Results 1 to 10 of about 1,218,534 (145)

The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]

open access: yesMATEC Web of Conferences, 2022
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj   +1 more source

Global stability of multi-group SEIQR epidemic models with stochastic perturbation in computer network

open access: yesElectronic Research Archive, 2023
In this paper, a class of multi-group SEIQR models with random perturbation in computer network is investigated. The existence and uniqueness of global positive solution with any positive initial value are obtained.
Ramziya Rifhat   +4 more
doaj   +1 more source

PENGUJIAN QOS PADA IMPLEMENTASI SDN BERBASIS MININET DAN OPENDAYLIGHT MENGGUNAKAN TOPOLOGI TREE

open access: yesJurnal Sisfokom, 2021
The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side.
I Putu Agus Eka Pratama   +1 more
doaj   +1 more source

Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM [PDF]

open access: yesEngineering and Technology Journal, 2021
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs ...
Hanan M. Kadhim, Ahmed A. Oglah
doaj   +1 more source

Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]

open access: yesTehnika, 2023
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.   +1 more
doaj  

Pengembangan Rancangan Media Pembelajaran Augmented Reality Perangkat Jaringan Komputer

open access: yesInvotek: Jurnal Inovasi Vokasional dan Teknologi, 2020
All The problem of the research is the absence of supporting learning media in learning activities of computer network, are not optimal mastery of concepts by students, and abstract teaching materials that need to be made more concrete, as well as using ...
Melsi Sari Murfi, Kasman Rukun
doaj   +1 more source

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Visual analytics of combustion on time-varying turbulent-flow

open access: yesAdvances in Aerodynamics, 2022
Visualization is crucial for analyzing the turbulent combustion simulation. Time-varying data allows us to investigate the evolution process of the turbulent flow field. To study the combustion effects, we calculated the enstrophy of the flow field since
Xiaoyang Han   +4 more
doaj   +1 more source

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

Home - About - Disclaimer - Privacy