Search alternatives:
networks » network (Expand Search)
Showing 701 - 720 results of 740 for search '"Computer Networks"', query time: 0.11s Refine Results
  1. 701
  2. 702
  3. 703
  4. 704
  5. 705
  6. 706

    Intelligent intrusion detection system based on crowd search optimization for attack classification in network security by Chetan Gupta, Amit Kumar, Neelesh Kumar Jain

    Published 2025-07-01
    “…We have developed the hybrid model based on crow search optimization (CSO) and random forest (RF) algorithm for identifying threats and irregularities in a computer network. In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. …”
    Get full text
    Article
  7. 707

    Direct Transmission of Products Designs in Distributed Manufacturing by Ammar Yaseen

    Published 2013-03-01
    “…This research presents proposed system model called Approach for Designing Distributed Manufactured System (ADMS) deals with factories distributed systems which include data base, design tools, and distributed among computers network. The system serves a query for incoming enquiries execution about spare parts to the main computer (Server) from other connected computers (Servers) without any confliction by using network techniques and data base language capabilities. …”
    Get full text
    Article
  8. 708
  9. 709

    Design of Low-Cost and Highly Energy-Efficient Convolutional Neural Networks Based on Deterministic Encoding by Tiance Tong, Qiang He, Xiaofei Nie, Yudi Zhao

    Published 2025-05-01
    “…Compared with traditional stochastic computing networks, this network shortens the bit stream length by 64 times without affecting the recognition rate, achieving a recognition rate of 99% with a 2-bit input. …”
    Get full text
    Article
  10. 710

    Predicting the Robustness of Large Real-World Social Networks Using a Machine Learning Model by Ngoc-Kim-Khanh Nguyen, Quang Nguyen, Hai-Ha Pham, Thi-Trang Le, Tuan-Minh Nguyen, Davide Cassi, Francesco Scotognella, Roberto Alfieri, Michele Bellingeri

    Published 2022-01-01
    “…The Monte Carlo numerical simulation is the commonly used method to compute network robustness. However, it has a very high computational cost, especially for large networks. …”
    Get full text
    Article
  11. 711

    Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia by Tadesse Alemu Bekele, Lemma Derseh Gezie, Herman Willems, Jonathan Metzger, Biruhtesfa Abere, Blen Seyoum, Loko Abraham, Naod Wendrad, Selamawit Meressa, Bethel Desta, Tariku Nigatu Bogale

    Published 2024-12-01
    “…Technological barriers included lack of infrastructure including computers, networks, and reliable power supply; and software-related challenges such as system downtime, lack of interoperability, comprehensiveness, and decision support systems; and system security and privacy concerns. …”
    Get full text
    Article
  12. 712

    Application of Multimodal Multimedia Information and Big Data Technology in Teaching Chinese as a Foreign Language Course by Yanhua Nie

    Published 2023-01-01
    “…With the change of the times, under the leadership of big data, cloud computing, network technology, mobile Internet, and other high technology, education has gradually broken free from the traditional teaching mode. …”
    Get full text
    Article
  13. 713
  14. 714
  15. 715
  16. 716
  17. 717
  18. 718
  19. 719
  20. 720