Academic literature on the topic 'Digital networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital networks"

1

Machuco Rosa, António. "Mimesis, network theory and digital social networks." Xiphias Gladius Revista interdisciplinar de Teoría Mimética, no. 1 (December 19, 2018): 93–111. http://dx.doi.org/10.32466/eufv-xg.2018.1.387.93-111.

Full text
Abstract:
We analyse the formal theory of networks and the new digital media from the perspective of mimetic theory. It is emphasised that the spatial form of the new media is characterised by distribution functions that are power laws. We show that this spatial form can be derived from the presence of mimetic desire in digital social networks. Finally, we show that network theory allows the representation of the scapegoat mechanism as it was analysed by René Girard.
APA, Harvard, Vancouver, ISO, and other styles
2

Togawa, Takashi, Mineo Nishiwaki, and Ken-Ichiro Yoshida. "Network testing system for digital data networks." Computer Networks and ISDN Systems 12, no. 3 (January 1986): 175–82. http://dx.doi.org/10.1016/0169-7552(86)90055-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tschammer, Volker. "Integrated digital networks." Computer Communications 18, no. 1 (January 1995): 61–62. http://dx.doi.org/10.1016/0140-3664(95)90081-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dinn, N., A. Weygand, and D. Garvey. "Digital interconnection of dissimilar digital networks." IEEE Communications Magazine 24, no. 4 (April 1986): 12–17. http://dx.doi.org/10.1109/mcom.1986.1093061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mossotto, Cesare. "Integrated services digital networks: Narrowband networks." European Transactions on Telecommunications 2, no. 1 (January 1991): 45–58. http://dx.doi.org/10.1002/ett.4460020107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Listanti, Marco, and Aldo Roveri. "Integrated services digital networks: Broadband networks." European Transactions on Telecommunications 2, no. 1 (January 1991): 59–74. http://dx.doi.org/10.1002/ett.4460020108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nasution, Nadya Amalia, and Umi Rojiati. "MODERASI BERAGAMA DALAM RUANG DIGITAL: GERAKAN OPINI DIGITAL #SKB3MENTERI." Tatar Pasundan : Jurnal Diklat Keagamaan 15, no. 1 (June 14, 2021): 10–19. http://dx.doi.org/10.38075/tp.v15i1.198.

Full text
Abstract:
The study examines Digital Movement of Opinion (DMO) by using hastag #SKB3Menteri hashtags on Twitter, thus forming a mobilization of digital opinion support between actors and hashtags as well as digital opinions. The research data was taken through Netlytic software ranging from February 03, 2021 to February 11, 2021. The method used is Social Network Analysis combined both quantitative and qualitative approach. Quantitatively, the study investigated 2500 samples from communication networks and tweets #SKB3Menteri as many as 3,232. Qualitatively, the researchers analyzed the text which describes social networks related to #SKB3Menteri. The results showed that #SKB3Menteri hashtag creates mobilization with a wide network system. The study also showed the hashtag was able to reach out Twitter users to giving their opinions. Keywords: Religious moderation; Twitter; SKB 3 Ministers; Digital Movement of Opinion; Social Network Analysis
APA, Harvard, Vancouver, ISO, and other styles
9

Abanga, Ellen Akongwin. "A Review of Internet of Things (IoT) and Security Concerns." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (December 30, 2022): 121–30. http://dx.doi.org/10.22624/aims/digital/v10n4p13.

Full text
Abstract:
Wireless technology networks are particularly vulnerable to security attacks. Wireless communication networks are widely used in education, defense, industry, healthcare, retail, and transportation. These systems rely on wired and cellular networks. In society and industry, wireless sensor networks, actuation networks, and vehicle networks have garnered a lot of attention. The Internet of Things has gotten a lot of research attention in recent years. The Internet of Things is regarded as the internet's future. IoT will play an important role in the future, changing our lifestyles, standards, and business structures. The use of IoT in various applications is likely to skyrocket in the next years. The Internet of Things enables billions of devices, people, and services to communicate and exchange information. IoT networks are vulnerable to several security vulnerabilities as a result of the rising use of IoT devices. It is crucial to implement effective privacy and security protocols in IoT networks to guarantee, among other things, confidentiality, authentication, access control, and integrity. This paper provides a thorough analysis of the security and privacy challenges in IoT networks. Keywords: Internet of Things, Security, Security Concerns, Attacks, Networks, Internet
APA, Harvard, Vancouver, ISO, and other styles
10

Poster, Mark. "Digital Networks and Citizenship." Publications of the Modern Language Association of America 117, no. 1 (January 2002): 98–103. http://dx.doi.org/10.1632/003081202x63546.

Full text
Abstract:
Paradoxical as it may appear, isn't it through the rights of man that transpires today—at a planetary level—the worst discriminations?—Jean Baudrillard, Les mots de passeCritical discourse today locates an antagonism between globalization and citizenship. The deepening of globalizing processes strips citizens of power, this position maintains. As economic processes become globalized, the nation-state loses its ability to protect its population. Citizens lose their ability to elect a leadership that effectively pursues their interests. When production facilities are dispersed beyond the nation, jobs are lost to foreigners, labor markets are affected by conditions in countries with diverse living standards, and capital flows, at the speed of light, to places of optimum returns. Consumption is also planetary in scope, bringing across borders alien cultural assumptions as embodied in commodities. The popular need no longer be the local. Although foreign goods are inflected with community values and easily adapted to local conditions, they remain indexes of otherness. What is more dramatic still than the changes in production and consumption, nation-states are losing their cultural coherence by dint of planetary communications systems. Much of contemporary music is global music or at least a fusion of diverse musical cultures. Satellite technology and the Internet bring all media across national boundaries as if those borders did not exist. Global processes run deep and wide, rendering problematic the figure of the citizen as a member of a national community.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Digital networks"

1

Bainbridge, Christopher James. "Digital control networks for virtual creatures." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4812.

Full text
Abstract:
Robot control systems evolved with genetic algorithms traditionally take the form of floating-point neural network models. This thesis proposes that digital control systems, such as quantised neural networks and logical networks, may also be used for the task of robot control. The inspiration for this is the observation that the dynamics of discrete networks may contain cyclic attractors which generate rhythmic behaviour, and that rhythmic behaviour underlies the central pattern generators which drive lowlevel motor activity in the biological world. To investigate this a series of experiments were carried out in a simulated physically realistic 3D world. The performance of evolved controllers was evaluated on two well known control tasks—pole balancing, and locomotion of evolved morphologies. The performance of evolved digital controllers was compared to evolved floating-point neural networks. The results show that the digital implementations are competitive with floating-point designs on both of the benchmark problems. In addition, the first reported evolution from scratch of a biped walker is presented, demonstrating that when all parameters are left open to evolutionary optimisation complex behaviour can result from simple components.
APA, Harvard, Vancouver, ISO, and other styles
2

Igumbor, Osedum Peter. "A proxy approach to protocol interoperability within digital audio networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1004852.

Full text
Abstract:
Digital audio networks are becoming the preferred solution for the interconnection of professional audio devices. Prominent amongst their advantages are: reduced noise interference, signal multiplexing, and a reduction in the number of cables connecting networked devices. In the context of professional audio, digital networks have been used to connect devices including: mixers, effects units, preamplifiers, breakout boxes, computers, monitoring controllers, and synthesizers. Such networks are governed by protocols that define the connection management rocedures, and device synchronization processes of devices that conform to the protocols. A wide range of digital audio network control protocols exist, each defining specific hardware requirements of devices that conform to them. Device parameter control is achieved by sending a protocol message that indicates the target parameter, and the action that should be performed on the parameter. Typically, a device will conform to only one protocol. By implication, only devices that conform to a specific protocol can communicate with each other, and only a controller that conforms to the protocol can control such devices. This results in the isolation of devices that conform to disparate protocols, since devices of different protocols cannot communicate with each other. This is currently a challenge in the professional music industry, particularly where digital networks are used for audio device control. This investigation seeks to resolve the issue of interoperability between professional audio devices that conform to different digital audio network protocols. This thesis proposes the use of a proxy that allows for the translation of protocol messages, as a solution to the interoperability problem. The proxy abstracts devices of one protocol in terms of another, hence allowing all the networked devices to appear as conforming to the same protocol. The proxy receives messages on behalf of the abstracted device, and then fulfills them in accordance with the protocol that the abstracted device conforms to. Any number of protocol devices can be abstracted within such a proxy. This has the added advantage of allowing a common controller to control devices that conform to the different protocols.
APA, Harvard, Vancouver, ISO, and other styles
3

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
APA, Harvard, Vancouver, ISO, and other styles
4

Abbadi, Imad Mahmoud Aref. "Digital Rights Management for Personal Networks." Thesis, Royal Holloway, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487274.

Full text
Abstract:
The thesis is concerned with Digital Rights Management (DRM), and in particular with DRM for networks of devices owned by a single individual. This thesis focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their own devices, which collectively make up what we refer to as an authorised domain. An ideal list of DRM requirements is specified, which takes into account the points of view of users, content providers and copyright law. An approach is then developed for assessing DRM systems based on the defined DRM requirements; the most widely discussed DRM schemes are then analysed and assessed, where the main focus is on schemes which address the concept of an authorised domain. Based on this analysis we isolate the issues underlying the content piracy problem, and then provide a generic framework for a DRM system addressing the identified content piracy issues. The defined generic framework has been designed to avoid the weaknesses found in other schemes. The main contributions of this thesis include developing four new approaches that can be used to implement the proposed generic framework for managing an authorised domain. The four novel solutions all involve secure means for creating, managing and using a secure domain, which consists of all devices owned by a single owner. The schemes allow secure content sharing between devices in a domain, and prevent the illegal copying of content to devices outside the domain. In addition, each solution incorporates a method for binding a domain to a single owner, ensuring that only a single consumer owns and manages a domain. This enables binding of content licences to a single owner, thereby limiting illicit content proliferation. In the first solution, domain owners are authenticated using two-factor authentication, which involves 'something the domain owner has', Le. a master control device that controls and manages consumers domains, and binds devices joining a domain to itself, and 'something the domain owner is or knows', i.e. a biometric or password/PIN authentication mechanism that is implemented by the master control device. In the second solution, domain owners are authenticated using their payment cards, building on existing electronic payment systems by ensuring that the name and the date of birth of a domain creator are the same for all devices joining a domain. In addition, this solution helps to protect consumers' privacy; unlike in existing electronic payment systems, payment card details are not exposed to third parties. The third solution involves the use of a domain-specific mobile phone and the mobil~ phone network operator to authenticate a domain owner before devices can join a domain. The fourth solution involves the use of location-based services, ensuring that devices joining a consumer domain are located in physical proximity to the addresses registered for this domain. This restricts domain membership to devices in predefined geographical locations, helping to ensure that a single consumer owns and manages each domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Gingold, David. "Integrated digital services for cable networks." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/10650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zammit, Saviour. "Digital video transmission over wireless networks." Thesis, Aston University, 1995. http://publications.aston.ac.uk/8058/.

Full text
Abstract:
The advent of the Integrated Services Digital Network (ISDN) led to the standardisation of the first video codecs for interpersonal video communications, followed closely by the development of standards for the compression, storage and distribution of digital video in the PC environment, mainly targeted at CD-ROM storage. At the same time the second-generation digital wireless networks, and the third-generation networks being developed, have enough bandwidth to support digital video services. The radio propagation medium is a difficult environment in which to deploy low bit error rate, real time services such as video. The video coding standards designed for ISDN and storage applications, were targeted at low bit error rate levels, orders of magnitude lower than the typical bit error rates experienced on wireless networks. This thesis is concerned with the transmission of digital, compressed video over wireless networks. It investigates the behaviour of motion compensated, hybrid interframe DPCM/DCT video coding algorithms, which form the basis of current coding algorithms, in the presence of high bit error rates commonly found on digital wireless networks. A group of video codecs, based on the ITU-T H.261 standard, are developed which are robust to the burst errors experienced on radio channels. The radio link is simulated at low level, to generate typical error files that closely model real world situations, in a Rayleigh fading environment perturbed by co-channel interference, and on frequency selective channels which introduce inter symbol interference. Typical anti-multipath techniques, such as antenna diversity, are deployed to mitigate the effects of the channel. Link layer error control techniques are also investigated.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Ping Tate Stephen R. "Direct online/offline digital signatures schemes." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kouhbor, Shahnaz University of Ballarat. "Optimal number and placement of network infrastructure in wireless networks." University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12762.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
9

Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks." Thesis, University of Ballarat, 2007. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/65892.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
10

Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks." University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14597.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital networks"

1

Bohlman, K. J. Digital cable networks. Edited by Breeds John. Lincoln: Cable Television and Telephony Training Services, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Digital neural networks. Englewood Cliffs, N.J: PTR Prentice Hall, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kung, S. Y. Digital neural networks. [Piscataway, NJ]: Institute of Electrical andElectronics Engineers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Digital broadband networks & services. New York: McGraw-Hill, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Integrated services digital networks. Dedham, MA: Artech House, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tomkos, Ioannis, Maria Spyropoulou, Karin Ennser, Martin Köhn, and Branko Mikac, eds. Towards Digital Optical Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01524-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beutler, Roland. Digital Terrestrial Broadcasting Networks. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-09635-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

1949-, Pujolle G., ed. Integrated digital communications networks. Chichester: Wiley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Computer networks. Amsterdam: Elsevier, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ho, Kim Seng Peter. Bridging local area networks with integrated services digital network. Salford: University of Salford, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Digital networks"

1

McDonald, John C. "Digital Networks." In Fundamentals of Digital Switching, 387–427. Boston, MA: Springer US, 1990. http://dx.doi.org/10.1007/978-1-4684-9880-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Edward A., and David G. Messerschmitt. "Integrated Networks." In Digital Communication, 681–90. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-1303-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Edward A., Robert Gallager, and David G. Messerschmitt. "Integrated Networks." In Digital Communication, 681–90. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4684-0044-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yiannoudes, Socrates. "Networks." In Architecture in Digital Culture, 51–88. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003241287-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wosinska, Len, Didier Colle, Piet Demeester, Kostas Katrinis, Marko Lackovic, Ozren Lapcevic, Ilse Lievens, et al. "Network Resilience in Future Optical Networks." In Towards Digital Optical Networks, 253–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01524-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ahamed, Syed V., and Victor B. Lawrence. "Current Digital Networks." In Design and Engineering of Intelligent Communication Systems, 85–122. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6291-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, David R. "Digital Transmission Networks." In Digital Transmission Systems, 745–98. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4419-8933-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shekhar, Shashi, and Hui Xiong. "Digital Road Networks." In Encyclopedia of GIS, 240. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Giambene, Giovanni. "Legacy Digital Networks." In Queuing Theory and Telecommunications, 61–127. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-1-4614-4084-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bizer, Johann, and Anja Miedbrodt. "US-American Legislation on Digital Signatures." In Networks, 129–37. Heidelberg: Physica-Verlag HD, 2002. http://dx.doi.org/10.1007/978-3-642-57476-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital networks"

1

Eriksson, Tobias A., Antonio Napoli, Warren Sande, Henrik Ahlfeldt, Amir Rashidinejad, Magnus Olson, and Dave Welch. "Point-to-Multipoint Networks Enabled by Digital Subcarrier Multiplexing." In Photonic Networks and Devices. Washington, D.C.: Optica Publishing Group, 2022. http://dx.doi.org/10.1364/networks.2022.nem4e.1.

Full text
Abstract:
The opportunities opened up in optical communication networks by flexibly routed digital subcarriers, enabling point-to-multipoint operation, are discussed. The advantages that this technology can bring in different network scenarios are exemplified.
APA, Harvard, Vancouver, ISO, and other styles
2

Green, Phil J. "Digital graphic networks." In Electronic Imaging '99, edited by Giordano B. Beretta and Reiner Eschbach. SPIE, 1998. http://dx.doi.org/10.1117/12.334555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cox, Mitch, Ling Cheng, and Andrew Forbes. "Bridging the digital divide: a South African perspective." In Photonic Networks and Devices. Washington, D.C.: OSA, 2018. http://dx.doi.org/10.1364/networks.2018.new2f.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Geisler, D. J., T. M. Yarnall, C. M. Schieler, G. Lund, M. L. Stevens, B. S. Robinson, and S. A. Hamilton. "Ground Receiver Architectures Enabled by Digital Coherent Combining." In Photonic Networks and Devices. Washington, D.C.: OSA, 2018. http://dx.doi.org/10.1364/networks.2018.new4f.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hietanen, Herkko. "Networked Digital Video Recorders and Social Networks." In 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Plant, David V. "The Evolution of Digital Signal Processing for Optical Interconnects." In Photonic Networks and Devices. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/networks.2016.nem2b.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hammerstrom, Dan. "Digital electronic neural networks." In Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.171196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bradley, Thomas, Amado M. Velázquez-Benítez, Sjoerd van der Heide, Menno van den Hout, Vincent van Vliet, Marianne Bigot-Astruc, Adrian Amezcua Correa, Pierre Sillard, Peter Winzer, and Chigo Okonkwo. "Off-axis digital holography for analysis of fibre tapping of few mode fibres." In Photonic Networks and Devices. Washington, D.C.: Optica Publishing Group, 2022. http://dx.doi.org/10.1364/networks.2022.neth2c.3.

Full text
Abstract:
Off-axis digital holography is used to analyse the impact of fibre tapping in few mode fibres. Mode dependent loss and cross talk are analysed under fibre tapping with a measured MDL increase of 2.5 dB.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Edward. "Network performance in managed networks." In 2011 50th FITCE Congress - "ICT: Bridging an Ever Shifting Digital Divide" (FITCE). IEEE, 2011. http://dx.doi.org/10.1109/fitce.2011.6133441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schmogrow, R., P. C. Schindler, W. Freude, and J. Leuthold. "Digital Pulse-Shaping for Spectrally Efficient and Flexible Coherent Optical Networks." In Photonic Networks and Devices. Washington, D.C.: OSA, 2014. http://dx.doi.org/10.1364/networks.2014.nm4d.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Digital networks"

1

Lanzisera, Steven, and Richard Brown. Energy Efficient Digital Networks. Office of Scientific and Technical Information (OSTI), January 2013. http://dx.doi.org/10.2172/1171532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pinchuk, Olga P., Oleksandra M. Sokolyuk, Oleksandr Yu Burov, and Mariya P. Shyshkina. Digital transformation of learning environment: aspect of cognitive activity of students. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3243.

Full text
Abstract:
Peculiar features of digital environment include: integration of ICTs; use of local and global networks and resources; support and development of qualitatively new technologies of information processing; active use of modern means, methods and forms of teaching in the educational process. The organization of activities in terms of digital learning environment provides appropriate changes in the interaction between subjects of the educational process. Today, means and technologies of the information and communication networks (ICNs), in particular the Internet, which custom and operational-procedural properties were changed at the initial stage from closed local to open ones at present, become widespread. The development of ICNs (from closed local to open ones) changes the typology of learning environments. The following models of learning environments, which widely use ICT and ICN tools (with basic features that characterize them) are distinguished: using the local communication network for presentation of educational information; using the local communication network and open network resources; using open network resources; for independent use of open network resources directly in the classroom by a student; for use of open network resources by a student in the process of independent learning activity; for use by a student educational resources, specially created by a teacher, as well as resources of an open networks in his independent learning activity.
APA, Harvard, Vancouver, ISO, and other styles
3

Lyons, J. A. Canadian digital telemetered seismic networks central acquisition system version 4.1. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1988. http://dx.doi.org/10.4095/315285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hofer, Michael, Guillermo Sapiro, and Johannes Wallner. Fair Polyline Networks for Constrained Smoothing of Digital Terrain Elevation Data. Fort Belvoir, VA: Defense Technical Information Center, August 2005. http://dx.doi.org/10.21236/ada517675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Housholder, Steacy W. The Application of Artificial Neural Networks to Object Direction In Digital Images,. Fort Belvoir, VA: Defense Technical Information Center, August 1995. http://dx.doi.org/10.21236/ada298528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barbie, Alexander. ARCHES Digital Twin Framework. GEOMAR, December 2022. http://dx.doi.org/10.3289/sw_arches_core_1.0.0.

Full text
Abstract:
In the Helmholtz Future Project ARCHES (Autonomous Robotic Networks to Help Modern Societies) with a consortium of partners from AWI (Alfred- Wegener-Institute Helmholtz Centre for Polar and Marine Research), DLR (German Aerospace Center), KIT (Karlsruhe Institute of Technology), and the GEOMAR (Helmholtz Centre for Ocean Research Kiel), several Digital Twins of ocean observation systems were developed by the GEOMAR and AWI. The ARCHES Digital Twin Framework is one of the results of this project. The software is based on the Robot Operating System (ROS) and is written in Python.
APA, Harvard, Vancouver, ISO, and other styles
7

Upadhyaya, B. R., and W. Yan. Hybrid digital signal processing and neural networks for automated diagnostics using NDE methods. Office of Scientific and Technical Information (OSTI), November 1993. http://dx.doi.org/10.2172/10108326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Linyu, Joomyung Lee, Bikash Poudel, Timothy McJunkin, Nam Dinh, and Vivek Agarwal. Enhancing the Operational Resilience of Advanced Reactors with Digital Twins by Recurrent Neural Networks. Office of Scientific and Technical Information (OSTI), October 2021. http://dx.doi.org/10.2172/1835892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emelyanov, I. I., and N. N. Ziyatdinov. Interface of computer-aided design of heat exchange networks based on digital models «HEN-Design». OFERNIO, December 2020. http://dx.doi.org/10.12731/ofernio.2020.24737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography