Results 1 to 10 of about 2,833,464 (263)

Analysis of network by generalized mutual entropies [PDF]

open access: yes, 2007
Generalized mutual entropy is defined for networks and applied for analysis of complex network structures. The method is tested for the case of computer simulated scale free networks, random networks, and their mixtures.
Barabási   +21 more
core   +2 more sources

The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]

open access: yesMATEC Web of Conferences, 2022
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj   +1 more source

Global stability of multi-group SEIQR epidemic models with stochastic perturbation in computer network

open access: yesElectronic Research Archive, 2023
In this paper, a class of multi-group SEIQR models with random perturbation in computer network is investigated. The existence and uniqueness of global positive solution with any positive initial value are obtained.
Ramziya Rifhat   +4 more
doaj   +1 more source

Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM [PDF]

open access: yesEngineering and Technology Journal, 2021
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs ...
Hanan M. Kadhim, Ahmed A. Oglah
doaj   +1 more source

PENGUJIAN QOS PADA IMPLEMENTASI SDN BERBASIS MININET DAN OPENDAYLIGHT MENGGUNAKAN TOPOLOGI TREE

open access: yesJurnal Sisfokom, 2021
The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side.
I Putu Agus Eka Pratama   +1 more
doaj   +1 more source

Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]

open access: yesTehnika, 2023
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.   +1 more
doaj  

Pengembangan Rancangan Media Pembelajaran Augmented Reality Perangkat Jaringan Komputer

open access: yesInvotek: Jurnal Inovasi Vokasional dan Teknologi, 2020
All The problem of the research is the absence of supporting learning media in learning activities of computer network, are not optimal mastery of concepts by students, and abstract teaching materials that need to be made more concrete, as well as using ...
Melsi Sari Murfi, Kasman Rukun
doaj   +1 more source

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

The Dutch interbank computer network [PDF]

open access: yes, 1988
At the end of 1980, a strategic decision was made by the Dutch banks and savings banks to commence the development of a Data Communications Infrastructure (DCI), to be used for a number of forthcoming interbank applications.
Michiels, Eddie
core   +4 more sources

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Home - About - Disclaimer - Privacy