Results 11 to 20 of about 2,694,917 (322)

Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM [PDF]

open access: yesEngineering and Technology Journal, 2021
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs ...
Hanan M. Kadhim, Ahmed A. Oglah
doaj   +1 more source

The classroom teaching reform of “Computer Network” course of “three paragraphs and three levels, the combination of evaluation and questioning, and multiple assessment” [PDF]

open access: yesMATEC Web of Conferences
The computer network course is a compulsory course for computer majors, which is offered in the second semester of the second year of college. Students' understanding of the network is in the simple application level, and they lack the thinking and ...
Fan Dongmei, Lu Zhang, Li Liu
doaj   +1 more source

Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]

open access: yes, 2017
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core   +4 more sources

Price Method and Network Congestion Control

open access: yesJournal of Telecommunications and Information Technology, 2023
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems.
Krzysztof Malinowski   +2 more
doaj   +1 more source

Computation in Gene Networks

open access: yesChaos: An Interdisciplinary Journal of Nonlinear Science, 2001
Genetic regulatory networks have the complex task of controlling all aspects of life. Using a model of gene expression by piecewise linear differential equations we show that this process can be considered as a process of computation. This is demonstrated by showing that this model can simulate memory bounded Turing machines.
Siegelmann, Hava, Ben-Hur, Asa
openaire   +4 more sources

RELIABILITY ANALYSIS OF COMPUTER NETWORKS USING PARAMETRIC FAILURE CRITERIA

open access: yesСтатистика и экономика, 2016
A mathematical model, which allows to obtain expressions for the determination of parameters of reliability of computer ne t w o rks co n sis t i n g o f i den t i c al recoverable elements.
Oleg A. Tkachev
doaj   +1 more source

Visual analytics of combustion on time-varying turbulent-flow

open access: yesAdvances in Aerodynamics, 2022
Visualization is crucial for analyzing the turbulent combustion simulation. Time-varying data allows us to investigate the evolution process of the turbulent flow field. To study the combustion effects, we calculated the enstrophy of the flow field since
Xiaoyang Han   +4 more
doaj   +1 more source

Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi   +2 more
doaj   +1 more source

Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]

open access: yesTehnika, 2023
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.   +1 more
doaj  

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy