Showing 221 - 240 results of 295 for search '"computer networks"', query time: 0.06s Refine Results
  1. 221
  2. 222

    An Efficient Convolution Algorithm for the Non-Markovian Two-Node Cyclic Network by Muhammad El-Taha, Thomas Michaud

    Published 2021-01-01
    “…This model has several other applications in performance evaluation, manufacturing, computer networks, and in reliability studies as it can be easily used to compute system availability. …”
    Get full text
    Article
  3. 223

    Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks by Narun Asvarujanon, Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata

    Published 2013-01-01
    “…The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. …”
    Get full text
    Article
  4. 224

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
    Get full text
    Article
  5. 225

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “… While this dependence on interconnected computer networks and the web requires robust cybersecurity. …”
    Get full text
    Article
  6. 226
  7. 227

    A Comparative Study of Three Resolving Parameters of Graphs by Hafiz Muhammad Ikhlaq, Hafiz Muhammad Afzal Siddiqui, Muhammad Imran

    Published 2021-01-01
    “…It is used to monitor the movement of robots on a network, to debug computer networks, to develop algorithms, and to analyze the structural properties of chemical structures, among other things. …”
    Get full text
    Article
  8. 228

    Proposed Method for Note Detection and Automatic Identification of the Melody Models (Gusheh) in Iranian Traditional Music with Micro Approach by Amir Vafaeian, Keivan Borna, Hamed Sajedi, Dariush Alimohammadi, Pouya Sarai

    Published 2020-09-01
    “…One of the most common problems with computer networks is the amount of information in these networks. …”
    Get full text
    Article
  9. 229
  10. 230

    Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital. by Hashakimana, Obed

    Published 2024
    “…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
    Get full text
    Thesis
  11. 231
  12. 232
  13. 233

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  14. 234
  15. 235

    Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python by Setiya Nugroho, Bambang Pujiarto

    Published 2022-02-01
    “…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
    Get full text
    Article
  16. 236

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
    Get full text
    Article
  17. 237

    Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1 by Widya Sayekti, Juliana Ermawati, Renny Sari Dewi

    Published 2020-02-01
    “…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
    Get full text
    Article
  18. 238
  19. 239

    VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY by Y. V. Lyubiviy, R. V. Samchuk

    Published 2020-12-01
    “…An anthropological prerequisite for virtual reality is the ability of the man’s creative imagination to calculate and choose the best model from many mental design ones, using, among other things, horizontal computer networks, which form a virtual identity. Originality. …”
    Get full text
    Article
  20. 240

    Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia) by Achmmad Mustofa, Desi Ramayanti

    Published 2020-02-01
    “…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
    Get full text
    Article