Results 11 to 20 of about 2,602,398 (316)

Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM [PDF]

open access: yesEngineering and Technology Journal, 2021
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs ...
Hanan M. Kadhim, Ahmed A. Oglah
doaj   +1 more source

Computation in Gene Networks [PDF]

open access: yesChaos: An Interdisciplinary Journal of Nonlinear Science, 2001
Genetic regulatory networks have the complex task of controlling all aspects of life. Using a model of gene expression by piecewise linear differential equations we show that this process can be considered as a process of computation. This is demonstrated by showing that this model can simulate memory bounded Turing machines.
Siegelmann, Hava, Ben-Hur, Asa
openaire   +4 more sources

Pengembangan Rancangan Media Pembelajaran Augmented Reality Perangkat Jaringan Komputer

open access: yesInvotek: Jurnal Inovasi Vokasional dan Teknologi, 2020
All The problem of the research is the absence of supporting learning media in learning activities of computer network, are not optimal mastery of concepts by students, and abstract teaching materials that need to be made more concrete, as well as using ...
Melsi Sari Murfi, Kasman Rukun
doaj   +1 more source

Visual analytics of combustion on time-varying turbulent-flow

open access: yesAdvances in Aerodynamics, 2022
Visualization is crucial for analyzing the turbulent combustion simulation. Time-varying data allows us to investigate the evolution process of the turbulent flow field. To study the combustion effects, we calculated the enstrophy of the flow field since
Xiaoyang Han   +4 more
doaj   +1 more source

Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]

open access: yes, 2017
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core   +4 more sources

The classroom teaching reform of “Computer Network” course of “three paragraphs and three levels, the combination of evaluation and questioning, and multiple assessment” [PDF]

open access: yesMATEC Web of Conferences
The computer network course is a compulsory course for computer majors, which is offered in the second semester of the second year of college. Students' understanding of the network is in the simple application level, and they lack the thinking and ...
Fan Dongmei, Lu Zhang, Li Liu
doaj   +1 more source

A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in ...
Rana F. Ghani, Ahmed T. Sadik
doaj   +1 more source

Computing optimal shortcuts for networks [PDF]

open access: yesEuropean Journal of Operational Research, 2019
We study augmenting a plane Euclidean network with a segment, called a shortcut, to minimize the largest distance between any two points along the edges of the resulting network. Problems of this type have received considerable attention recently, mostly for discrete variants of the problem.
Garijo Royo, Delia   +3 more
openaire   +11 more sources

Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi   +2 more
doaj   +1 more source

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy