Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
241
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
242
Deep learning in microbiome analysis: a comprehensive review of neural network models
Published 2025-01-01Get full text
Article -
243
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01“…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. The characteristics of modern types of spoofing and the negative consequences for business that they lead to are given. …”
Get full text
Article -
244
-
245
Analisis Pengembangan Jaringan Komputer UIN Sunan Kalijaga Yogyakarta Menggunakan Perbandingan Protokol Routing Statik dan Routing Dinamis OSPF
Published 2021-03-01“…Abstract This study describes the comparison of routing as one of computer network management. The purpose of this study is to analyze static routing protocols with OSPF dynamic routing on computer networks in the State Islamic University of Sunan Kalijaga Yogyakarta with literature study methods and interviews in data collection. …”
Get full text
Article -
246
Pemanfaatan media pembelajaran berbasis augmented reality menggunakan aplikasi Ar_Jarkom pada mata kuliah instalasi jaringan komputer
Published 2020-12-01“…This study aims to determine the level of practicality, effectiveness, and influence of the application of learning media based on Augmented Reality (AR) in the Computer Network Installation course using a mobile application called AR_JARKOM_INFORMATIKA_UNP. …”
Get full text
Article -
247
A Novel Deep Hybrid Recommender System Based on Auto-encoder with Neural Collaborative Filtering
Published 2018-09-01Get full text
Article -
248
Prompting Large Language Models with Knowledge-Injection for Knowledge-Based Visual Question Answering
Published 2024-09-01Get full text
Article -
249
A Semi-Supervised Deep Network Embedding Approach Based on the Neighborhood Structure
Published 2019-09-01Get full text
Article -
250
Studies of Connected Networks via Fractional Metric Dimension
Published 2022-01-01“…Metric dimension is an effective tool to study different distance-based problems in the field of telecommunication, robotics, computer networking, integer programming, chemistry, and electrical networking. …”
Get full text
Article -
251
-
252
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
253
Network Diffusion Framework to Simulate Spreading Processes in Complex Networks
Published 2024-09-01“…With the advancement of computational network science, its research scope has significantly expanded beyond static graphs to encompass more complex structures. …”
Get full text
Article -
254
AN ONTOLOGY SEARCH FOR VIETNAMESE ACADEMIC DOCUMENTS IN COMPUTER SCIENCE
Published 2017-09-01“…The proposed artefacts were evaluated using Vietnamese documents in three areas: Software engineering; Programming; and Computer networking. The evaluation results were presented and discussed.…”
Get full text
Article -
255
Chip Design of PTP Time Synchronization for Industrial IoT
Published 2025-01-01“…Its core concept is to apply technologies such as computer networking, big data, artificial intelligence and cloud services to manufacturing. …”
Get full text
Article -
256
Recurrence Relations and Hilbert Series of the Monoid Associated with Star Topology
Published 2020-01-01“…Star network is one of the most common in computer network topologies. In this work, we study star topology Sn and associate a Coxeter structure of affine type on it. …”
Get full text
Article -
257
Privacy in the Internet: Myth or reality
Published 2016-01-01“…What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.…”
Get full text
Article -
258
EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET
Published 2021-02-01“…Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. …”
Get full text
Article -
259
A Modified Resource Distribution Fairness Measure
Published 2013-01-01“…An important issue of resource distribution is the fairness of the distribution. For example, computer network management wishes to distribute network resource fairly to its users. …”
Get full text
Article -
260
Efficiency of Semantic Web Implementation on Cloud Computing: A Review
Published 2021-06-01Get full text
Article