Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
221
Energy-saving route optimizationin a software-defined wireless sensor network
Published 2018-10-01Get full text
Article -
222
An Efficient Convolution Algorithm for the Non-Markovian Two-Node Cyclic Network
Published 2021-01-01“…This model has several other applications in performance evaluation, manufacturing, computer networks, and in reliability studies as it can be easily used to compute system availability. …”
Get full text
Article -
223
Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks
Published 2013-01-01“…The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. …”
Get full text
Article -
224
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
Get full text
Article -
225
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“… While this dependence on interconnected computer networks and the web requires robust cybersecurity. …”
Get full text
Article -
226
Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm
Published 2019-11-01Get full text
Article -
227
A Comparative Study of Three Resolving Parameters of Graphs
Published 2021-01-01“…It is used to monitor the movement of robots on a network, to debug computer networks, to develop algorithms, and to analyze the structural properties of chemical structures, among other things. …”
Get full text
Article -
228
Proposed Method for Note Detection and Automatic Identification of the Melody Models (Gusheh) in Iranian Traditional Music with Micro Approach
Published 2020-09-01“…One of the most common problems with computer networks is the amount of information in these networks. …”
Get full text
Article -
229
-
230
Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital.
Published 2024“…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
Get full text
Thesis -
231
Application of Quantum Recurrent Neural Network in Low-Resource Language Text Classification
Published 2024-01-01Get full text
Article -
232
Handover decision with multi-access edge computing in 6G networks: A survey
Published 2025-03-01Get full text
Article -
233
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
234
Multitask Learning-Based Pipeline-Parallel Computation Offloading Architecture for Deep Face Analysis
Published 2025-01-01Get full text
Article -
235
Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python
Published 2022-02-01“…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
Get full text
Article -
236
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
Get full text
Article -
237
Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1
Published 2020-02-01“…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
Get full text
Article -
238
A forestry investigation: Exploring factors behind improved tree species classification using bark images
Published 2025-03-01Get full text
Article -
239
VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY
Published 2020-12-01“…An anthropological prerequisite for virtual reality is the ability of the man’s creative imagination to calculate and choose the best model from many mental design ones, using, among other things, horizontal computer networks, which form a virtual identity. Originality. …”
Get full text
Article -
240
Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia)
Published 2020-02-01“…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
Get full text
Article