Results 11 to 20 of about 2,833,464 (263)

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

Price Method and Network Congestion Control

open access: yesJournal of Telecommunications and Information Technology, 2023
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems.
Krzysztof Malinowski   +2 more
doaj   +1 more source

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

IEEE Access special section editorial: Artificial intelligence enabled networking [PDF]

open access: yes, 2015
With today’s computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks.
Imran, Muhammad Ali   +4 more
core   +1 more source

Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry

open access: yesPaladyn, 2022
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A.   +3 more
doaj   +1 more source

On Premises, Virtual, Cloud Solutions and a New Network Design Paradigm [PDF]

open access: yesProceedings of the XXth Conference of Open Innovations Association FRUCT, 2022
Traditional computer network design decisions are changing. There are several reasons: the technologies themselves that are used in networks have changed, the general concept for designing network is considered for a network infrastructure, in which ...
Vladimir Sayenko
doaj   +1 more source

Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]

open access: yes, 2017
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core   +4 more sources

A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2020
Subject of research: the process of monitoring the quality indicators of a computer network of a forensic information system using methods for increasing the frequency resolution of acousto-optic spectrum analyzers.
Mykhailo Mozhaiev, Pavlo Buslov
doaj   +1 more source

A Multilayer Model of Computer Networks [PDF]

open access: yesInternational Journal of Computer Trends and Technology (IJCTT) V26(1):12-16, August 2015, 2015
The fundamental concept of applying the system methodology to network analysis declares that network architecture should take into account services and applications which this network provides and supports. This work introduces a formal model of computer networks on the basis of the hierarchical multilayer networks.
arxiv   +1 more source

Home - About - Disclaimer - Privacy