Results 11 to 20 of about 2,726,757 (225)

Pengembangan Rancangan Media Pembelajaran Augmented Reality Perangkat Jaringan Komputer

open access: yesInvotek: Jurnal Inovasi Vokasional dan Teknologi, 2020
All The problem of the research is the absence of supporting learning media in learning activities of computer network, are not optimal mastery of concepts by students, and abstract teaching materials that need to be made more concrete, as well as using ...
Melsi Sari Murfi, Kasman Rukun
doaj   +1 more source

Using Data Communication to Give Ease in Hotel Room Services

open access: yesComTech, 2011
Gaining extra comfort in a trip is an important factor. Staying in a hotel needs food, laundry, and other activities that can make guests comfortable. The guesses’ requests are usually ordered to the Room Service.
Rudi Tjiptadi
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in ...
Rana F. Ghani, Ahmed T. Sadik
doaj   +1 more source

Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi   +2 more
doaj   +1 more source

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2020
Subject of research: the process of monitoring the quality indicators of a computer network of a forensic information system using methods for increasing the frequency resolution of acousto-optic spectrum analyzers.
Mykhailo Mozhaiev, Pavlo Buslov
doaj   +1 more source

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry

open access: yesPaladyn, 2022
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A.   +3 more
doaj   +1 more source

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Home - About - Disclaimer - Privacy