Results 1 to 10 of about 2,833,464 (263)
Analysis of network by generalized mutual entropies [PDF]
Generalized mutual entropy is defined for networks and applied for analysis of complex network structures. The method is tested for the case of computer simulated scale free networks, random networks, and their mixtures.
Barabási+21 more
core +2 more sources
The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj +1 more source
In this paper, a class of multi-group SEIQR models with random perturbation in computer network is investigated. The existence and uniqueness of global positive solution with any positive initial value are obtained.
Ramziya Rifhat +4 more
doaj +1 more source
Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM [PDF]
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs ...
Hanan M. Kadhim, Ahmed A. Oglah
doaj +1 more source
PENGUJIAN QOS PADA IMPLEMENTASI SDN BERBASIS MININET DAN OPENDAYLIGHT MENGGUNAKAN TOPOLOGI TREE
The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side.
I Putu Agus Eka Pratama+1 more
doaj +1 more source
Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.+1 more
doaj
Pengembangan Rancangan Media Pembelajaran Augmented Reality Perangkat Jaringan Komputer
All The problem of the research is the absence of supporting learning media in learning activities of computer network, are not optimal mastery of concepts by students, and abstract teaching materials that need to be made more concrete, as well as using ...
Melsi Sari Murfi, Kasman Rukun
doaj +1 more source
Pentesting using Ethical Hacking techniques in IPv6 networks
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio+2 more
doaj +1 more source
The Dutch interbank computer network [PDF]
At the end of 1980, a strategic decision was made by the Dutch banks and savings banks to commence the development of a Data Communications Infrastructure (DCI), to be used for a number of forthcoming interbank applications.
Michiels, Eddie
core +4 more sources
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj +1 more source