Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
701
Unitanony: a fine-grained and practical anonymization framework for better data utility
Published 2025-07-01Get full text
Article -
702
-
703
-
704
KAN-ResNet-Enhanced Radio Frequency Fingerprint Identification with Zero-Forcing Equalization
Published 2025-04-01Get full text
Article -
705
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network
Published 2019-07-01Get full text
Article -
706
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security
Published 2025-07-01“…We have developed the hybrid model based on crow search optimization (CSO) and random forest (RF) algorithm for identifying threats and irregularities in a computer network. In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. …”
Get full text
Article -
707
Direct Transmission of Products Designs in Distributed Manufacturing
Published 2013-03-01“…This research presents proposed system model called Approach for Designing Distributed Manufactured System (ADMS) deals with factories distributed systems which include data base, design tools, and distributed among computers network. The system serves a query for incoming enquiries execution about spare parts to the main computer (Server) from other connected computers (Servers) without any confliction by using network techniques and data base language capabilities. …”
Get full text
Article -
708
Vehicle Trajectory Prediction Algorithm Based on Hybrid Prediction Model with Multiple Influencing Factors
Published 2025-02-01Get full text
Article -
709
Design of Low-Cost and Highly Energy-Efficient Convolutional Neural Networks Based on Deterministic Encoding
Published 2025-05-01“…Compared with traditional stochastic computing networks, this network shortens the bit stream length by 64 times without affecting the recognition rate, achieving a recognition rate of 99% with a 2-bit input. …”
Get full text
Article -
710
Predicting the Robustness of Large Real-World Social Networks Using a Machine Learning Model
Published 2022-01-01“…The Monte Carlo numerical simulation is the commonly used method to compute network robustness. However, it has a very high computational cost, especially for large networks. …”
Get full text
Article -
711
Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia
Published 2024-12-01“…Technological barriers included lack of infrastructure including computers, networks, and reliable power supply; and software-related challenges such as system downtime, lack of interoperability, comprehensiveness, and decision support systems; and system security and privacy concerns. …”
Get full text
Article -
712
Application of Multimodal Multimedia Information and Big Data Technology in Teaching Chinese as a Foreign Language Course
Published 2023-01-01“…With the change of the times, under the leadership of big data, cloud computing, network technology, mobile Internet, and other high technology, education has gradually broken free from the traditional teaching mode. …”
Get full text
Article -
713
KT-Deblur: Kolmogorov–Arnold and Transformer Networks for Remote Sensing Image Deblurring
Published 2025-02-01Get full text
Article -
714
Real Time Intrusion Detection System Based on Web Log File Analysis
Published 2025-02-01Get full text
Article -
715
ECE-TTS: A Zero-Shot Emotion Text-to-Speech Model with Simplified and Precise Control
Published 2025-05-01Get full text
Article -
716
Research on Ground Point Cloud Segmentation Algorithm Based on Local Density Plane Fitting in Road Scene
Published 2025-08-01Get full text
Article -
717
A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange
Published 2025-03-01Get full text
Article -
718
Engineering material failure analysis report generation based on QWen and Llama2
Published 2025-06-01Get full text
Article -
719
Adaptive Transformer-Based Deep Learning Framework for Continuous Sign Language Recognition and Translation
Published 2025-03-01Get full text
Article -
720