Results 11 to 20 of about 486,360 (195)

Aesthetic style transferring method based on deep neural network between Chinese landscape painting and classical private garden’s virtual scenario

open access: yesInternational Journal of Digital Earth, 2023
Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.
Shuai Hong   +6 more
doaj   +2 more sources

Network Security Analysis Using Virtual Private Network in Vocational School

open access: yesJurnal Paedagogy, 2022
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj   +1 more source

Mikrotik VPN Shielding E-Link Health Reports: Strengthening Data Security at Madiun Health Office

open access: yesJournal of Information Systems and Informatics, 2023
Advances in Information and Communication Technology have led to revolutionary changes in computer networking, especially in Indonesia, which has witnessed significant technological growth over the last four years.
Bintang Agung Gumelar   +2 more
doaj   +1 more source

Virtual Private Networks [PDF]

open access: yes, 2014
Business has changed in the last couple of decades. Companies now have to think about having a global presence, global marketing, and logistics. Most of the organizations have branches spread across different geographies of the world. Wherever you are located, all these branches need to be connected with their headquarters data center for information ...
Crescenzio Gallo   +2 more
  +4 more sources

Comparative analysis of VPN protocols

open access: yesJournal of Computer Sciences Institute, 2023
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec.
Jerzy Antoniuk   +1 more
doaj   +1 more source

Implementasi Jaringan Internet Site To Site VPN Dengan Metode IPSec Pada PT Telkom Akses

open access: yesComputer Science, 2021
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with a private data security network, the closure of data transfer from illegal access and network scalability are the main standards in a Virtual ...
Try Budi Septiandoko   +2 more
doaj   +1 more source

PETRI NETS MODELING FOR SDN TOPOLOGIES [PDF]

open access: yesJournal of Engineering Science (Chişinău), 2021
The article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming ...
AMEEN, Ali, GUȚULEAC, Emilian
doaj   +1 more source

Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]

open access: yesEngineering and Technology Journal, 2013
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj   +1 more source

SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network

open access: yesJournal of Computing Research and Innovation, 2021
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Optimal Orchestration of Virtual Network Functions [PDF]

open access: yes, 2017
-The emergence of Network Functions Virtualization (NFV) is bringing a set of novel algorithmic challenges in the operation of communication networks. NFV introduces volatility in the management of network functions, which can be dynamically orchestrated,
Addis, Bernardetta   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy