To see the other types of publications on this topic, follow the link: Computer network resources.

Journal articles on the topic 'Computer network resources'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources." Mobile Information Systems 2022 (September 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.

Full text
Abstract:
The balanced distribution of multimedia wireless network modular teaching resources is improved by optimizing and adjusting the balanced distribution of multimedia wireless network modular teaching resources. Based on block grid balanced scheduling and resource spectrum fusion, a balanced distribution method of multimedia wireless network modular teaching resources is proposed. A blockchain Internet of Things accesses control network architecture system for the balanced allocation of multimedia wireless network modular teaching resources established using the priority business scheduling method. Modular resource allocation of multimedia wireless networks and adaptive forwarding are adjusted to control the data packets. The bandwidth guarantee mechanism is used for the equitable allocation of multimedia wireless network modular teaching resources information flow. Multi-service hierarchical management of multimedia wireless network modular teaching resources spectrum is controlled by block grid balanced scheduling and resource spectrum fusion. The high-energy physical computing system structure is used to allocate the resource spectrum balance of the modular teaching resources of the multimedia wireless networks, ensuring the bandwidth requirements of various services. The classified management and balanced allocation of the multimedia wireless networks’ teaching storage, system, and teaching spectrum resources are made possible. The results of the tests show that this method effectively reduces the delay in the allocation of modular multimedia wireless network teaching resources, improves the utilization rate of modular multimedia wireless network teaching resources, and significantly improves their reading and writing performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (December 29, 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Full text
Abstract:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available information on methods and tools for securing the architecture of software-defined networks. SDN technology provides greater flexibility and speed in implementing security measures, allowing real-time responses to threats. In contemporary conditions, where cyber threats are becoming more complex and pronounced, SDN networks enable the detection of attacks, blocking malicious actions, and applying security policies in real-time. However, the increasing complexity of cyber threats and constant technological changes necessitate further development and enhancement of the information security of SDN network resources for companies. There is a need for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks. The necessity for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks serves as the foundation for this research. As a result, an enhancement in the level of information security for SDN network resources has been achieved by: 1) reducing the intervention time in the network; 2) applying an improved method of traffic processing based on network security of packet flows, allowing desired network applications to efficiently manage forwarding.
APA, Harvard, Vancouver, ISO, and other styles
5

Tulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.

Full text
Abstract:
In the modern conditions of developed information systems, the advantages of creating virtual private networks cannot be underestimated. But before mentioning the clearest and most useful ways to create virtual private networks, it is necessary to understand its meaning. Nowadays, the question of how to communicate with the corporate information system is important for users. Here they will need a broadband connection, regardless of whether they use a fixed network or Wi-Fi, as it is not uncommon for users to work on the road. Today, virtual technologies are becoming more popular, they occupy a high place in modern companies. Because they allow you to prevent the voice server from connecting to one workplace. It is not always necessary to keep employees in the office to get information about the services, there is no need to be there, it is enough to use a remote connection. Many institutions have implemented a fixed or mobile solution, which provides effective connection of mobile employees through the terminal. Many networks are now connected via the Internet. Therefore, it is necessary to take certain measures for the security of such a large system, because any computer can gain access to the network of any institution, the risk of breaking the computer is much higher without any physical effort
APA, Harvard, Vancouver, ISO, and other styles
6

Yi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, and Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks." 網際網路技術學刊 23, no. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.

Full text
Abstract:
<p>This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission rate and the channel occupancy rate, the proposed system has &ldquo;knowledge&rdquo; of overall transmission behavior and can regulate transmission resources. An Adaptive Connection Assignment (ACA) mechanism is proposed for end devices; it find out target end devices with poor transmission performance, analyzes their alternative Access Point (AP) availability and causes them to change connections to improve transmission performance. An Adaptive Channel Utilization (ACU) mechanism is designed for APs to identify a target AP that is suffering from interference, to analyze its alternative channel availability and to require it to change its working channel to improve transmission efficiency. Results of simulations of various scenarios indicate that the throughput of end devices is increased by 15 to 24%, the throughput of APs is increased by 6 to 47% and the retransmission rate of APs is reduced by 0.4 to 5.3%.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Bishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley, and Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction." Journal of Geography 92, no. 3 (May 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

骆, 又麟. "Application of Network Resources in Computer Teaching." Vocational Education 13, no. 03 (2024): 836–40. http://dx.doi.org/10.12677/ve.2024.133135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (February 29, 2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Full text
Abstract:
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, encompass a variety of entities ranging from personal computers and phones to servers and networking hardware. Computer networks enable various applications to access resources such as the World Wide Web, shared application and storage servers, printers, fax machines, as well as email and instant messaging applications. They play a pivotal role in facilitating information sharing across diverse tasks.Computer networks can be classified into two types: open systems and closed systems. Open systems are easily connected to networks and are primed for communication. Conversely, closed systems require proper authentication and are not as readily connected to other networks..
APA, Harvard, Vancouver, ISO, and other styles
10

Giladi, Ran, Ephraim Korach, and Rony Ohayon. "Placement of network resources in communication networks." Computer Networks 43, no. 2 (October 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Boyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (May 6, 2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.

Full text
Abstract:
In this paper a vulnerability penetration testing for several hosts in WLAN is made. The exploited operating systems were Microsoft Windows 7Enterprise and Microsoft Windows 8. It has been used an exploit named “Java storeImageArray () Invalid Array Index-ing Vulnerability”. Thanks to the open source penetration testing platform - Metasploit Framework the exploit was executed on the target hosts. The most important and critical rea-son the attack being successfully executed is connected with the human factor and interven-tion. Thereby, some security professionals and network administrators can use Metasploit Framework neither to run exploit nor to write security scripts in order to detect and protect the computer and network resources against various malicious cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Ning. "Study of Computer Network Resource Sharing for Advanced Engineering Applications." Applied Mechanics and Materials 484-485 (January 2014): 799–802. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.799.

Full text
Abstract:
Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user. To analyze and further know the advantages of computer network resource sharing, it is necessary to combine with their actual application conditions. This is analyzed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
13

Bushur, Jacob, and Chao Chen. "Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 41–54. http://dx.doi.org/10.5121/ijcsit.2022.14304.

Full text
Abstract:
Distributed computing networks harness the power of existing computing resources and grant access to significant computing power while averting the costs of a supercomputer. This work aims to configure distributed computing networks using different computer devices and explore the benefits of the computing power of such networks. First, an HTCondor pool consisting of sixteen Raspberry Pi single-board computers and one laptop is created. The second distributed computing network is set up with Windows computers in university campus labs. With the HTCondor setup, researchers inside the university can utilize the lab computers as computing resources. In addition, the HTCondor pool is configured alongside the BOINC installation on both computer clusters, allowing them to contribute to high-throughput scientific computing projects in the research community when the computers would otherwise sit idle. The scalability of these two distributed computing networks is investigated through a matrix multiplication program and the performance of the HTCondor pool is also quantified using its built-in benchmark tool. With such a setup, the limits of the distributed computing network architecture in computationally intensive problems are explored.
APA, Harvard, Vancouver, ISO, and other styles
14

Niu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Full text
Abstract:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
APA, Harvard, Vancouver, ISO, and other styles
15

Bura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Irwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono, and Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB." Infotech: Journal of Technology Information 8, no. 2 (November 30, 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.

Full text
Abstract:
The form of computer network connection can be via cable or wireless such as fiber optic, microwave, wireless, or satellite. One type of computer network that is often used to connect personal computers and workstations in an office or an organization, company or factory for the use of shared resources is a local area network. The purpose of this research is to analyze, design and create an application that can detect damage to Local Area Network (LAN) networks. The research method used is backward chaining. The results of this study are applications that can detect damage to local area networks using the web-based backward chaining method. With this expert system application, it can speed up and make it easier to detect damage to Local Area Network networks.
APA, Harvard, Vancouver, ISO, and other styles
17

Xu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.

Full text
Abstract:
With the development of computer and multimedia technology, social media platforms are widely used in various fields, so this paper introduces the design of network multimedia platform in the human resources management system, and designs a kind of new human resources management computer system. In order to improve the level of human resource management, it can introduce more talents and rational allocation human resources for enterprises, so we must improve the user generated content quality of social networking platform, eliminating spam behavior, and improving the social network human resource platform reputation. This paper establishes the security mechanism related mathematical model of social network human resources system. Through the VB programming control, it can implement the security of social network content, the automatic removal of rubbish short message and the optimal audit mechanism of system human resource management, which provide innovative solutions for the enterprise human resource management.
APA, Harvard, Vancouver, ISO, and other styles
18

Lu, Zhaoming, Tao Lei, Xiangming Wen, Luhan Wang, and Xin Chen. "SDN Based User-Centric Framework for Heterogeneous Wireless Networks." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9874969.

Full text
Abstract:
Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs) have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet). However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS) strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN) and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience) driven fine-grained resource management could be achieved for wireless network users.
APA, Harvard, Vancouver, ISO, and other styles
19

AlQahtani, Salman Ali. "Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities." Future Internet 15, no. 10 (October 19, 2023): 343. http://dx.doi.org/10.3390/fi15100343.

Full text
Abstract:
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is network slicing, which allows the creation of multiple virtual networks to support various use cases on a unified physical network. However, the limited availability of radio resources in the 5G cloud-Radio Access Network (C-RAN) and the ever-increasing data traffic volume necessitate efficient resource allocation algorithms to ensure quality of service (QoS) for each network slice. This paper proposes an Adaptive Slice Allocation (ASA) mechanism for the 5G C-RAN, designed to dynamically allocate resources and adapt to changing network conditions and traffic delay tolerances. The ASA system incorporates slice admission control and dynamic resource allocation to maximize network resource efficiency while meeting the QoS requirements of each slice. Through extensive simulations, we evaluate the ASA system’s performance in terms of resource consumption, average waiting time, and total blocking probability. Comparative analysis with a popular static slice allocation (SSA) approach demonstrates the superiority of the ASA system in achieving a balanced utilization of system resources, maintaining slice isolation, and provisioning QoS. The results highlight the effectiveness of the proposed ASA mechanism in optimizing future internet connectivity within the context of 5G C-RAN, paving the way for enhanced network performance and improved user experiences.
APA, Harvard, Vancouver, ISO, and other styles
20

Yu, Jie, Yaliu Li, Chenle Pan, and Junwei Wang. "A Classification Method for Academic Resources Based on a Graph Attention Network." Future Internet 13, no. 3 (March 4, 2021): 64. http://dx.doi.org/10.3390/fi13030064.

Full text
Abstract:
Classification of resource can help us effectively reduce the work of filtering massive academic resources, such as selecting relevant papers and focusing on the latest research by scholars in the same field. However, existing graph neural networks do not take into account the associations between academic resources, leading to unsatisfactory classification results. In this paper, we propose an Association Content Graph Attention Network (ACGAT), which is based on the association features and content attributes of academic resources. The semantic relevance and academic relevance are introduced into the model. The ACGAT makes full use of the association commonality and the influence information of resources and introduces an attention mechanism to improve the accuracy of academic resource classification. We conducted experiments on a self-built scholar network and two public citation networks. Experimental results show that the ACGAT has better effectiveness than existing classification methods.
APA, Harvard, Vancouver, ISO, and other styles
21

Xi Liang, Xi Liang, and Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship." 網際網路技術學刊 23, no. 1 (January 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.

Full text
Abstract:
<p>Aiming at the problems of poor balance of recommended resources in the recommendation of traditional physical education network teaching resources and low trust degree of recommended physical education network teaching resources, this paper proposes a balanced recommendation algorithm for physical education network teaching resources based on trust relationship. By SVM algorithm, the teaching resources of physical education network are classified, and then the invalid data of teaching resources of physical education network are deleted, and the remaining teaching resources of physical education network are taken as the extraction object to complete the extraction of teaching resources of physical education network. Through Kalman filtering method, the data of sports network teaching resources with noise are reduced, and then the data with high similarity are fused to complete the preprocessing of physical education network teaching resources data. By constructing the trust relationship model, the relationship attribute between the recommended physical education network teaching resources data is determined. The experimental results show that the highest degree of resource equilibrium recommended by the proposed method is about 96 and the recommended resource trust is high.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
APA, Harvard, Vancouver, ISO, and other styles
23

Boyanov, Petar. "USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS." Journal Scientific and Applied Research 6, no. 1 (November 11, 2014): 148–54. http://dx.doi.org/10.46687/jsar.v6i1.152.

Full text
Abstract:
In this paper a comprehensive scanning and monitoring the suspicious states in determined computer networks is made. Most of the computer and network problems with many vulnerabilities are connected. Therefore it is advisable to scan the entire computer network in order to detect weaknesses and accordingly be taken precautions Thanks to the many malicious users will not be able to penetrate in the relevant computer network and to gain access to computer resources.
APA, Harvard, Vancouver, ISO, and other styles
24

Perepelkin, D. A., and A. M. Pham. "MATHEMATICAL AND COMPUTER MODELING OF HETEROGENEOUS RESOURCES PLANNING AND ALLOCATION IN INDUSTRIAL NETWORKS." Vestnik of Ryazan State Radio Engineering University 77 (2021): 68–80. http://dx.doi.org/10.21667/1995-4565-2021-77-68-80.

Full text
Abstract:
The aim of the work is to develop mathematical and software tools for modeling planning and allocating processes of heterogeneous resources in industrial networks. Two approaches to the application of functional dependencies of random values of resources to the model of GERT-network are proposed: parallel and sequential, which corresponds to the processes of planning and allocating resources. The approaches proposed in the work allow expanding the capabilities of classical GERT-networks. To generalize the process of implementation and automation of calculations, a computer modeling system has been developed. The main stages of mathematical modeling of industrial networks based on GERT-models are also proposed. An algorithm for planning and allocating of heterogeneous resources in t industrial networks has been developed. A computer modeling system ResourceModeler has been developed, which allows calculating the distribution laws of output values in a GERT-network using linear functional dependencies based on the heterogeneity of resources.
APA, Harvard, Vancouver, ISO, and other styles
25

Olha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS." Problems of Modeling and Design Automatization, no. 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.

Full text
Abstract:
In conditions of high business competition, IT organizations need to respond quickly to the needs of their users who need resources to support business applications. This is due to the rapid spread of the cloud computing model, in which resources can be deployed independently and on demand. Cloud computing is a source of tools to automate the deployment of resources, so IT organizations do not have to spend so much time doing this process manually. When deploying new applications, moving virtual servers or commissioning new instances due to dynamic applications, the network must respond quickly and provide the required type of connection. There has been a significant breakthrough in software configured networks (SDN / NFV) over the past few years. SDN / NFV organizations need to increase network adaptability by automating the network on cloud computing platforms.However, the new challenges posed by the combination of cloud computing and SDN / NFV, especially in the area of enterprise network security, are still poorly understood. This article is about solving this important problem. The article examines the impact on the mechanisms of protection against network attacks in the corporate network, which uses both technologies, simulates DDoS-attacks on cloud computing systems. It has been shown that SDN / NFV technology can really help protect against DDoS attacks if the security architecture is designed correctly.
APA, Harvard, Vancouver, ISO, and other styles
26

Mathonsi, Topside E., Tshimangadzo Mavin Tshilongamulenzhe, and Bongisizwe Erasmus Buthelezi. "Enhanced Resource Allocation Algorithm for Heterogeneous Wireless Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 24, no. 6 (November 20, 2020): 763–73. http://dx.doi.org/10.20965/jaciii.2020.p0763.

Full text
Abstract:
In heterogeneous wireless networks, service providers typically employ multiple radio access technologies to satisfy the requirements of quality of service (QoS) and improve the system performance. However, many challenges remain when using modern cellular mobile communications radio access technologies (e.g., wireless local area network, long-term evolution, and fifth generation), such as inefficient allocation and management of wireless network resources in heterogeneous wireless networks (HWNs). This problem is caused by the sharing of available resources by several users, random distribution of wireless channels, scarcity of wireless spectral resources, and dynamic behavior of generated traffic. Previously, resource allocation schemes have been proposed for HWNs. However, these schemes focus on resource allocation and management, whereas traffic class is not considered. Hence, these existing schemes significantly increase the end-to-end delay and packet loss, resulting in poor user QoS and network throughput in HWNs. Therefore, this study attempts to solve the identified problem by designing an enhanced resource allocation (ERA) algorithm to address the inefficient allocation of available resources vs. QoS challenges. Computer simulation was performed to evaluate the performance of the proposed ERA algorithm by comparing it with a joint power bandwidth allocation algorithm and a dynamic bandwidth allocation algorithm. On average, the proposed ERA algorithm demonstrates a 98.2% bandwidth allocation, 0.75 s end-to-end delay, 1.1% packet loss, and 98.9% improved throughput performance at a time interval of 100 s.
APA, Harvard, Vancouver, ISO, and other styles
27

Devika SV, Et al. "Radio Resource Management Satellite Communication Network MCDM Method." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 1826–32. http://dx.doi.org/10.17762/ijritcc.v11i10.8759.

Full text
Abstract:
Worldwide deployment of heterogeneous wireless networks is growing as a result of consumer demand for connectivity at all times and in all places. These customers' interest in multimedia apps like video streaming and VoIP, which demand tight Quality of Service (QoS) support, is growing at the same time. With such limitations, provisioning network resources is a difficult undertaking. In fact, it might be challenging for a network operator to identify trustworthy criteria to choose the optimum network that ensures user happiness while maximising network utilisation, given the availability of numerous access technologies (WiFi, WiMAX, or cellular networks). To solve this problem, each eNB just needs to learn the traffi c conditions or patterns of its owncell in our proposal. Wireless communication systems depend heavily on radio resource management (RRM). To ensure the efficient and successful operation of wireless networks, it involves the allocation and control of radio frequency spectrum, power, and other resources. RRM is significant because it can use scarce radio resources as efficiently as possible, enhancing capacity, lowering interference, and improving service quality. Successful deployment and operation of wireless communication systems like cellular networks, Wi-Fi, and Bluetooth depend on effective RRM approaches. The need for wireless communication is growing, and new technologies and standards are constantly being developed. The methodology of radio resource management (RRM) involves a variety of techniques and algorithms designed to allocate radio resources in a way that maximizes network performance while minimizing interference. Taken as alternate parameter is Laser communication, optical networks, satellite optical communication, vibrations, satellite networks. Taken as is solar radiation power, thermal bending, micro meteorite impact, solar and lunar gravity, earth oblations method. satellite optical communication has reached near 2000 data set compare other data set. The operation of wireless communication networks depends on radio resource management (RRM). Wireless networks would have interference, congestion, and a lacklustre level of service if effective RRM procedures weren't used. RRM is therefore a key component in ensuring that wireless communication systems can provide users with dependable and high-quality services.
APA, Harvard, Vancouver, ISO, and other styles
28

Rehm, Sven-Volker, Lakshmi Goel, and Iris Junglas. "Using Information Systems in Innovation Networks: Uncovering Network Resources." Journal of the Association for Information Systems 18, no. 8 (August 2017): 577–604. http://dx.doi.org/10.17705/1jais.00465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sharadqeh, Ahmad. "A novel algorithm for software defined networks model to enhance the quality of services and scalability in wireless network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (April 1, 2022): 1585. http://dx.doi.org/10.11591/ijece.v12i2.pp1585-1592.

Full text
Abstract:
Software defined networks (SDN) have replaced the traditional network architecture by separating the control from forwarding planes. SDN technology utilizes computer resources to provide worldwide effective service than the aggregation of single internet resources usage. Breakdown while resource allocation is a major concern in cloud computing due to the diverse and highly complex architecture of resources. These resources breakdowns cause delays in job completion and have a negative influence on attaining quality of service (QoS). In order to promote error-free task scheduling, this study represents a promising fault-tolerance scheduling technique. For optimum QoS, the suggested restricted Boltzmann machine (RBM) approach takes into account the most important characteristics like current consumption of the resources and rate of failure. The proposed approach's efficiency is verified using the MATLAB toolbox by employing widely used measures such as resource consumption, average processing time, throughput and rate of success.
APA, Harvard, Vancouver, ISO, and other styles
30

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
31

Macleod, Roderick A. "Network resources and access tools." New Review of Information Networking 10, no. 1 (May 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

MacLeod, Roderick A. "Network resources and access tools." New Review of Information Networking 9, no. 1 (January 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Shefer, O. V., G. V. Golovko, Ye A. Chaika, and M. A. Luchko. "DEVELOPMENT OF A COMPUTER NETWORK OF THE REGIONAL OFFICE OF WATER RESOURCES IN POLTAVA REGION WITH AN INTELLIGENT DATABASE MANAGEMENT SYSTEM." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 61 (September 11, 2020): 44–48. http://dx.doi.org/10.26906/sunz.2020.3.044.

Full text
Abstract:
The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the Regional Office of Water Resources in Poltava region. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. Results. All possible types of network applications and components were identified and the most optimal process for updating and improving the computer network at the Regional Office of Water Resources in Poltava region was chosen. Also, with the introduction of a new local computer network, the possibility of choosing from the most widespread local networks was analyzed and having come to a conclusion that the local computer network topology of the star is the most optimal option for this enterprise. The article analyzes and points out that the implementation of this computer network also increases the network security, and significantly increases the speed of fixing the emerging problems in any workstation without affecting the overall network performance. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health
APA, Harvard, Vancouver, ISO, and other styles
34

Feng, Xu, Mengyang He, Lei Zhuang, Yanrui Song, and Rumeng Peng. "Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space–Air–Ground Integrated Network." Future Internet 16, no. 1 (January 16, 2024): 27. http://dx.doi.org/10.3390/fi16010027.

Full text
Abstract:
SAGIN is formed by the fusion of ground networks and aircraft networks. It breaks through the limitation of communication, which cannot cover the whole world, bringing new opportunities for network communication in remote areas. However, many heterogeneous devices in SAGIN pose significant challenges in terms of end-to-end resource management, and the limited regional heterogeneous resources also threaten the QoS for users. In this regard, this paper proposes a hierarchical resource management structure for SAGIN, named SAGIN-MEC, based on a SDN, NFV, and MEC, aiming to facilitate the systematic management of heterogeneous network resources. Furthermore, to minimize the operator deployment costs while ensuring the QoS, this paper formulates a resource scheduling optimization model tailored to SAGIN scenarios to minimize energy consumption. Additionally, we propose a deployment algorithm, named DRL-G, which is based on heuristics and DRL, aiming to allocate heterogeneous network resources within SAGIN effectively. Experimental results showed that SAGIN-MEC can reduce the end-to-end delay by 6–15 ms compared to the terrestrial edge network, and compared to other algorithms, the DRL-G algorithm can improve the service request reception rate by up to 20%. In terms of energy consumption, it reduces the average energy consumption by 4.4% compared to the PG algorithm.
APA, Harvard, Vancouver, ISO, and other styles
35

Du, Lian Yan. "Design on Structure and Integrity for Foreign Language Network Learning Resource Library." Applied Mechanics and Materials 543-547 (March 2014): 4581–84. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4581.

Full text
Abstract:
Network learning resources is accompanied by computer technology, communication technology and network technology developed new educational resources, for foreign language teaching providing a variety of teaching materials. For difficult problems in foreign language network learning resources construction, the paper based on SQL Server database management system to study resource library structure and integrity design. It based on requirements analysis and systems involved in language classes, resource types, resources, resource files, resource evaluation five entities, the part of structural design consisted includes conceptual design and logical design, the part of integrity design includes entity integrity design and referential integrity designs. This article provides practical solutions for foreign language learning resource library construction, for improving the quality of teaching foreign language has great significance.
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Li Jun. "Research on Computer Network Data Transfer Methods." Advanced Materials Research 926-930 (May 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.

Full text
Abstract:
In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and realization of dynamic task assignment algorithm and Performance experiment of the system.
APA, Harvard, Vancouver, ISO, and other styles
37

Pourebrahimi, Behnaz, and Koen Bertels. "Self-Adaptive Economic-Based Resource Allocation in Ad-Hoc Grids." International Journal of Embedded and Real-Time Communication Systems 3, no. 2 (April 2012): 111–30. http://dx.doi.org/10.4018/jertcs.2012040106.

Full text
Abstract:
Resource allocation is the process of discovering and allocating resources to requested tasks in a way that satisfy both user jobs and resource administrators. In ad-hoc Grids, resource allocation is a challenging undertaking as tasks and resources are distributed, heterogeneous in nature, owned by different individuals or organizations and they may arise spontaneously at any time with various requirements and availabilities. In this paper, the authors address an economic-based framework for resource allocation in ad-hoc Grids to deal with the dynamic nature of such networks. Within the economic framework, self-interested nodes in ad-hoc Grids are considered as consumers (buyers) and producers (sellers) of resources. Consumers and producers of resources are autonomous agents that cooperate through a simple, single metric namely the price that summarizes the global state of a network in a number. Adaptation is achieved by individual nodes through adopting a bidding strategy that adjusts the price according to the current state of the network in order to optimize the local utility of the node.
APA, Harvard, Vancouver, ISO, and other styles
38

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
APA, Harvard, Vancouver, ISO, and other styles
39

Chaudhary, Sachin, and Anjna Chaudhary. "Biologically inspired networking: A solution over the challenges of ordinary networking." International Journal of Advance Research and Innovation 1, no. 3 (2013): 40–44. http://dx.doi.org/10.51976/ijari.131305.

Full text
Abstract:
The steadily growing speed of technological development, computer networks are becoming increasingly complex. At the same time, they must fulfill ever higher requirements in terms of performance, scale, robustness etc. while minimizing their use of resources and adapting to dynamics. The communication between network embedded systems has become a major research domain in the communication network area. Wireless sensor network (WSN) and sensor/actuator network (SANET) build of huge amounts of interacting nodes build the basis for this research. From very long time, nature and biology have inspired new technologies. In computer networking and specifically wireless networks, this field of bio-inspired networking is new and becomes very popular with the emergent of new types of networks with intelligent and autonomous mobiles and/or base stations. Bio Inspired networking has fostered new developments in networking, especially in the most challenging domains such as handling large scale networks, their dynamic nature, resource constraints, heterogeneity, unattended operation, and robustness.
APA, Harvard, Vancouver, ISO, and other styles
40

Voyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)." Computer Music Journal 18, no. 3 (1994): 8. http://dx.doi.org/10.2307/3681174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gao, Chenchen, and Kai Zhang. "Research on remote education intelligent recommendation system of computer network Ancient Literature Resources Database." MATEC Web of Conferences 365 (2022): 01055. http://dx.doi.org/10.1051/matecconf/202236501055.

Full text
Abstract:
With the development of intelligent education and the development of distance education becoming more and more intelligent and three-dimensional, an intelligent recommendation system is constructed on the basis of learners'individual demands, will achieve learning requirements and recommended content of the precise match. The construction of ancient literature resource database by means of computer network and the timely push of intelligent recommendation system to students will promote the essential change of distance education on the basis of reconstructing the ecology of distance education. This paper analyzes the significance of the remote education intelligent recommendation system of the computer network ancient literature resources database, and probes into the construction strategy of the remote education intelligent recommendation system of the computer network ancient literature resources database.
APA, Harvard, Vancouver, ISO, and other styles
42

Martini, Barbara, Valerio Martini, Fabio Baroncelli, Karim Torkman, and Piero Castoldi. "Application-Driven Control of Network Resources in Multiservice Optical Networks." Journal of Optical Communications and Networking 1, no. 2 (July 1, 2009): A270. http://dx.doi.org/10.1364/jocn.1.00a270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, WenXia. "A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm." Security and Communication Networks 2021 (November 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/2133042.

Full text
Abstract:
In order to improve the accuracy and efficiency of the classification of network ideological and political resources and promote the efficiency of ideological education, a research on the classification of network ideological and political resources based on the improved SVM algorithm is proposed. We analyze the characteristics and current situation of network ideological and political resources and conclude that the method elements are open and technical. The ontology elements are rich and shared, and the behavioral elements are autonomous and interactive. Three types of network ideological and political resources are proposed: the main resource, content resource, and means resource. The particle swarm algorithm is used to improve the SVM algorithm. In the process of constructing the SVM classifier, the fuzzy membership function is introduced, the classification problem of network ideological and political resources is converted into a secondary planning problem, and the accuracy of network ideological and political resources is finally realized. Simulation results show that the use of improved algorithms to classify network ideological and political resources can improve the accuracy and efficiency of network abnormal data classification.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhao, Guotao, and Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm." Scientific Programming 2021 (October 11, 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.

Full text
Abstract:
In order to improve the retrieval ability of multiview attribute coded image network teaching resources, a retrieval algorithm of image network teaching resources based on depth hash algorithm is proposed. The pixel big data detection model of the multiview attribute coding image network teaching resources is constructed, the pixel information collected by the multiview attribute coding image network teaching resources is reconstructed, the fuzzy information feature components of the multiview attribute coding image are extracted, and the edge contour distribution image is combined. The distributed fusion result of the edge contour of the view image of the network teaching resources realizes the construction of the view feature parameter set. The gray moment invariant feature analysis method is used to realize information coding, the depth hash algorithm is used to realize the retrieval of multiview attribute coded image network teaching resources, and the information recombination is realized according to the hash coding result of multiview attribute coded image network teaching resources, thus improving the fusion. The simulation results show that this method has higher precision, better retrieval precision, and higher level of resource fusion for multiview coded image network teaching resource retrieval.
APA, Harvard, Vancouver, ISO, and other styles
45

Hiswara, Indra, Khusnul Khoiriyah, and Dody Febriyanto. "PERANCANGAN JARINGAN LAN SMK AL-KHAIRIYAH 2 DENGAN MENGGUNAKAN METODE OSPF." JEIS : Jurnal Elektro dan Informatika Swadharma 3, no. 1 (January 31, 2023): 58–66. http://dx.doi.org/10.56486/jeis.vol3no1.302.

Full text
Abstract:
The internet network is needed to carry out daily activities. A computer network is a network system where all computers share data and resources. The problem that often occurs in computer networks at SMK Al Khairiyah 2 is the dominance of user limitations by staff activities such as downloading or uploading large files. As well as the difficulty of knowing the number of computer network users who use wireless technology. This causes frequent problems with the computer network at this school, such as data sent being slow and doesn't even reach its destination, communication often experiences time-outs and security problems, so a network design is needed that can overcome the problems that occur. The problem is how to develop a good and adequate computer network, using the OSPF (Open Shortest Path First) method. The purpose of this study is to design a LAN network at SMK Al-Khairiyah 2 with the OSPF method.Penggunaan jaringan internet dibutuhkan dalam melakukan sesuatu aktifitas. Jaringan komputer merupakan suatu sistem jaringan, dimana seluruh komputer saling berbagi data dan resources satu sama lain. Masalah yang sering terjadi pada jaringan komputer di SMK Al Khairiyah 2 yaitu adanya dominasi limitasi user oleh aktivitas Staff seperti download atau upload file-file berukuran besar. Serta sulitnya mengetahui jumlah pengguna jaringan komputer yang menggunakan teknologi nirkabel. Menyebabkan seringnya terjadi masalah pada jaringan komputer di sekolah ini seperti: data yang dikirim lambat bahkan tidak sampai ke tujuan, komunikasi sering mengalami time-out dan masalah keamanan sehingga dibutuhkan suatu rancangan jaringan yang dapat mengatasi permasalahan yang terjadi. Permasalahannya bagaimana mengembangkan jaringan komputer yang baik dan memadai, dengan menggunakan metode OSPF (Open Shortest Path First). Tujuan penelitian ini yaitu merancang Jaringan LAN pada SMK Al-Khairiyah 2 dengan Metode OSPF.
APA, Harvard, Vancouver, ISO, and other styles
46

Mshvidobadze, Tinatin. "Computer Network and Computer Grid Joins to E-Learning." Journal of Technical Science and Technologies 4, no. 2 (May 22, 2016): 35–37. http://dx.doi.org/10.31578/jtst.v4i2.81.

Full text
Abstract:
According to the development of communications and web-based technologies in recent years, e-Learning has became very important for everyone and is seen as one of the most dynamic teaching methods. Grid computing is a pattern for increasing the computing power and storage capacity of a system and is based on hardware and software resources in a network with common purpose. In the present article grid architecture is shown and its different layers are described. This layer is heart of grid learning architecture and, in fact, regardless of this layer, e-Learning based on grid architecture will not be feasible.
APA, Harvard, Vancouver, ISO, and other styles
47

Rong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network." Scientific Programming 2021 (June 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.

Full text
Abstract:
The main purpose of the integration of network media and middle school ideological and political course is to better realize the moral education function of middle school ideological and political development. The use of resource integration technology to manage distributed teaching resources is conducive to improving the level of information construction in colleges and universities, and so on. This paper puts forward the integration system of ideological and political multimedia network teaching resources based on wireless network. Firstly, it presents an overview of the Radio Resource Management (RRM) problem and projected strategies within wireless network framework, where several Radio Access Technologies (RATs) are collectively controlled and identify the different activities relating to the CRRM issues. Secondly, this paper targets providing a summary of the RRM problem and projected solutions within wireless network. Thirdly, the theoretical elements of the design and the teaching resource management assessment process are clarified by using XML as the data exchange carrier to realize the automatic integration of teaching resources. Fourthly, we have used dSPACE platform, by calling its API function, which then call the subscribe function of dSPACE framework and store the subscription information in the database. Whenever new teaching resources enter the subscribed field, the dSPACE framework will automatically send e-mail to the subscribers. Finally, during the operation of the system, all functions operate normally and have strong security, so as to avoid the illegal theft or leakage of the data about the education system.
APA, Harvard, Vancouver, ISO, and other styles
48

Xue, Nian, and Li Wei Jia. "Construction and Research of Virtual Network User File System Based on Upnp and FUSE on Linux." Applied Mechanics and Materials 299 (February 2013): 125–29. http://dx.doi.org/10.4028/www.scientific.net/amm.299.125.

Full text
Abstract:
The Development of the computer has been from a single machine to the server, and then server clustering technology, and the emerging "cloud" network, which invariably show the network's role in the computer. Meanwhile, more and more high-end hardware trash or the users may be unbearable of high cost of servers, so the use of existing resources and integration of resources has become increasingly important. This paper will detail a virtual network file system, which based on Upnp (Universal Plug and Play) and FUSE (File system in Usese Space) in Linux operating system. In this study, users can share a computer terminal to collect and use that particular computer terminal on the network to all the resources users are interested in, provided that the shared computer terminals must be installed on a specific Upnp device. In this study, we have successfully implemented single-device-side and single-device-side multithread communication under the Linux or windows operating system.
APA, Harvard, Vancouver, ISO, and other styles
49

Hart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.

Full text
Abstract:
Many colleges and universities in the U. S. are electronically linked to the internet, the worldwide web of computer networks. Advisors can begin to use internet resources by subscribing to the user-friendly academic advising forum called ACADV. Through ACADV, advisors participate in a daily discussion group that connects them with colleagues around the world. After an advisor who is a new internet user becomes comfortable with ACADV, many other network resources can be explored. Abstruse computer terms and abbreviations such as e-mail, Usenet, Telnet, and FTP will become familiar and meaningful after only a short time. Advisors who learn the terms and concepts enabling them to communicate via computer effectively will discover much of value in the world of computer-mediated communications.
APA, Harvard, Vancouver, ISO, and other styles
50

Tan, Tin-Wee, and Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences." Biochemical Education 22, no. 1 (January 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography