Results 21 to 30 of about 30,967 (217)
IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source.
FatimaEzzahra Laghrissi+3 more
doaj +1 more source
Cloud-based services for electronic civil registration and vital statistics systems
This paper examines the hosting options for electronic civil registration and vital statistics (CRVS) systems, particularly the use of data centers versus cloud-based solutions.
Brett McDowall, Samuel Mills
doaj +1 more source
Traditional Digital Screens have a great role in Packaging printing because they have good economic conditions in processing and most printing houses can be used and preparation in normal operating conditions.The search problem is that there are problems
Islam Ibrahim+2 more
doaj +1 more source
The possibility of cyber-attacks against critical infrastructure, and in particular nuclear power plants, has prompted several efforts by academia. Many of these works aim to capture the vulnerabilities of the industrial control systems used in these ...
Israel Barbosa de Brito+1 more
doaj +1 more source
Relay-assisted hybrid beamforming plays an inevitable role in enhancing network coverage, transmission range, and spectral efficiency while simultaneously reducing hardware cost, power consumption, and hardware implementation complexity.
Zunira Abbasi+5 more
doaj +1 more source
Driven by the increasing significance of artificial intelligence, the field of neuromorphic (brain-inspired) photonics is attracting increasing interest, promising new, high-speed, and energy-efficient computing hardware for key applications in ...
Matěj Hejda+4 more
doaj +1 more source
Assessment of the ALICE O2 readout servers [PDF]
The ALICE experiment at CERN LHC (Large Hadron Collider) is undertaking a major upgrade during LHC Long Shutdown 2 in 2019-2020. The raw data input from the detector will then increase a hundredfold, up to 3.4 TB/s.
Costa Filippo+3 more
doaj +1 more source
Capacity Optimization in Dynamically Routing Computer Network Systems
A computer network system is a complex system with a great number of dynamic components. There are many devices in the system, such as computers, routers, lines, hubs, and switches.
Nuşin Uncu, Rızvan Erol
doaj
Performance Test Base On PC With RouterOS RouterOS On Board
In this era of technology now a lot of RouterOS on Board that offers multiple features and functions to networking needs. In the development of RouterOS on Board be preferred due to the more simple and more efficient, in terms of price is also not too ...
Willy Permana Putra
doaj +1 more source
IoT and iTV for Interconnection, Monitoring, and Automation of Common Areas of Residents
Internet and, in particular, computer networks have become a key issue in our daily lives, due to the birth of wireless technologies. Internet of Things (IoT) aims to integrate sensors and actuators in daily objects, maximizing miniaturization and ...
Héctor Sánchez+3 more
doaj +1 more source