network management, and health care, use mobile agents. …”
Get full text
Article -
664
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
Published 2025-02-01“…We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed database management system (DDBMS) for easy access. …”
Get full text
Article -
665
COMISET: Dataset for the analysis of malicious events in Windows systemsZenodo
Published 2025-08-01“…To create the dataset the experiments have been performed in two different scenarios: a laboratory emulating the infrastructure of a small company, and a computer network commonly used by students at Comillas University. …”
Get full text
Article -
666
Choosing a video conferencing service and its adaptation for educational institution
Published 2021-12-01“…The load graphs for the central processing unit, random access memory and local computer network are presented. Problems of service operation at the stage of load increase are formulated.…”
Get full text
Article -
667
Dynamic Edge Loading Balancing with Edge Node Activity Prediction and Accelerating the Model Convergence
Published 2025-02-01“…In mobile edge computing networks, achieving effective load balancing across edge server nodes is essential for minimizing task processing latency. …”
Get full text
Article -
668
Design and Application of Multimedia Technology-Based Curriculum for Visual Communication Majors
Published 2023-01-01“…The rapid change of technology has driven the information industry to advance and develop, and the computer network technology has been greatly improved, which also promotes the artistic expression of visual communication to develop in the direction of diversification and enrichment, providing designers with more sufficient performance carriers in visual communication design. …”
Get full text
Article -
669
Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades
Published 2025-02-01“…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
Get full text
Article -
670
-
671
-
672
A-LNT: A Wireless Sensor Network Platform for Low-Power Real-Time Voice Communications
Published 2014-01-01Get full text
Article -
673
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid
Published 2013-03-01Get full text
Article -
674
An efficient and DoS-resilient name lookup for NDN interest forwarding
Published 2021-07-01Get full text
Article -
675
Semi-Supervised Learning of Statistical Models for Natural Language Understanding
Published 2014-01-01Get full text
Article -
676
Security scheme for time-critical TRDP message
Published 2025-06-01“…However, with the introduction of the Ethernet architecture, traditional computer network security risks were also brought into the train communication network. …”
Get full text
Article -
677
The Review of GRACE Data Applications in Terrestrial Hydrology Monitoring
Published 2014-01-01Get full text
Article -
678
Enhanced APT detection with the improved KAN algorithm: capturing interdependencies for better accuracy
Published 2025-05-01Get full text
Article -
679
-
680