Results 11 to 20 of about 2,741,581 (316)

The classroom teaching reform of “Computer Network” course of “three paragraphs and three levels, the combination of evaluation and questioning, and multiple assessment” [PDF]

open access: yesMATEC Web of Conferences
The computer network course is a compulsory course for computer majors, which is offered in the second semester of the second year of college. Students' understanding of the network is in the simple application level, and they lack the thinking and ...
Fan Dongmei, Lu Zhang, Li Liu
doaj   +1 more source

Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]

open access: yes, 2017
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core   +4 more sources

Visual analytics of combustion on time-varying turbulent-flow

open access: yesAdvances in Aerodynamics, 2022
Visualization is crucial for analyzing the turbulent combustion simulation. Time-varying data allows us to investigate the evolution process of the turbulent flow field. To study the combustion effects, we calculated the enstrophy of the flow field since
Xiaoyang Han   +4 more
doaj   +1 more source

Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi   +2 more
doaj   +1 more source

Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]

open access: yesTehnika, 2023
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.   +1 more
doaj  

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry

open access: yesPaladyn, 2022
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A.   +3 more
doaj   +1 more source

Price Method and Network Congestion Control

open access: yesJournal of Telecommunications and Information Technology, 2023
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems.
Krzysztof Malinowski   +2 more
doaj   +1 more source

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Computation in Gene Networks

open access: yesChaos: An Interdisciplinary Journal of Nonlinear Science, 2001
Genetic regulatory networks have the complex task of controlling all aspects of life. Using a model of gene expression by piecewise linear differential equations we show that this process can be considered as a process of computation. This is demonstrated by showing that this model can simulate memory bounded Turing machines.
Siegelmann, Hava, Ben-Hur, Asa
openaire   +4 more sources

Home - About - Disclaimer - Privacy