Results 21 to 30 of about 2,661,670 (316)

Price Method and Network Congestion Control

open access: yesJournal of Telecommunications and Information Technology, 2023
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems.
Krzysztof Malinowski   +2 more
doaj   +1 more source

Computation in networks [PDF]

open access: yesComputational Cognitive Science, 2015
We present an introduction to the modeling of networks of nodes which parse the information presented to them into an output. One example is the nodes are excitable neurons which are collected into a nervous system for an animal whether invertebrate or vertebrate. We will focus on the development of the ideas and tools that might help us understand how
openaire   +2 more sources

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

RELIABILITY ANALYSIS OF COMPUTER NETWORKS USING PARAMETRIC FAILURE CRITERIA

open access: yesСтатистика и экономика, 2016
A mathematical model, which allows to obtain expressions for the determination of parameters of reliability of computer ne t w o rks co n sis t i n g o f i den t i c al recoverable elements.
Oleg A. Tkachev
doaj   +1 more source

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Computer & Network Equipment Management System (CNEMAS) Application Measurement

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2020
ABC is one of the state-owned enterprises in Indonesia. PT. ABC has policy to give some equipment for employees to rent. Application use to control all equipment that rent by employee named as CNEMAS (Computer & Network Equipment Management System ...
Imelda Pangaribuan   +2 more
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in ...
Rana F. Ghani, Ahmed T. Sadik
doaj   +1 more source

The one-way quantum computer - a non-network model of quantum computation

open access: yes, 2001
A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation.
Briegel, Hans J.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy