Showing 281 - 295 results of 295 for search '"computer networks"', query time: 0.06s Refine Results
  1. 281

    Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades by Mohammadjavad Tasharrofi, Mojtaba Heidarian Shahri, Ali Madadi

    Published 2025-02-01
    “…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
    Get full text
    Article
  2. 282
  3. 283
  4. 284

    Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects by Airong Yang, Guoxin Yu

    Published 2022-01-01
    “…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
    Get full text
    Article
  5. 285
  6. 286

    „Nowe” problemy wychowawcze w dobie „nowych” mediów by Arkadiusz Olczyk

    Published 2012-12-01
    “…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
    Get full text
    Article
  7. 287

    Network Digital Twin Toward Networking, Telecommunications, and Traffic Engineering: A Survey by Reza Poorzare, Dimitris N. Kanellopoulos, Varun Kumar Sharma, Poulami Dalapati, Oliver P. Waldhorst

    Published 2025-01-01
    “…Network Digital Twin (NDT) is an evolving technology that provides a framework through which a network administrator can have a virtual representation of a computer network. As a result, analysis, monitoring, testing, running new protocols, and more can be performed using the NDT before the final deployment of the developed approach. …”
    Get full text
    Article
  8. 288

    Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy by Bo Zhang, Rongji Liao

    Published 2021-01-01
    “…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
    Get full text
    Article
  9. 289

    Analysis of the Effect of Artificial Intelligence on Role Cognition in the Education System by Jianjian Zhu, Chuming Ren

    Published 2022-01-01
    “…The education system targeted by this questionnaire survey involves 8 categories: preschool education, primary education, secondary education, higher education, adult education, computer network education, enterprise education, and social education; the respondents include 368 teachers, 402 students or learners, 118 school managers, and 124 family members of students or learners in all above education categories. …”
    Get full text
    Article
  10. 290
  11. 291
  12. 292
  13. 293

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. …”
    Get full text
    Article
  14. 294
  15. 295