Results 21 to 30 of about 2,602,398 (316)

Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry

open access: yesPaladyn, 2022
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A.   +3 more
doaj   +1 more source

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Computation in networks [PDF]

open access: yesComputational Cognitive Science, 2015
We present an introduction to the modeling of networks of nodes which parse the information presented to them into an output. One example is the nodes are excitable neurons which are collected into a nervous system for an animal whether invertebrate or vertebrate. We will focus on the development of the ideas and tools that might help us understand how
openaire   +2 more sources

Computer & Network Equipment Management System (CNEMAS) Application Measurement

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2020
ABC is one of the state-owned enterprises in Indonesia. PT. ABC has policy to give some equipment for employees to rent. Application use to control all equipment that rent by employee named as CNEMAS (Computer & Network Equipment Management System ...
Imelda Pangaribuan   +2 more
doaj   +1 more source

Price Method and Network Congestion Control

open access: yesJournal of Telecommunications and Information Technology, 2023
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems.
Krzysztof Malinowski   +2 more
doaj   +1 more source

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

RELIABILITY ANALYSIS OF COMPUTER NETWORKS USING PARAMETRIC FAILURE CRITERIA

open access: yesСтатистика и экономика, 2016
A mathematical model, which allows to obtain expressions for the determination of parameters of reliability of computer ne t w o rks co n sis t i n g o f i den t i c al recoverable elements.
Oleg A. Tkachev
doaj   +1 more source

The one-way quantum computer - a non-network model of quantum computation

open access: yes, 2001
A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation.
Briegel, Hans J.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy