Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
281
Three-dimensional design, simulation and optimization of a centrifugal compressor impeller with double-splitter blades
Published 2025-02-01“…To investigate the effect of the number of computational networks on the independence of results, further analysis is required.…”
Get full text
Article -
282
-
283
-
284
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…Heterogeneous networks are composed of third-party computers, network equipment, and systems. Network types are usually used for other protocols to support other functions and applications. …”
Get full text
Article -
285
-
286
„Nowe” problemy wychowawcze w dobie „nowych” mediów
Published 2012-12-01“…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
Get full text
Article -
287
Network Digital Twin Toward Networking, Telecommunications, and Traffic Engineering: A Survey
Published 2025-01-01“…Network Digital Twin (NDT) is an evolving technology that provides a framework through which a network administrator can have a virtual representation of a computer network. As a result, analysis, monitoring, testing, running new protocols, and more can be performed using the NDT before the final deployment of the developed approach. …”
Get full text
Article -
288
Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy
Published 2021-01-01“…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
Get full text
Article -
289
Analysis of the Effect of Artificial Intelligence on Role Cognition in the Education System
Published 2022-01-01“…The education system targeted by this questionnaire survey involves 8 categories: preschool education, primary education, secondary education, higher education, adult education, computer network education, enterprise education, and social education; the respondents include 368 teachers, 402 students or learners, 118 school managers, and 124 family members of students or learners in all above education categories. …”
Get full text
Article -
290
-
291
A Survey of Data Mining Implementation in Smart City Applications
Published 2021-04-01Get full text
Article -
292
-
293
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. …”
Get full text
Article -
294
-
295