Results 21 to 30 of about 2,694,917 (322)

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in ...
Rana F. Ghani, Ahmed T. Sadik
doaj   +1 more source

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2020
Subject of research: the process of monitoring the quality indicators of a computer network of a forensic information system using methods for increasing the frequency resolution of acousto-optic spectrum analyzers.
Mykhailo Mozhaiev, Pavlo Buslov
doaj   +1 more source

Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry

open access: yesPaladyn, 2022
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A.   +3 more
doaj   +1 more source

The one-way quantum computer - a non-network model of quantum computation

open access: yes, 2001
A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation.
Briegel, Hans J.   +2 more
core   +1 more source

The arpanet and computer networks [PDF]

open access: yesProceedings of the ACM Conference on The history of personal workstations, 1986
In 1964 only large mainframe computers existed, each with its own separate set of users. If you were lucky the computer was timeshared, but even then you could not go far away since the terminals were hardwired to it or connected by local phone line. Moreover, if you wanted data from another computer you moved it by tape and you could forget wanting ...
openaire   +1 more source

Using Data Communication to Give Ease in Hotel Room Services

open access: yesComTech, 2011
Gaining extra comfort in a trip is an important factor. Staying in a hotel needs food, laundry, and other activities that can make guests comfortable. The guesses’ requests are usually ordered to the Room Service.
Rudi Tjiptadi
doaj   +1 more source

Home - About - Disclaimer - Privacy