Journal articles on the topic 'Computer network resources'

To see the other types of publications on this topic, follow the link: Computer network resources.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
2

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
3

Lu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources." Mobile Information Systems 2022 (September 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The balanced distribution of multimedia wireless network modular teaching resources is improved by optimizing and adjusting the balanced distribution of multimedia wireless network modular teaching resources. Based on block grid balanced scheduling and resource spectrum fusion, a balanced distribution method of multimedia wireless network modular teaching resources is proposed. A blockchain Internet of Things accesses control network architecture system for the balanced allocation of multimedia wireless network modular teaching resources established using the priority business scheduling method. Modular resource allocation of multimedia wireless networks and adaptive forwarding are adjusted to control the data packets. The bandwidth guarantee mechanism is used for the equitable allocation of multimedia wireless network modular teaching resources information flow. Multi-service hierarchical management of multimedia wireless network modular teaching resources spectrum is controlled by block grid balanced scheduling and resource spectrum fusion. The high-energy physical computing system structure is used to allocate the resource spectrum balance of the modular teaching resources of the multimedia wireless networks, ensuring the bandwidth requirements of various services. The classified management and balanced allocation of the multimedia wireless networks’ teaching storage, system, and teaching spectrum resources are made possible. The results of the tests show that this method effectively reduces the delay in the allocation of modular multimedia wireless network teaching resources, improves the utilization rate of modular multimedia wireless network teaching resources, and significantly improves their reading and writing performance.
4

Yi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, and Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks." 網際網路技術學刊 23, no. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p>This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission rate and the channel occupancy rate, the proposed system has &ldquo;knowledge&rdquo; of overall transmission behavior and can regulate transmission resources. An Adaptive Connection Assignment (ACA) mechanism is proposed for end devices; it find out target end devices with poor transmission performance, analyzes their alternative Access Point (AP) availability and causes them to change connections to improve transmission performance. An Adaptive Channel Utilization (ACU) mechanism is designed for APs to identify a target AP that is suffering from interference, to analyze its alternative channel availability and to require it to change its working channel to improve transmission efficiency. Results of simulations of various scenarios indicate that the throughput of end devices is increased by 15 to 24%, the throughput of APs is increased by 6 to 47% and the retransmission rate of APs is reduced by 0.4 to 5.3%.</p> <p>&nbsp;</p>
5

Tulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the modern conditions of developed information systems, the advantages of creating virtual private networks cannot be underestimated. But before mentioning the clearest and most useful ways to create virtual private networks, it is necessary to understand its meaning. Nowadays, the question of how to communicate with the corporate information system is important for users. Here they will need a broadband connection, regardless of whether they use a fixed network or Wi-Fi, as it is not uncommon for users to work on the road. Today, virtual technologies are becoming more popular, they occupy a high place in modern companies. Because they allow you to prevent the voice server from connecting to one workplace. It is not always necessary to keep employees in the office to get information about the services, there is no need to be there, it is enough to use a remote connection. Many institutions have implemented a fixed or mobile solution, which provides effective connection of mobile employees through the terminal. Many networks are now connected via the Internet. Therefore, it is necessary to take certain measures for the security of such a large system, because any computer can gain access to the network of any institution, the risk of breaking the computer is much higher without any physical effort
6

Bishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley, and Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction." Journal of Geography 92, no. 3 (May 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Giladi, Ran, Ephraim Korach, and Rony Ohayon. "Placement of network resources in communication networks." Computer Networks 43, no. 2 (October 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Ning. "Study of Computer Network Resource Sharing for Advanced Engineering Applications." Applied Mechanics and Materials 484-485 (January 2014): 799–802. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user. To analyze and further know the advantages of computer network resource sharing, it is necessary to combine with their actual application conditions. This is analyzed in this paper.
9

Bura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Niu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
11

Bushur, Jacob, and Chao Chen. "Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 41–54. http://dx.doi.org/10.5121/ijcsit.2022.14304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Distributed computing networks harness the power of existing computing resources and grant access to significant computing power while averting the costs of a supercomputer. This work aims to configure distributed computing networks using different computer devices and explore the benefits of the computing power of such networks. First, an HTCondor pool consisting of sixteen Raspberry Pi single-board computers and one laptop is created. The second distributed computing network is set up with Windows computers in university campus labs. With the HTCondor setup, researchers inside the university can utilize the lab computers as computing resources. In addition, the HTCondor pool is configured alongside the BOINC installation on both computer clusters, allowing them to contribute to high-throughput scientific computing projects in the research community when the computers would otherwise sit idle. The scalability of these two distributed computing networks is investigated through a matrix multiplication program and the performance of the HTCondor pool is also quantified using its built-in benchmark tool. With such a setup, the limits of the distributed computing network architecture in computationally intensive problems are explored.
12

Lu, Zhaoming, Tao Lei, Xiangming Wen, Luhan Wang, and Xin Chen. "SDN Based User-Centric Framework for Heterogeneous Wireless Networks." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9874969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs) have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet). However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS) strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN) and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience) driven fine-grained resource management could be achieved for wireless network users.
13

Irwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono, and Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB." Infotech: Journal of Technology Information 8, no. 2 (November 30, 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The form of computer network connection can be via cable or wireless such as fiber optic, microwave, wireless, or satellite. One type of computer network that is often used to connect personal computers and workstations in an office or an organization, company or factory for the use of shared resources is a local area network. The purpose of this research is to analyze, design and create an application that can detect damage to Local Area Network (LAN) networks. The research method used is backward chaining. The results of this study are applications that can detect damage to local area networks using the web-based backward chaining method. With this expert system application, it can speed up and make it easier to detect damage to Local Area Network networks.
14

Yu, Jie, Yaliu Li, Chenle Pan, and Junwei Wang. "A Classification Method for Academic Resources Based on a Graph Attention Network." Future Internet 13, no. 3 (March 4, 2021): 64. http://dx.doi.org/10.3390/fi13030064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Classification of resource can help us effectively reduce the work of filtering massive academic resources, such as selecting relevant papers and focusing on the latest research by scholars in the same field. However, existing graph neural networks do not take into account the associations between academic resources, leading to unsatisfactory classification results. In this paper, we propose an Association Content Graph Attention Network (ACGAT), which is based on the association features and content attributes of academic resources. The semantic relevance and academic relevance are introduced into the model. The ACGAT makes full use of the association commonality and the influence information of resources and introduces an attention mechanism to improve the accuracy of academic resource classification. We conducted experiments on a self-built scholar network and two public citation networks. Experimental results show that the ACGAT has better effectiveness than existing classification methods.
15

Xu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the development of computer and multimedia technology, social media platforms are widely used in various fields, so this paper introduces the design of network multimedia platform in the human resources management system, and designs a kind of new human resources management computer system. In order to improve the level of human resource management, it can introduce more talents and rational allocation human resources for enterprises, so we must improve the user generated content quality of social networking platform, eliminating spam behavior, and improving the social network human resource platform reputation. This paper establishes the security mechanism related mathematical model of social network human resources system. Through the VB programming control, it can implement the security of social network content, the automatic removal of rubbish short message and the optimal audit mechanism of system human resource management, which provide innovative solutions for the enterprise human resource management.
16

Xi Liang, Xi Liang, and Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship." 網際網路技術學刊 23, no. 1 (January 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p>Aiming at the problems of poor balance of recommended resources in the recommendation of traditional physical education network teaching resources and low trust degree of recommended physical education network teaching resources, this paper proposes a balanced recommendation algorithm for physical education network teaching resources based on trust relationship. By SVM algorithm, the teaching resources of physical education network are classified, and then the invalid data of teaching resources of physical education network are deleted, and the remaining teaching resources of physical education network are taken as the extraction object to complete the extraction of teaching resources of physical education network. Through Kalman filtering method, the data of sports network teaching resources with noise are reduced, and then the data with high similarity are fused to complete the preprocessing of physical education network teaching resources data. By constructing the trust relationship model, the relationship attribute between the recommended physical education network teaching resources data is determined. The experimental results show that the highest degree of resource equilibrium recommended by the proposed method is about 96 and the recommended resource trust is high.</p> <p>&nbsp;</p>
17

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
18

Macleod, Roderick A. "Network resources and access tools." New Review of Information Networking 10, no. 1 (May 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

MacLeod, Roderick A. "Network resources and access tools." New Review of Information Networking 9, no. 1 (January 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rehm, Sven-Volker, Lakshmi Goel, and Iris Junglas. "Using Information Systems in Innovation Networks: Uncovering Network Resources." Journal of the Association for Information Systems 18, no. 8 (August 2017): 577–604. http://dx.doi.org/10.17705/1jais.00465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Perepelkin, D. A., and A. M. Pham. "MATHEMATICAL AND COMPUTER MODELING OF HETEROGENEOUS RESOURCES PLANNING AND ALLOCATION IN INDUSTRIAL NETWORKS." Vestnik of Ryazan State Radio Engineering University 77 (2021): 68–80. http://dx.doi.org/10.21667/1995-4565-2021-77-68-80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of the work is to develop mathematical and software tools for modeling planning and allocating processes of heterogeneous resources in industrial networks. Two approaches to the application of functional dependencies of random values of resources to the model of GERT-network are proposed: parallel and sequential, which corresponds to the processes of planning and allocating resources. The approaches proposed in the work allow expanding the capabilities of classical GERT-networks. To generalize the process of implementation and automation of calculations, a computer modeling system has been developed. The main stages of mathematical modeling of industrial networks based on GERT-models are also proposed. An algorithm for planning and allocating of heterogeneous resources in t industrial networks has been developed. A computer modeling system ResourceModeler has been developed, which allows calculating the distribution laws of output values in a GERT-network using linear functional dependencies based on the heterogeneity of resources.
22

Sharadqeh, Ahmad. "A novel algorithm for software defined networks model to enhance the quality of services and scalability in wireless network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (April 1, 2022): 1585. http://dx.doi.org/10.11591/ijece.v12i2.pp1585-1592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Software defined networks (SDN) have replaced the traditional network architecture by separating the control from forwarding planes. SDN technology utilizes computer resources to provide worldwide effective service than the aggregation of single internet resources usage. Breakdown while resource allocation is a major concern in cloud computing due to the diverse and highly complex architecture of resources. These resources breakdowns cause delays in job completion and have a negative influence on attaining quality of service (QoS). In order to promote error-free task scheduling, this study represents a promising fault-tolerance scheduling technique. For optimum QoS, the suggested restricted Boltzmann machine (RBM) approach takes into account the most important characteristics like current consumption of the resources and rate of failure. The proposed approach's efficiency is verified using the MATLAB toolbox by employing widely used measures such as resource consumption, average processing time, throughput and rate of success.
23

Olha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS." Problems of Modeling and Design Automatization, no. 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In conditions of high business competition, IT organizations need to respond quickly to the needs of their users who need resources to support business applications. This is due to the rapid spread of the cloud computing model, in which resources can be deployed independently and on demand. Cloud computing is a source of tools to automate the deployment of resources, so IT organizations do not have to spend so much time doing this process manually. When deploying new applications, moving virtual servers or commissioning new instances due to dynamic applications, the network must respond quickly and provide the required type of connection. There has been a significant breakthrough in software configured networks (SDN / NFV) over the past few years. SDN / NFV organizations need to increase network adaptability by automating the network on cloud computing platforms.However, the new challenges posed by the combination of cloud computing and SDN / NFV, especially in the area of enterprise network security, are still poorly understood. This article is about solving this important problem. The article examines the impact on the mechanisms of protection against network attacks in the corporate network, which uses both technologies, simulates DDoS-attacks on cloud computing systems. It has been shown that SDN / NFV technology can really help protect against DDoS attacks if the security architecture is designed correctly.
24

Mathonsi, Topside E., Tshimangadzo Mavin Tshilongamulenzhe, and Bongisizwe Erasmus Buthelezi. "Enhanced Resource Allocation Algorithm for Heterogeneous Wireless Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 24, no. 6 (November 20, 2020): 763–73. http://dx.doi.org/10.20965/jaciii.2020.p0763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In heterogeneous wireless networks, service providers typically employ multiple radio access technologies to satisfy the requirements of quality of service (QoS) and improve the system performance. However, many challenges remain when using modern cellular mobile communications radio access technologies (e.g., wireless local area network, long-term evolution, and fifth generation), such as inefficient allocation and management of wireless network resources in heterogeneous wireless networks (HWNs). This problem is caused by the sharing of available resources by several users, random distribution of wireless channels, scarcity of wireless spectral resources, and dynamic behavior of generated traffic. Previously, resource allocation schemes have been proposed for HWNs. However, these schemes focus on resource allocation and management, whereas traffic class is not considered. Hence, these existing schemes significantly increase the end-to-end delay and packet loss, resulting in poor user QoS and network throughput in HWNs. Therefore, this study attempts to solve the identified problem by designing an enhanced resource allocation (ERA) algorithm to address the inefficient allocation of available resources vs. QoS challenges. Computer simulation was performed to evaluate the performance of the proposed ERA algorithm by comparing it with a joint power bandwidth allocation algorithm and a dynamic bandwidth allocation algorithm. On average, the proposed ERA algorithm demonstrates a 98.2% bandwidth allocation, 0.75 s end-to-end delay, 1.1% packet loss, and 98.9% improved throughput performance at a time interval of 100 s.
25

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
26

Liu, Li Jun. "Research on Computer Network Data Transfer Methods." Advanced Materials Research 926-930 (May 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and realization of dynamic task assignment algorithm and Performance experiment of the system.
27

Martini, Barbara, Valerio Martini, Fabio Baroncelli, Karim Torkman, and Piero Castoldi. "Application-Driven Control of Network Resources in Multiservice Optical Networks." Journal of Optical Communications and Networking 1, no. 2 (July 1, 2009): A270. http://dx.doi.org/10.1364/jocn.1.00a270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Du, Lian Yan. "Design on Structure and Integrity for Foreign Language Network Learning Resource Library." Applied Mechanics and Materials 543-547 (March 2014): 4581–84. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Network learning resources is accompanied by computer technology, communication technology and network technology developed new educational resources, for foreign language teaching providing a variety of teaching materials. For difficult problems in foreign language network learning resources construction, the paper based on SQL Server database management system to study resource library structure and integrity design. It based on requirements analysis and systems involved in language classes, resource types, resources, resource files, resource evaluation five entities, the part of structural design consisted includes conceptual design and logical design, the part of integrity design includes entity integrity design and referential integrity designs. This article provides practical solutions for foreign language learning resource library construction, for improving the quality of teaching foreign language has great significance.
29

Pourebrahimi, Behnaz, and Koen Bertels. "Self-Adaptive Economic-Based Resource Allocation in Ad-Hoc Grids." International Journal of Embedded and Real-Time Communication Systems 3, no. 2 (April 2012): 111–30. http://dx.doi.org/10.4018/jertcs.2012040106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Resource allocation is the process of discovering and allocating resources to requested tasks in a way that satisfy both user jobs and resource administrators. In ad-hoc Grids, resource allocation is a challenging undertaking as tasks and resources are distributed, heterogeneous in nature, owned by different individuals or organizations and they may arise spontaneously at any time with various requirements and availabilities. In this paper, the authors address an economic-based framework for resource allocation in ad-hoc Grids to deal with the dynamic nature of such networks. Within the economic framework, self-interested nodes in ad-hoc Grids are considered as consumers (buyers) and producers (sellers) of resources. Consumers and producers of resources are autonomous agents that cooperate through a simple, single metric namely the price that summarizes the global state of a network in a number. Adaptation is achieved by individual nodes through adopting a bidding strategy that adjusts the price according to the current state of the network in order to optimize the local utility of the node.
30

Voyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)." Computer Music Journal 18, no. 3 (1994): 8. http://dx.doi.org/10.2307/3681174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network." Scientific Programming 2021 (June 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The main purpose of the integration of network media and middle school ideological and political course is to better realize the moral education function of middle school ideological and political development. The use of resource integration technology to manage distributed teaching resources is conducive to improving the level of information construction in colleges and universities, and so on. This paper puts forward the integration system of ideological and political multimedia network teaching resources based on wireless network. Firstly, it presents an overview of the Radio Resource Management (RRM) problem and projected strategies within wireless network framework, where several Radio Access Technologies (RATs) are collectively controlled and identify the different activities relating to the CRRM issues. Secondly, this paper targets providing a summary of the RRM problem and projected solutions within wireless network. Thirdly, the theoretical elements of the design and the teaching resource management assessment process are clarified by using XML as the data exchange carrier to realize the automatic integration of teaching resources. Fourthly, we have used dSPACE platform, by calling its API function, which then call the subscribe function of dSPACE framework and store the subscription information in the database. Whenever new teaching resources enter the subscribed field, the dSPACE framework will automatically send e-mail to the subscribers. Finally, during the operation of the system, all functions operate normally and have strong security, so as to avoid the illegal theft or leakage of the data about the education system.
32

Weigeng, Shi. "Reconnectable network with limited resources." Journal of Computer Science and Technology 6, no. 3 (July 1991): 243–49. http://dx.doi.org/10.1007/bf02945511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, WenXia. "A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm." Security and Communication Networks 2021 (November 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/2133042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to improve the accuracy and efficiency of the classification of network ideological and political resources and promote the efficiency of ideological education, a research on the classification of network ideological and political resources based on the improved SVM algorithm is proposed. We analyze the characteristics and current situation of network ideological and political resources and conclude that the method elements are open and technical. The ontology elements are rich and shared, and the behavioral elements are autonomous and interactive. Three types of network ideological and political resources are proposed: the main resource, content resource, and means resource. The particle swarm algorithm is used to improve the SVM algorithm. In the process of constructing the SVM classifier, the fuzzy membership function is introduced, the classification problem of network ideological and political resources is converted into a secondary planning problem, and the accuracy of network ideological and political resources is finally realized. Simulation results show that the use of improved algorithms to classify network ideological and political resources can improve the accuracy and efficiency of network abnormal data classification.
34

Gao, Chenchen, and Kai Zhang. "Research on remote education intelligent recommendation system of computer network Ancient Literature Resources Database." MATEC Web of Conferences 365 (2022): 01055. http://dx.doi.org/10.1051/matecconf/202236501055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the development of intelligent education and the development of distance education becoming more and more intelligent and three-dimensional, an intelligent recommendation system is constructed on the basis of learners'individual demands, will achieve learning requirements and recommended content of the precise match. The construction of ancient literature resource database by means of computer network and the timely push of intelligent recommendation system to students will promote the essential change of distance education on the basis of reconstructing the ecology of distance education. This paper analyzes the significance of the remote education intelligent recommendation system of the computer network ancient literature resources database, and probes into the construction strategy of the remote education intelligent recommendation system of the computer network ancient literature resources database.
35

Zhao, Guotao, and Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm." Scientific Programming 2021 (October 11, 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to improve the retrieval ability of multiview attribute coded image network teaching resources, a retrieval algorithm of image network teaching resources based on depth hash algorithm is proposed. The pixel big data detection model of the multiview attribute coding image network teaching resources is constructed, the pixel information collected by the multiview attribute coding image network teaching resources is reconstructed, the fuzzy information feature components of the multiview attribute coding image are extracted, and the edge contour distribution image is combined. The distributed fusion result of the edge contour of the view image of the network teaching resources realizes the construction of the view feature parameter set. The gray moment invariant feature analysis method is used to realize information coding, the depth hash algorithm is used to realize the retrieval of multiview attribute coded image network teaching resources, and the information recombination is realized according to the hash coding result of multiview attribute coded image network teaching resources, thus improving the fusion. The simulation results show that this method has higher precision, better retrieval precision, and higher level of resource fusion for multiview coded image network teaching resource retrieval.
36

Shefer, O. V., G. V. Golovko, Ye A. Chaika, and M. A. Luchko. "DEVELOPMENT OF A COMPUTER NETWORK OF THE REGIONAL OFFICE OF WATER RESOURCES IN POLTAVA REGION WITH AN INTELLIGENT DATABASE MANAGEMENT SYSTEM." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 61 (September 11, 2020): 44–48. http://dx.doi.org/10.26906/sunz.2020.3.044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the Regional Office of Water Resources in Poltava region. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. Results. All possible types of network applications and components were identified and the most optimal process for updating and improving the computer network at the Regional Office of Water Resources in Poltava region was chosen. Also, with the introduction of a new local computer network, the possibility of choosing from the most widespread local networks was analyzed and having come to a conclusion that the local computer network topology of the star is the most optimal option for this enterprise. The article analyzes and points out that the implementation of this computer network also increases the network security, and significantly increases the speed of fixing the emerging problems in any workstation without affecting the overall network performance. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health
37

Tan, Tin-Wee, and Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences." Biochemical Education 22, no. 1 (January 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Khalid, Adnan, Qurat ul Ain, Awais Qasim, and Zeeshan Aziz. "QoS Based Optimal Resource Allocation and Workload Balancing for Fog Enabled IoT." Open Computer Science 11, no. 1 (January 1, 2021): 262–74. http://dx.doi.org/10.1515/comp-2020-0162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract This paper is aimed at efficiently distributing workload between the Fog Layer and the Cloud Network and then optimizing resource allocation in cloud networks to ensure better utilization and quick response time of the resources available to the end user. We have employed a Dead-line aware scheme to migrate the data between cloud and Fog networks based on data profiling and then used K-Means clustering and Service-request prediction model to allocate the resources efficiently to all requests. To substantiate our model, we have used iFogSim, which is an extension of the CloudSim simulator. The results clearly show that when an optimized network is used the Quality of Service parameters exhibit better efficiency and output.
39

Chaudhary, Sachin, and Anjna Chaudhary. "Biologically inspired networking: A solution over the challenges of ordinary networking." International Journal of Advance Research and Innovation 1, no. 3 (2013): 40–44. http://dx.doi.org/10.51976/ijari.131305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The steadily growing speed of technological development, computer networks are becoming increasingly complex. At the same time, they must fulfill ever higher requirements in terms of performance, scale, robustness etc. while minimizing their use of resources and adapting to dynamics. The communication between network embedded systems has become a major research domain in the communication network area. Wireless sensor network (WSN) and sensor/actuator network (SANET) build of huge amounts of interacting nodes build the basis for this research. From very long time, nature and biology have inspired new technologies. In computer networking and specifically wireless networks, this field of bio-inspired networking is new and becomes very popular with the emergent of new types of networks with intelligent and autonomous mobiles and/or base stations. Bio Inspired networking has fostered new developments in networking, especially in the most challenging domains such as handling large scale networks, their dynamic nature, resource constraints, heterogeneity, unattended operation, and robustness.
40

Gao, Qi, Na Lyu, Jingcheng Miao, and Wu Pan. "Wireless Virtual Network Embedding Algorithm Based on Deep Reinforcement Learning." Electronics 11, no. 14 (July 18, 2022): 2243. http://dx.doi.org/10.3390/electronics11142243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Wireless network virtualization is widely used to solve the ossification problem of networks, such as 5G and the Internet of Things. The most crucial method of wireless network virtualization is virtual network embedding, which allows virtual networks to share the substrate network resources. However, in wireless networks, link interference is an inherent problem while mapping virtual networks because of the characteristics of wireless channels. To distribute resources efficiently and address the problem of interference, a dynamic embedding algorithm with deep reinforcement learning is proposed. During the training stage, we take resource use and interference from substrate networks as observations to train the agent, and then the agent generates a resource allocation strategy. Aiming at realizing load balance, we reshape the reward function considering the execution ratio and residual ratio of substrate network resources as well as the cost consumed by current virtual network request. Numerical tests show that our embedding approach increases the acceptance ratio and maintains better robustness. Moreover, the results also illustrate that our algorithm maintains a high acceptance ratio while producing less interference and lower cost.
41

Hart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Many colleges and universities in the U. S. are electronically linked to the internet, the worldwide web of computer networks. Advisors can begin to use internet resources by subscribing to the user-friendly academic advising forum called ACADV. Through ACADV, advisors participate in a daily discussion group that connects them with colleagues around the world. After an advisor who is a new internet user becomes comfortable with ACADV, many other network resources can be explored. Abstruse computer terms and abbreviations such as e-mail, Usenet, Telnet, and FTP will become familiar and meaningful after only a short time. Advisors who learn the terms and concepts enabling them to communicate via computer effectively will discover much of value in the world of computer-mediated communications.
42

Liu, Weiwei. "Managing Earth Hazards Using the Deep Reinforcement Learning Algorithm for the Industrial Internet of Things Network." Photogrammetric Engineering & Remote Sensing 88, no. 11 (November 1, 2022): 707–14. http://dx.doi.org/10.14358/pers.22-00011r3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Wireless networks using resource management with the enormous number of Internet of Things (IoT) users is a critical problem in developing networks for the fifth generation. The primary aim of this research is to optimize the use of IoT network resources. Earth surface features can be identified and their geo-biophysical properties estimated using radiation as the medium of interaction in remote sensing techniques (RST). Deep reinforcement learning (DRL) has significantly improved traditional resource management, which is challenging to model. The Industrial Internet of Things (IIoT) network has to be carried out in real time with excess network resources. Conventional techniques have a significant challenge because of the extensive range and complexity of wireless networks. The DRL method has been used in several areas, including management and allocation of resources, dynamic channel access, mobile downloading, unified edge computing, caching and communication, and fog radio access networks. DRL -IIoT is more successful than the Q-learning technique for a single agent. The design and analysis of the DRL -based approach in stationary base stations to solve the typical assignment of resources issues have been mostly restricted. The DRL is used as a clustering technique to construct the primary model of the system with k-means. This article discusses optical and microwave sensors in RST techniques and applications, examines the areas where there are gaps, and discusses Earth hazards. Furthermore, a comprehensive resource-based strengthening learning system is developed to ensure the best use of resources. Simulation results show that the suggested method efficiently (97.24%) allocates available spectrum, cache, and computer resources to deep deterministic policy gradient benchmarks.
43

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
44

Guan, Xueming, and Yaozhi Ma. "Wireless Network Virtualization Resource Sharing considering Dynamic Resource Allocation Algorithm." Advances in Multimedia 2022 (August 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/7338309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to improve the efficiency of wireless network virtualization resource processing, this paper combines the dynamic resource allocation algorithm to construct a wireless network virtualization resource sharing model. This paper proposes a task-oriented resource management model and uses the task-oriented TRS model to describe resources and service processes, reducing the complexity of formulating resource allocation strategies. Moreover, this paper comprehensively considers factors such as centralized coordination control cost and limited domain topology visibility to improve the dynamic resource allocation algorithm. Through comparative research, it can be seen that the wireless network virtualization resource sharing method proposed in this paper considering the dynamic resource allocation algorithm can effectively improve the processing efficiency of wireless network virtualization resources.
45

Hidayatulloh, Syarif, and Wahyudin Wahyudin. "Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)." Jurnal Teknik Komputer 5, no. 1 (February 6, 2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The use of information technology and its use in collecting and processing data into information that is useful in decision making will play a role in determining the success of an organization or company in the future. This happened to PT. Jasa Cendekia Indonesia, the computer network that is owned has not met the needs of its employees. A good computer network is one that can serve sharing resources, data security, resources more efficiently and up-to-date information. Basically if a company can hold a computer network that serves the above for employees, of course it will make it easier for employees to do the work and improve the standards of the company itself. The proposed network built by the author for PT. Indonesian Scholar Services is a computer network built with Virtual Private Network technology. Because companies that have communication between the head office and branches that are good and safe, will be the capital for their companies in facing challenges in the era of globalization. Communication that is connected to a fast and secure computer network will make it easier for a company to supervise the activities of its company.
46

Liu, Dingrong, Zhigang Yao, and Liukui Chen. "Emergency Scheduling Optimization Simulation of Cloud Computing Platform Network Public Resources." Complexity 2021 (April 24, 2021): 1–11. http://dx.doi.org/10.1155/2021/9950198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Emergency scheduling of public resources on the cloud computing platform network can effectively improve the network emergency rescue capability of the cloud computing platform. To schedule the network common resources, it is necessary to generate the initial population through the Hamming distance constraint and improve the objective function as the fitness function to complete the emergency scheduling of the network common resources. The traditional method, from the perspective of public resource fairness and priority mapping, uses incremental optimization algorithm to realize emergency scheduling of public resources, neglecting the improvement process of the objective function, which leads to unsatisfactory scheduling effect. An emergency scheduling method of cloud computing platform network public resources based on genetic algorithm is proposed. With emergency public resource scheduling time cost and transportation cost minimizing target, initial population by Hamming distance constraints, emergency scheduling model, and the corresponding objective function improvement as the fitness function, the genetic algorithm to individual selection and crossover and mutation probability were optimized and complete the public emergency resources scheduling. Experimental results show that the proposed method can effectively improve the efficiency of emergency resource scheduling, and the reliability of emergency scheduling is better.
47

Zhang, Jun Hua, Da Ping Wang, Lin Wang, and Xin Guo. "Study on Resource Construction and Management of Multimedia Network Teaching." Advanced Materials Research 756-759 (September 2013): 800–803. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid development of computer technology, internet technology and multimedia technology has an increasingly profound impact on education. The importance of multimedia network teaching has been fully affirmed, and the quality of network teaching resources is the core, which is directly related to the effectiveness of teaching. Some practicable methods on resource construction and management of multimedia network teaching are proposed in this paper, to standardize teaching resources, realize resource sharing, improve teaching quality and management effectiveness and at the same time meet the needs of digital learning.
48

Schumacher, H. J. (Jerry), Tony Lee, and Sumit Ghosh. "A Novel, User-Level, Security-On-Demand Paradigm for ATM Networks: Modeling, Simulation, and Performance Analysis." Journal of Interconnection Networks 04, no. 04 (December 2003): 429–61. http://dx.doi.org/10.1142/s0219265903000969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With networks increasingly moving into virtually every aspect of our daily life, security is gaining importance, not only from the traditional perspective of communication but the network's growing role in modern automation and control. The traditional, certification based approach attempts to guarantee the security of a network through certification. Certified networks are generally confined to a limited domain and, as a result, they are isolated, costly, and under-utilized. In contrast, this paper presents a new principle – user-level, security-on-demand system, wherein the network allocates, where possible, the security resources commensurate with the user's request for transporting message(s) through the network securely. This principle is successfully demonstrated for the current Asynchronous Transfer Mode (ATM) networks, and is the result of an integration of the fundamental framework for network security, recently proposed by the authors in the literature, with the unique characteristics of ATM networks. The framework encapsulates the fundamental knowledge and set of relationships in network security and permits scientific and systematic reasoning about network security. It also enables all user groups – military, government, industry, and academia, to define their security requirements in a uniform manner. The security-on-demand approach promises the development of a "mixed use" class of networks in the future that may be simultaneously shared by different groups of users, with the system sustaining the diverse security requirements of each user. A unique characteristic in ATM network design is the dynamic call setup process. Under it, a network first establishes a virtual path or route for a user's call, guided by the user's requirements, and then transports the messages when a route has been successfully determined. This unique ATM characteristic is integrated with the framework to yield a successful demonstration of the proposed, user-level, security-on-demand approach. Utilizing the security framework as the foundation, every element of the network – node and link, is characterized by a security matrix that reflects its security resources. Every user is permitted to specify the security requirement for the call through a matrix, which expresses the limits of the security resources that the traffic cells must encounter during their transport through the network. Thus, during the dynamic establishment of the virtual path, every node and link is examined to ensure that the user-specified security is met, in addition to bandwidth and other Quality of Service (QoS) requirements. Traffic is launched when the call setup succeeds, otherwise, the call fails. Like all networks, the ATM network inherently consists of geographically dispersed entities and, as a result, the resource allocation strategy is necessarily distributed. Furthermore, as the network operation progresses, the resource availability scene changes dynamically. This paper proposes a unique function that reduces the key network resource parameters at a node to a single value, termed Node Status Indicator (NSI). The NSI value is computed dynamically at every node and disseminated across the network to be utilized by a node to refine its determination of a virtual path for a user call. The aim of the NSI is to improve the resource utilization in the network. The proposed approach is modeled for a large-scale, representative, 40-node ATM network. Utilizing stochastic input traffic that is synthesized to reflect realistic operating conditions, the model is simulated extensively on a testbed of 35+ Pentium workstations, under Linux, configured as a loosely-coupled parallel processor, utilizing an accurate, asynchronous, distributed simulator. The simulator implements the key characteristics of the ATM Forum proposed P-NNI 1.0 and UNI 3.0 standards. While the simulation results reflect a successful realization of the proposed approach, analysis reveals minimal impact of incorporating security on ATM network performance, as measured through call success rates and call setup times. In contrast, the tradition has been to incorporate security into large-scale systems and networks as an afterthought, i.e. adding hardware and software devices after the design has been completed, resulting in performance degradation. Also, while the use of NSI is observed to yield slightly lower average call setup rates and slightly higher average call setup times, a careful analysis of the trace of the calls as they progress through the system, reveals that, in general, calls are dispersed throughout the network, seeking to utilize all available resources of the network more evenly.
49

Abdullah, Mokhaled N., Ihab A. Satam, Raid W. Daoud, Suhail N. Shihab, and Haider A. Kamel. "Design and implement a self-managed computer network for electronic exams and sharing." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (July 1, 2020): 466. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp466-475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p>To implement electronic exams and material resources sharing (which is usually limited), an operating base is must be available for trading information and correspondence management. In this paper, self-managed computer networks, no server was designed. This network aims to share information and correspondence management between the laboratory`s computers. A specific software called Packet tracer used for designing and simulating the network, also for choosing the right medium and install the IP address so that a maximum of data flowing with minimum time and no data loss can be achieved. A class-C IP address was selected since it is the famous class and it doesn`t need any special equipment. Also it has a wide range of of computers in case of expanding the network. We didn`t use a wireless medium to protect the network from hacking. The network was based on an Ethernet medium and a star-connection between the computers with an average signal distributer. An excellent result was achieved after testing the network with a low error percentage, as shown in the result section of this paper.</p>
50

Jiang, Huilin, Lili Chen, Xiang Song, and Xueming Liu. "Resource Allocation Scheme for Fog-Enabled Wireless Access Networks under the QoS of Users." Mobile Information Systems 2021 (November 25, 2021): 1–10. http://dx.doi.org/10.1155/2021/7995090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the complexity of the network architecture, the diversity of network slicing, and the introduction of advanced techniques such as device to device (D2D), it is difficult for the next-generation (5G+ or 6G) networks to comprehensively consider the requirements of users from different slices and jointly allocate wireless resources to improve network energy efficiency. This paper studies the energy efficiency optimization problem for D2D-enabled fog radio access networks (FRANs). A resource allocation algorithm is proposed to maximize the network energy efficiency by jointly optimizing the beamforming vector, resource block allocation, and transmission power of the remote radio heads (RRHs), fog access point (FAP), and D2D users. The developed algorithm is based on nonlinear programming, convex optimization, and Lagrangian duality. Simulation results show that, by applying the proposed algorithm, the system throughput is significantly improved, and the network energy consumption is greatly reduced, which can ultimately improve the network energy efficiency obviously.

To the bibliography