To see the other types of publications on this topic, follow the link: Intranets (Computer networks).

Journal articles on the topic 'Intranets (Computer networks)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Intranets (Computer networks).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Regli, W. "Intranets." IEEE Internet Computing 1, no. 5 (September 1997): 6–7. http://dx.doi.org/10.1109/mic.1997.623962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Safiyanu, Adam Musa, Ogah Muhammad Usman, and Yakubu Awal Jibrin. "Exploring the Landscape of Computer Networking: An In-Depth Survey." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (September 30, 2023): 187–92. http://dx.doi.org/10.22214/ijraset.2023.55599.

Full text
Abstract:
Abstract: Computer networks have become ubiquitous and now serve as sophisticated systems for sharing digital information. They play a crucial role in analysing, organizing, and distributing vital data for business profitability. Notably, the advent of intranets and internets, which are private networks built on internet technology, is reshaping the business landscape. The rapid adoption of intranets is driven by their ability to enhance information management and dissemination, ensuring that businesses stay competitive. In this article, we introduce fundamental networking concepts
APA, Harvard, Vancouver, ISO, and other styles
3

Lichtenstein, Sharman, Craig M. Parker, and Alexia Hunter. "Dynamic Knowledge Integration in Socio-Technical Networks: An Interpretive Study of Intranet Use for Knowledge Integration." Journal of Information & Knowledge Management 06, no. 02 (June 2007): 91–103. http://dx.doi.org/10.1142/s021964920700172x.

Full text
Abstract:
A major challenge facing firms competing in electronic business markets is the dynamic integration of knowledge within and beyond the firm, enabled by internet-based infrastructure and emergent fluid socio-technical networks. This paper explores how social actors dynamically employ intranets to integrate formal and informal knowledge within evolving socio-technical networks that emerge, permeate and extend beyond the organisational boundary. The paper presents two case studies that illustrate how static intranets can be useful for dynamically integrating knowledge when they are interwoven with other knowledge channels such as e-mail through which flows the informal knowledge needed to make sense of and situate formal organisational knowledge. The findings suggest that businesses should carefully examine how employees integrate intranets with other channels in their work, and the shaping of knowledge outcomes that flows from such use. There are practical implications for the proper skilling of the people who share and integrate knowledge in this way. The paper also provides a framework for dynamic knowledge integration in socio-technical networks, which can help underpin future research in this area.
APA, Harvard, Vancouver, ISO, and other styles
4

Chellappa, Ramnath K., and Alok Gupta. "Managing computing resources in active intranets." International Journal of Network Management 12, no. 2 (2002): 117–28. http://dx.doi.org/10.1002/nem.427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McCracken, D. "Review: Intranets: The Surf Within." Computer Bulletin 40, no. 1 (January 1, 1998): 31. http://dx.doi.org/10.1093/combul/40.1.31-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ashley, P., M. Vandenwauver, and F. Siebenlist. "Applying authorization to intranets: architectures, issues and APIs." Computer Communications 23, no. 17 (November 2000): 1613–20. http://dx.doi.org/10.1016/s0140-3664(00)00247-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Phaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets." EDPACS 27, no. 12 (June 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dixit, Keerti. "Identification of Network Vulnerabilities through IISRA Framework." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 4426–38. http://dx.doi.org/10.22214/ijraset.2023.52554.

Full text
Abstract:
Abstract: As the globe transitions to complicated networks and as we move towards digitization, its worth is rising daily. Working in an organization across a network and the internet creates vulnerabilities. As is well known, data is a crucial component of every organization and must be safeguarded from threats. The attackers' job is to try and take advantage of the networks by using these weaknesses. When organizations use the Internet, intranets, and related technologies more frequently, system security becomes one of the key considerations. Network security protects computer systems from unauthorized threats and breaches, which lowers the likelihood that confidential information may be stolen. The organization will feel more secure if these vulnerabilities are closed up in the systems and network well in advance of an attack. The availability of numerous technologies for network vulnerability assessment enables organizations to thwart potential attacks. In this research paper, we have developed an Integrated Information Security Risk Assessment (IISRA) Framework for identification of Network Vulnerabilities. We have implemented this IISRA Framework on real computing environment of an organization.
APA, Harvard, Vancouver, ISO, and other styles
9

Elmorshidy, Ahmed. "Determinates of Live Support Chat in Organizational Intranets." Journal of Electronic Commerce in Organizations 17, no. 3 (July 2019): 16–34. http://dx.doi.org/10.4018/jeco.2019070102.

Full text
Abstract:
Live support chat (LSC) is a relatively new type of online customer support that is growing significantly in e-commerce websites. LSC bypasses the traditional types of customer support like phone, e-mail and web forms and it provides instant answers to customers' questions and concerns. Few researchers have empirically examined the factors affecting LSC at the individual level, however there is no evidence of research that explored the determinates of LSC in an organizational context and how it affects employees. This study attempts to fill this research gap by empirically examining the factors that affect LSC in the context of the organizational Intranets. Survey data from 389 employees at private and public organizations in Kuwait were collected to test the study hypotheses. The study findings have important implications at both the theoretical and practice levels.
APA, Harvard, Vancouver, ISO, and other styles
10

Wilson, Tom. "Mastering intranets: The windows 95/NT edition." International Journal of Information Management 17, no. 6 (December 1997): 469–70. http://dx.doi.org/10.1016/s0268-4012(97)84382-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lamb, Roberta, and Elizabeth Davidson. "Understanding intranets in the context of end-user computing." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 64–85. http://dx.doi.org/10.1145/1047070.1047076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Vukatana, Kreshnik, Elira Hoxha, and Kozeta Sevrani. "Knowledge Transfer through Computer-based Systems in Manufacturing Networks: A Study on Albanian Plants." Academic Journal of Interdisciplinary Studies 11, no. 1 (January 3, 2022): 180. http://dx.doi.org/10.36941/ajis-2022-0016.

Full text
Abstract:
This study shows a general view about knowledge transfer between manufacturing plants in developing countries like Albania, which are part of multinational companies’ network (MCN). Part of this goal is the study of computer-based systems from conference calls and intranets to more advanced ones like data warehouses, management information systems (MIS) and executive information systems (EIS), as enablers of knowledge flow and absorptive capacity. The paper examines four case studies based on semi-structured interviews, where the data collected highlight a good coverage of computer-based systems in function of knowledge sharing. In half of the cases, this is done internally in the plant and not over the network of plants. We propose to upgrade where possible the systems used in a distributed way to have data and information connections across the network. In some cases, emerge barriers such as lack of time, lack of tolerance for errors, or the need for assistance. Conclusions show that staff training related to computer-based systems in the optics of knowledge enablers is important for the companies, while the incentives are not considered as a key factor for knowledge transfer. Received: 15 July 2021 / Accepted: 23 September 2021 / Published: 3 January 2022
APA, Harvard, Vancouver, ISO, and other styles
13

Mahmood, Shahid, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz, and Murad Khan. "Digital Certificate Verification Scheme for Smart Grid using Fog Computing (FONICA)." Sustainability 13, no. 5 (February 26, 2021): 2549. http://dx.doi.org/10.3390/su13052549.

Full text
Abstract:
Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.
APA, Harvard, Vancouver, ISO, and other styles
14

Sinickas, Angela D. "The Role of Intranets and Other E-Channels in Employee Communication Preferences." Journal of Website Promotion 1, no. 1 (April 18, 2005): 31–51. http://dx.doi.org/10.1300/j238v01n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Et. al., Tarun Dhar Diwan,. "AN INVESTIGATION AND ANALYSIS OF CYBER SECURITY INFORMATION SYSTEMS: LATEST TRENDS AND FUTURE SUGGESTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 25, 2021): 477–92. http://dx.doi.org/10.17762/itii.v9i2.372.

Full text
Abstract:
Network protection includes of the strategies and procedures implemented in this paper to avoid and monitor intrusion attempts, infringement, manipulation or violation of a computer system and services accessed by the network. Network protection applies to the different countermeasures put in place to secure or flow through the network and data collected on or through it. Protection for web applications is the method of securing websites and internet resources from multiple security attacks that target weaknesses in an application. Security for web apps is a data management division that primarily deals with the security of websites, web applications and web services. Risks to cyber security include a broad range of allegedly criminal practices on the web. For years, computer security risks against utility assets were identified, cyber-attacks arising from the exploitation of data device weaknesses by unauthorized access users This study is a cyber infrastructure assault, vulnerability and vulnerabilities, including hardware and software devices, networks, business networks, intranets, and cyber intrusion usage. Only big organisations are at risk of cyber-attacks, a widespread misunderstanding. Even then, the targeting of small and medium sized enterprises has seen a large improvement. This is since less-sophisticated cyber defence mechanisms appear to be used by these smaller organisations. As many as 50% of all cyber-attacks hit small companies, wasting $200,000 on average, sufficient to get out of business for less-established entities. an enterprise-grade protection device and awareness of the various forms of cyber threats facing corporations in 2025 to safeguard company from hacking attacks. fight cyber threats successfully and decrease the exposure of enterprise.
APA, Harvard, Vancouver, ISO, and other styles
16

Sun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.

Full text
Abstract:
In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhou, Xujuan, Raj Gururajan, Yuefeng Li, Revathi Venkataraman, Xiaohui Tao, Ghazal Bargshady, Prabal D. Barua, and Srinivas Kondalsamy-Chennakesavan. "A survey on text classification and its applications." Web Intelligence 18, no. 3 (September 30, 2020): 205–16. http://dx.doi.org/10.3233/web-200442.

Full text
Abstract:
Text classification (a.k.a text categorisation) is an effective and efficient technology for information organisation and management. With the explosion of information resources on the Web and corporate intranets continues to increase, it has being become more and more important and has attracted wide attention from many different research fields. In the literature, many feature selection methods and classification algorithms have been proposed. It also has important applications in the real world. However, the dramatic increase in the availability of massive text data from various sources is creating a number of issues and challenges for text classification such as scalability issues. The purpose of this report is to give an overview of existing text classification technologies for building more reliable text classification applications, to propose a research direction for addressing the challenging problems in text mining.
APA, Harvard, Vancouver, ISO, and other styles
18

Gunawan, Arief. "LAYANAN PENELUSURAN KOLEKSI PERPUSTAKAAN MELALUI JARINGAN INTRANET DI PUSAT RISET PERIKANAN." Jurnal Pari 5, no. 2 (February 26, 2020): 105. http://dx.doi.org/10.15578/jp.v5i2.8773.

Full text
Abstract:
ABSTRAK:Penelusuran koleksi merupakan salah satu layanan perpustakaan yang langsung berhubungandengan pemustaka. Dengan berkembangnya teknologi informasi dan komputer, penyebaraninformasi dapat dilakukan melalui media jaringan komputer (intranet) yang bisa diakses khusushanya di lingkup kantor Pusat Riset Perikanan (Pusriskan). Semua komputer/laptop yang terhubungke jaringan hotspot Pusriskan bisa melakukan pencarian koleksi perpustakaan melalui komputer/laptop masing-masing pemustaka. Kemudahan mendapatkan informasi koleksi bagi pemustakadiharapkan dapat menarik minat yang lebih untuk datang ke perpustakaan dan merasakan manfaatdari layanan yang disediakan oleh pustakawan dengan memanfaatkan teknologi informasi dankomunikasi sesuai amanat undang-undang perpustakaanABSTRACT:Searching for collections is one of the library services that is directly related to users. With the development of information technology and computers, the dissemination of information can bedone through computer network media (intranets) that can be accessed specifically only in the scope of the Research Center for Fisheries (RCF). All computers/notebook connected to the RCFhotspot network can search library collections through each user’s computer/notebook. The easeof obtaining collection information for visitors is expected to attract more interest to come to thelibrary and feel the benefits of the services provided by librarians by utilizing information andcommunication technology according to the mandate of the library law.
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Rongxia, Zhifang Liu, Shufeng Yang, and Jianxing Wang. "Implementation of Driving Safety Early Warning System Based on Trajectory Prediction on the Internet of Vehicles Environment." Security and Communication Networks 2022 (May 19, 2022): 1–6. http://dx.doi.org/10.1155/2022/2922507.

Full text
Abstract:
Traffic accidents cause a large number of casualties and economic losses every year. The primary causes of traffic accidents are the inadvertent response and inappropriate disposal of drivers. The Internet of Vehicles system is a large network based on intranets, the Internet, and mobile Internet. It performs wireless communication and information exchange between vehicles and roadways in accordance with the agreed-upon communication protocol and data exchange standards. It provides technical assistance in the implementation of vehicle hazard detection and opens up new avenues for safety early warning. In this study, a driving safety early warning system is proposed based on trajectory prediction on the Internet of Vehicles environment. After analyzing the system requirements, the driving safety system based on trajectory prediction is designed according to the demand analysis and tested. The trajectory prediction error is detected, and the collected trajectory is predicted. Data are divided into 3 groups, and to validate the performance of the system, the experiment is repeated five times. The test results show that the trajectory prediction accuracy of the trajectory prediction system designed is 89.4%, as compared to the accuracy of existing driving safety early warning systems, most of which are concentrated at accuracy lower than 89%. The proposed early warning method has the potential to reduce vehicle collisions and road traffic accidents.
APA, Harvard, Vancouver, ISO, and other styles
20

Case, Gary N., Mladen A. Vouk, and John M. Mackenzie. "Real-Time Full Motion Stereo Microscopy Over Internet." Microscopy and Microanalysis 5, S2 (August 1999): 368–69. http://dx.doi.org/10.1017/s1431927600015166.

Full text
Abstract:
One of the problems with remote imaging which purports to represent the real world (Tele-presence) is that the images are two-dimensional and the “real” world is three dimensional. When viewing many objects, the lack of depth perceptiorican be a serious deficiency. For example, one would want a micro-surgeon to have a good idea how deep to cut into tissue during a tele-presence operation. There is a wealth of three dimensional information in light, SEM, AFM, confocal, and computer reconstructed or simulated objects. To transfer that information faithfully over the networks using broadcast quality high definition video transmission technologies such as MPEG2 may require as much as 20 Mbps per channel. Furthermore, stereo imaging is particularly sensitive to any phase delays and jitter between the two eye channels. Control of these parameters requires advance quality of service features that current internet does not provide, but that may be available on high-performance intranets. All this may present a problem for routine use of the stereo facility .The next generation of Internet, however, will be able to routinely provision much higher bandwidth and other quality of service, in general through protocols that will allow for not only full screen full resolution television but also the use of two channels (left and right) that can stay in fairly close synchrony.
APA, Harvard, Vancouver, ISO, and other styles
21

Rodianto and Ahmad Juliansyah. "ANALISIS DAN PERANCANGAN JARINGAN KOMPUTER UNTUK IMPLEMENTASI SISTEM INFORMASI PADA WINDOWS SERVER 2016 MENGGUNAKAN INTERNET DAN INTRANET DI UNIVERSITAS TEKNOLOGI SUMBAWA." Jurnal Informatika, Teknologi dan Sains 1, no. 2 (November 29, 2019): 104–10. http://dx.doi.org/10.51401/jinteks.v1i2.415.

Full text
Abstract:
Internet and intranet network is a facility used to support the educational process, especially the process of learning. Sumbawa University of Technology (UTS) is one of the private universities in Sumbawa, West Nusa Tenggara Province. The server is a device owned by the campus data center to support the performance of the academic community in the implementation of information systems. In addition, the UTS is currently still reviewing the development of wired and wireless networks to support the implementation of the procurement system with other information technology equipment. This study aimed to analyze and design computer networks for the implementation of the system on windows server 2016 using the internet and intranet Case Studies University of Technology Sumbawa. The method used for the development of a network that is Prepare, Plan, Design, Implement, Operate, Optimize (PPDIOO). Successful testing implementation conducted through Implement information systems. Instrument data collection techniques in this study using literature study, observation, and interviews. The end result of this research is on the server computer information systems can be run via the internet and intranet useful to support the performance of the academic community of the university.
APA, Harvard, Vancouver, ISO, and other styles
22

Japriadi, Yohanes Setiawan, and Lukas Tommy. "PROTOTIPE APLIKASI UJIAN CODING PHP BERBASIS WEB INTRANET DI STMIK ATMA LUHUR." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (July 27, 2019): 73–80. http://dx.doi.org/10.33480/jitk.v5i1.681.

Full text
Abstract:
Modernization causes the examination process in some educational institutions that are usually done conventionally now start to change to CBT (Computer Based Test). At STMIK Atma Luhur, CBT in the form of a coding test carried out on a computer laboratory was felt to be not effective enough due to a short correction time, as well as the possibility of lossing the students work due to sudden power failure. Collection of jobs using an LAN (Local Area Network) intranet network can not be realized due to the difficult network configuration and requires not a small cost. One solution that can be offered in overcoming the above problem is to create a web-based exam application that is connected to a Wireless Local Area Network (WLAN) intranet network. The system development model and tools used in this study are prototype models and UML (Unified Modeling Language). The proposed application is effective in facilitating and accelerating the process of collecting student answer files from several client computers to a server computer. In addition, the usage of the proposed application allows the lecturer not to correct students' answers in a hurry, so that the scores that are truly objective and can be accounted for are obtained.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Xiao. "Intranet Web System, a Simple Solution to Companywide Information-on-demand." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 404–5. http://dx.doi.org/10.1017/s0424820100164489.

Full text
Abstract:
Intranet, a private corporate network that mirrors the internet Web structure, is the new internal communication technology being embraced by more than 50% of large US companies. Within the intranet, computers using Web-server software store and manage documents built on the Web’s hypertext markup language (HTML) format. This emerging technology allows disparate computer systems within companies to “speak” to one another using the Internet’s TCP/IP protocol. A “fire wall” allows internal users Internet access, but denies external intruders intranet access. As industrial microscopists, how can we take advantage of this new technology? This paper is a preliminary summary of our recent progress in building an intranet Web system among GE microscopy labs. Applications and future development are also discussed.The intranet Web system is an inexpensive yet powerful alternative to other forms of internal communication. It can greatly improve communications, unlock hidden information, and transform an organization. The intranet microscopy Web system was built on the existing GE corporate-wide Ethernet link running Internet’s TCP/IP protocol (Fig. 1). Netscape Navigator was selected as the Web browser. Web’s HTML documentation was generated by using Microsoft® Internet Assistant software. Each microscopy lab has its own home page. The microscopy Web system is also an integrated part of GE Plastics analytical technology Web system.
APA, Harvard, Vancouver, ISO, and other styles
24

Xian Zhang, Xian Zhang, Pengju Tang Xian Zhang, Dong Yin Pengju Tang, Taiguo Qu Dong Yin, and Yiwen Liu Taiguo Qu. "The Network Model of Internet Access Intranet Based on Embedded Platform." 網際網路技術學刊 23, no. 2 (March 2022): 201–8. http://dx.doi.org/10.53106/160792642022032302001.

Full text
Abstract:
<p>To better manage and control the embedded devices located in the remote Intranet, the functional requirements of the Internet accessing the Intranet need to be effectively solved. This paper studies and implements a network model of external network accessing intranet network and realizes the network model’s function by programming. At the same time, an experimental platform is built to test the performance metrics of the network model, such as the maximum load and CPU utilization, device connection success rate, user access response time, and other performance parameters. The test results show that the network model can meet the network scale of at least 3000 intranet devices and has high practical value and application prospects.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
25

Ahmed Ali, Adel, and Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies." Sultan Qaboos University Journal for Science [SQUJS] 5 (December 1, 2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.

Full text
Abstract:
Converged networking is an emerging technology thrust that integrates voice, video, and data traffic on a single network. Converged networking encompasses several aspects, all of which are related to the aggregation of networking activity. Such aspects include, Payload convergence, Protocol convergence, Physical convergence, Device convergence, Application convergence, Technology convergence, etc. In recent years the Internet has developed into a global data network that is highly accepted as a multimedia information platform, which has the potential to develop into an alternative carrier network in the future. Several convergence scenarios have been recently proposed, ranging from integrating communication services and computer application into two separate networks, to building a seamless multimedia network, which converges the Central Office based network and the Internet in a single network, thereby enabling telecommunications operators and service provider's tremendous investment in existing network infrastructure to be fully utilized. This paper offers introduction and review of the networking technologies. The paper presents the existing multiple networks into two infrastructures: an ATM/Frame Relay (Ethernet)- based corporate network with integrated voice, video, and data traffic and an Internet-based network for secure intranet, extranet and remote access. This work is aimed at summarizing the internetworking basics and technologies which are essential for the emerging converged networking systems. The specific areas addressed here are networking basics, networking technologies, types of traffic, and convergence of computer and communication networks.
APA, Harvard, Vancouver, ISO, and other styles
26

Rosid, Usep Abdul. "Penerapan Aplikasi Web Upload Download menggunakan PHP pada Laboratorium Komputer LP3I Tasikmalaya." Jurnal Sistem Informasi Galuh 1, no. 1 (January 11, 2023): 8–14. http://dx.doi.org/10.25157/jsig.v1i1.2916.

Full text
Abstract:
The web application is an application that can accessed using either a web browser via internet or intranet network. The web application gives it easy for user to access data on the server computer. Especially in access data with uploading or downloading files. Easy in accessing data using web applications, especially uploading and downloading files is expeted by an institution or agency. As in LP3I Tasikmalaya, especially in the computer laboratories. The upload download web application is different with sharing files on the computer default. Upload download web application implemented using the intranet and PHP programming language can help LP3I Tasikmalaya especially in the computer laboratories that became another way to access data from a server computer to client computer or otherwise.
APA, Harvard, Vancouver, ISO, and other styles
27

Retnowati, Nurcahyani Dewi, and Mahmuda Ghazni Rahmawan. "ANIMASI E-LEARNING PEMBELAJARAN MATEMATIKA DAN FISIKA BAGI SISWA SEKOLAH MENENGAH PERTAMA KELAS 1." Angkasa: Jurnal Ilmiah Bidang Teknologi 8, no. 2 (August 25, 2017): 139. http://dx.doi.org/10.28989/angkasa.v8i2.127.

Full text
Abstract:
Learning through the use of animation E-Learning can be a learning tool to teach using electronic applications, media, Internet, Intranet or other computer network media. In addition to computers and Internet networks, which play a role in e-learning is the brainware that is creating content (text, images, video, animation) and user/users of e-learning (teachers and students). It should be noted in making animated e-learning is the content that should be included in accordance with the curriculum that is used by the school to be used for teaching and learning in schools. Making animated blueprint of learning by using characters then do modeling and animation. The subjects used in this study animation is Mathematics and Physics. Software used in the manufacture of learning applications that 3ds Max 2010, Adobe Premiere Pro CC, Adobe After Effects. The analysis tested the effectiveness of learning communication using questionnaire and calculation using a Likert scale that shows the percentage of 69.83%, the analysis proves that by using an animated e-learning teaching and learning activities in the classroom more effectively.
APA, Harvard, Vancouver, ISO, and other styles
28

Liharja, Yosua, Ani Oktarini Sari, and Arief Satriansyah. "Rancang Bangun Sistem Informasi Helpdesk IT Support Berbasis Website." Infotek : Jurnal Informatika dan Teknologi 5, no. 1 (January 31, 2022): 157–66. http://dx.doi.org/10.29408/jit.v5i1.4738.

Full text
Abstract:
The speed of providing services from the IT support department in helping to handle problems related to computer devices or internet or intranet networks in a company is very important in supporting work effectiveness. PT Markindo Rekateknik is a company engaged in marking machines, coding printers and packaging machines. Handling requests for network access or repairing computer equipment is still done manually and this process takes a long time because it needs to get approval from the leadership. This of course can cause problems in the form of missing data reports, difficulty in searching data, and the risk of data loss. And in terms of monitoring access requests and computer and network equipment problems that are often complained of in 1 month, they are not recorded properly, making it difficult for the evaluation process of these obstacles. For this reason, we need a helpdesk system for the IT Support section that is computerized and can be accessed anywhere with an internet connection, so that existing problems can be resolved properly. And the process of monitoring and reporting on access requests and computer and network equipment constraints from submitted complaints can be monitored properly and can be evaluated to find the right solution
APA, Harvard, Vancouver, ISO, and other styles
29

Hu, Teng, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, and Yuan Liu. "An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning." Security and Communication Networks 2019 (February 17, 2019): 1–12. http://dx.doi.org/10.1155/2019/3898951.

Full text
Abstract:
In the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Anyone using the intranet computer may access content that he does not have permission to access. For an insider attacker, it is relatively easy to steal a colleague’s password or use an unattended computer to launch an attack. A common one-time user authentication method may not work in this situation. In this paper, we propose a user authentication method based on mouse biobehavioral characteristics and deep learning, which can accurately and efficiently perform continuous identity authentication on current computer users, thus to address insider threats. We used an open-source dataset with ten users to carry out experiments, and the experimental results demonstrated the effectiveness of the approach. This approach can complete a user authentication task approximately every 7 seconds, with a false acceptance rate of 2.94% and a false rejection rate of 2.28%.
APA, Harvard, Vancouver, ISO, and other styles
30

Siegel, Carolyn F. "Using Computer Networks (Intranet and Internet) to Enhance Your Students' Marketing Skills." Journal of Marketing Education 18, no. 3 (December 1996): 14–24. http://dx.doi.org/10.1177/027347539601800303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Roşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Full text
Abstract:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).
APA, Harvard, Vancouver, ISO, and other styles
32

Ar Ruhimat, Qurrota A'yuni, Slamin Slamin, and Alvira Malinda. "Efektivitas Algoritma Kruskal dalam Mengoptimalkan Jalur Terpendek pada Jaringan Intranet." JSN : Jurnal Sains Natural 2, no. 3 (June 24, 2024): 59–67. http://dx.doi.org/10.35746/jsn.v2i3.546.

Full text
Abstract:
This research takes a case study at the Communication and Information Service, Bondowoso Regency, which is one of the media for conveying information and connecting interactive communication between the government and the community. In the process of conveying information to the public, they utilize information technology, the Intranet Network. The problem found was that there were obstacles in ineffective cable installation. This relates to non-optimality in determining the shortest path between two points in an intranet network, and how to determine the correct wiring position, so that the amount used is minimal but can still function optimally and be connected to all computers. To overcome the problems above, in this research the Kruskal Algorithm will be applied which is one of the network optimization methods in Graph Theory. Graph Theory is one of fields in Mathematics that studies the relationships between objects and how these objects interact with each other. Meanwhile, the Kruskal algorithm is an algorithm used to find the shortest path between two points in a graph. It is hoped that this research can optimize the amount of cabling used in designing intranet network topologies so that we can design optimal intranet routes with minimal costs.
APA, Harvard, Vancouver, ISO, and other styles
33

Yenke, B. O., J. Mehaut, and M. Tchuente. "Scheduling of Computing Services on Intranet Networks." IEEE Transactions on Services Computing 4, no. 3 (July 2011): 207–15. http://dx.doi.org/10.1109/tsc.2011.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Marchevsky, Alberto M., Ronda Dulbandzhyan, Kevin Seely, Steve Carey, and Raymond G. Duncan. "Storage and Distribution of Pathology Digital Images Using Integrated Web-Based Viewing Systems." Archives of Pathology & Laboratory Medicine 126, no. 5 (May 1, 2002): 533–39. http://dx.doi.org/10.5858/2002-126-0533-sadopd.

Full text
Abstract:
Abstract Context.—Health care providers have expressed increasing interest in incorporating digital images of gross pathology specimens and photomicrographs in routine pathology reports. Objective.—To describe the multiple technical and logistical challenges involved in the integration of the various components needed for the development of a system for integrated Web-based viewing, storage, and distribution of digital images in a large health system. Design.—An Oracle version 8.1.6 database was developed to store, index, and deploy pathology digital photographs via our Intranet. The database allows for retrieval of images by patient demographics or by SNOMED code information. Setting.—The Intranet of a large health system accessible from multiple computers located within the medical center and at distant private physician offices. Results.—The images can be viewed using any of the workstations of the health system that have authorized access to our Intranet, using a standard browser or a browser configured with an external viewer or inexpensive plug-in software, such as Prizm 2.0. The images can be printed on paper or transferred to film using a digital film recorder. Digital images can also be displayed at pathology conferences by using wireless local area network (LAN) and secure remote technologies. Conclusions.—The standardization of technologies and the adoption of a Web interface for all our computer systems allows us to distribute digital images from a pathology database to a potentially large group of users distributed in multiple locations throughout a large medical center.
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Yu Ke, Yu Long Ma, and Yang Bai. "The Real-Time Transmission System of Computer Screen Based on Intranet." Advanced Materials Research 718-720 (July 2013): 2409–12. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2409.

Full text
Abstract:
This paper probes the design and realization of the real-time transmission system of computer screen based on intranet and its focus problem is on screen catch and dynamic image real-time transmission by VC++. This system is able to realize loads balance and minor resource occupancy, so it is especially useful to multi-network classroom teaching.
APA, Harvard, Vancouver, ISO, and other styles
36

Lesjak, Martin. "Automatic early warning systems for the environment." Nuclear Technology and Radiation Protection 18, no. 2 (2003): 44–50. http://dx.doi.org/10.2298/ntrp0302044l.

Full text
Abstract:
Computerized, continuous monitoring environmental early warning systems are complex networks that merge measurements with the information technology. Accuracy, consistency, reliability and data quality are their most important features. Several effects may disturb their characteristics: hostile environment, unreliable communications, poor quality of equipment nonqualified users or service personnel. According to our experiences, a number of measures should be taken to enhance system performances and to maintain them at the desired level. In the paper, we are presenting an analysis of system requirements, possible disturbances and corrective measures that give the main directives for the design, construction and exploitation of the environmental early warning systems. Procedures which ensure data integrity and quality are mentioned. Finally, the contemporary system approach based on the LAN/WAN network topology with Intranet/Internet software is proposed, together with case descriptions of two already operating systems, based on computer-network principle.
APA, Harvard, Vancouver, ISO, and other styles
37

Riki, Riki, Aditiya Hermawan, and Yusuf Kurnia. "Voice Over Internet Protocol Based Communication Design (VoIP) With 3CXSystemPhone On Android Smartphone." bit-Tech 1, no. 1 (August 30, 2018): 1–8. http://dx.doi.org/10.32877/bt.v1i1.2.

Full text
Abstract:
TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol. Voice Over Internet Protocol technology is the answer to that desire. This technology is able to convert analog voice (human voice) into data packets then through public internet data networks and private intranet data packets are passed, so that communication can occur. With VoIP communication costs can be reduced so that it can reduce investment costs and conversations (cost saving) or even up to 100% free. VoIP implementation can be done by designing a wireless VoIP network (cable) using 3CXSystemPhone software as a PBX. In this scientific work the software used is 3CXSystemPhone 11.0, where SIP is a VoIP server which is a freeware software, in its application only requires one PC server and several PC clients (2 for example) that are connected to each other
APA, Harvard, Vancouver, ISO, and other styles
38

Williamson, J. "Review: Intranet Security." Computer Bulletin 40, no. 3 (May 1, 1998): 32. http://dx.doi.org/10.1093/combul/40.3.32-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Yuhanna, Ivan, Arzuni Alexander, and Agemian Kachik. "Advantages and disadvantages of Online Learning." Journal Educational Verkenning 1, no. 2 (December 24, 2020): 13–19. http://dx.doi.org/10.48173/jev.v1i2.54.

Full text
Abstract:
This paper will talk all about advantages of Online Learning. Which Online learning (also known as electronic learning or e-learning) is the result of teaching delivered electronically using computer-based media. The material is frequently accessed via a network, including websites, the internet, intranets, CDs and DVDs. E-learning not only accesses information (eg, putting up web pages), but also helps learners with specific results (eg achieving goals). In addition to delivering e-learning teaching, it can monitor student performance and report student progress.
APA, Harvard, Vancouver, ISO, and other styles
40

Oppliger, Rolf, and Artech House. "Internet And Intranet Security." EDPACS 27, no. 9 (March 2000): 1. http://dx.doi.org/10.1201/1079/43255.27.9.20000301/30320.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Fachrurrozi, Nurwan Reza, Andri Agustav Wirabudi, and Seandy Arandiant Rozano. "Design of network monitoring system based on LibreNMS using Line Notify, Telegram, and Email notification." SINERGI 27, no. 1 (January 18, 2023): 111. http://dx.doi.org/10.22441/sinergi.2023.1.013.

Full text
Abstract:
Institut Teknologi Telkom Jakarta (IT Telkom Jakarta) is an educational institution that supports student activities and provides internet capabilities to implement online learning systems. As the number of students increases with every year, so does the use of the internet and intranet networks and the experienced network problems. A network administrator is a person who is responsible for managing a computer network. Network administrators usually face network problems in monitoring network devices. This is because the process and operation are done manually. This means network administrators need direct access to the location to monitor all resources. Therefore, a network device monitoring system is needed to manage network devices centrally. This research focuses on the problem of monitoring network devices using open-source tools and software. Based on the implementation results, free network monitoring software such as LibreNMS can track and monitor all devices in all conditions and notify the active device condition in case of network failure such as up, down, reboot to the administrator via Line Notify, Telegram, and Email. With this network monitoring system, IT Telkom Jakarta is expected to be able to implement an integrated and well-monitored internet network system. Besides, the results of this study also produce real-time data on bandwidth usage, logging problems, and resource availability. This can significantly improve network availability and security.
APA, Harvard, Vancouver, ISO, and other styles
42

Hooda, Madhurima, Amandeep Kaur, and Madhulika Bhadauria. "Recent innovations in Distributed Systems: Challenges and Benefits." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 10 (September 25, 2013): 2057–61. http://dx.doi.org/10.24297/ijct.v10i10.1194.

Full text
Abstract:
The World Wide Web is used by millions of people everyday for various purposes including email, reading news, downloading music, online shopping or simply accessing information about anything. Using a standard web browser, the user can access information stored on Web servers situated anywhere on the globe. This gives the illusion that all this information is situated locally on the user’s computer. In reality, the Web represents a huge distributed system that appears as a single resource to the user available at the click of a button. This paper gives an overview of distributed systems in current IT sector. Distributed systems are everywhere. The internet enable users throughout the world to access its services wherever they may be located [1]. Each organization manages an intranet, which provides local services for local users and generally provides services to other users in the internet. Small distributed systems can be constructed from mobile computers and other small computational devices that are attached to a wireless network.
APA, Harvard, Vancouver, ISO, and other styles
43

Sen, Angshu Maan, and K. Anand Kumar Singha. "Mitigating the Distributed Denial of Service (DDoS) Attacks in Campus Local Area Network(CLAN)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 6 (August 25, 2013): 1706–14. http://dx.doi.org/10.24297/ijct.v10i6.7010.

Full text
Abstract:
The Campus Local Area Network (CLAN) of academic institutions interconnect computers ranging from one hundred to about twenty five hundred and these computers are located in academic building(s), hostel building(s), faculty quarter(s), students amenities centre, etc all around the campus. The students, faculty and the supporting staff members use the network primarily for internet usage at both personal and professional levels and secondarily for usage of the available services and resources. Various web based services viz: Web Services, Mail Services, DNS, and FTP services are generally made available in the campus LAN. Apart from these services various intranet based services are also made available for the users of the LAN. Campus LAN users from the hostels change very frequently and also sometime become targets (we call as soft targets) to the attackers or zombie because of either inadequate knowledge to protect their own computer/ laptop, which is also a legitimate node of the campus LAN; or their enthusiastic nature of experimentation. The interconnectivity of these legitimates nodes of the campus LAN and that of the attackers in the World Wide Web, make the computers connected in the LAN (nodes) an easy target for malicious users who attempt to exhaust the resources by launching Distributed Denial-of-Service (DDoS) attacks. In this paper we present a technique to mitigate the distributed denial of service attacks in campus wide LAN by limiting the bandwidth of the affected computers (soft targets) of the virtual LAN from a unified threat management (UTM) firewall. The technique is supported with help of bandwidth utilization report of the campus LAN with and without implementation of bandwidth limiting rule; obtained from the UTM network traffic analyzer. The graphical analyzer report on the utilization of the bandwidth with transmitting and receiving bits of the campus LAN after implementation of our bandwidth limiting rule is also given.
APA, Harvard, Vancouver, ISO, and other styles
44

GE, MING, and YANGSHENG XU. "KERNEL-BASED DATA COMPRESSION FOR ADVANCED MANUFACTURING SYSTEM." Journal of Advanced Manufacturing Systems 02, no. 01 (June 2003): 89–104. http://dx.doi.org/10.1142/s021968670300023x.

Full text
Abstract:
Manufacturing system is becoming larger and more complicated. Global manufacturing chains have become common in the new millennium. Internet and intranet integrate the advanced manufacturing system. To perform remote monitoring and diagnosis in such chains and systems, real-time data compression has become a core factor in the efficient and effective exchange of information exchange via computer networks. This paper presents a new technique for compressing data using a kernel-based method. Overcoming the drawbacks of support vector techniques — that is, fast decompression but slow compression — the new method exhibits high speed in both phases. In addition, the new method can also be applied for pattern classification. Based on strain signal example tests derived from sheet metal stamping operations, the new method is very effective. The proposed technology has enormous potential in the application of advanced manufacturing system monitoring and control through internet or intranet.
APA, Harvard, Vancouver, ISO, and other styles
45

Xuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.

Full text
Abstract:
While mobile networks provide many opportunities for people, they face security problems huge enough that a firewall is essential. The firewall in mobile networks offers a secure intranet through which all traffic is handled and processed. Furthermore, due to the limited resources in mobile networks, the firewall execution can impact the quality of communication between the intranet and the Internet. In this paper, a performance evaluation mathematical model for firewall system of mobile networks is developed using queuing theory for a multihierarchy firewall with multiple concurrent services. In addition, the throughput and the package loss rate are employed as performance evaluation indicators, and discrete-event simulated experiments are conducted for further verification. Lastly, experimental results are compared to theoretically obtained values to identify a resource allocation scheme that provides optimal firewall performance and can offer a better quality of service (QoS) in mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
46

Anitha, K., Tejus Khadri, Tejas Purvimath S, Venkatesh TD, and Yash Nesarikar. "Wide Area Disaster Management System Using Mobile Intranet." International Journal of Engineering and Advanced Technology 8, no. 5s (June 29, 2019): 80–83. http://dx.doi.org/10.35940/ijeat.e1017.0585s19.

Full text
Abstract:
On the occasion of a large-scale disaster, sharing of information functionality with everyone is important. However, there were many cases where information sharing was not actually well functioned because the disaster information network infrastructure did not consider the system failure when the disaster happened. In our findings, we focus on the fact that the disaster management systems are operated on each local area. The system redundancy is realized by sharing the system resources and integrating the disaster information into a large disaster system while decentralizing the system and network loads. And, the system failure can be recovered by introducing system failure detection function for server failure and link disconnection and dynamically reconstructing the network system. In order to verify the effectiveness of the suggested method, we constructed a nationwide, disaster information network prototype system over Japan Gigabit Network (JGN2), implemented Wide-area Disaster Information sharing system (WIDIS) and evaluated its functionality and performance.
APA, Harvard, Vancouver, ISO, and other styles
47

Khasnabish, B., and R. Saracco. "Intranet Services and communication Management." IEEE Communications Magazine 35, no. 10 (October 1997): 78–83. http://dx.doi.org/10.1109/mcom.1997.623990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jiao Guo, Hang Wei, Donghui Liu, Qinqun Chen, Yuan Zheng, Hongmin Cai, and Hao Chen. "Bypass Network Security Detection Model for Virtual Machine Intranet." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 3 (February 15, 2013): 116–23. http://dx.doi.org/10.4156/aiss.vol5.issue3.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cline, Gregory P. "Web servers and the rise of the corporate ‘intranet’." International Journal of Network Management 5, no. 6 (November 1995): 322–25. http://dx.doi.org/10.1002/nem.4560050608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Muharam, Rahman, and Feri Sulianta. "Sistem Informasi Helpdesk It Perum Peruri." Syntax Idea 5, no. 2 (February 23, 2023): 211. http://dx.doi.org/10.46799/syntax-idea.v5i2.2107.

Full text
Abstract:
The purpose of this research is to study and analyze the effectiveness of the IT helpdesk system used to support IT services at Perum Peruri. Responses include services from the IT support department in solving problems related to computer hardware or the internet or company intranets which are very important to help work efficiency. To serve network requests and repair computers, laptops and printers is still done manually and this process takes a long time because it requires approval from superiors. In this case the monitoring of access requests, computer repairs and device network problems that are often complained about within 1 month is not properly recorded so that the process of evaluating these obstacles is solved. Methods In addition to interviews and observation systems, the authors conducted a literature review through information on research topics, scientific journals, books and references. For this reason, a helpdesk system for the IT Support section is needed which is computerized and can be accessed anywhere with an internet connection, so that existing problems can be resolved properly. And the process of tracking and reporting requests sent by users can be properly monitored and evaluated to find the right solution. Results, Describe the workflow of dispatchers in the helpdesk system. The dispatcher is in charge of sorting tickets or requests sent by users to the IT division, here the researcher divides into 3 sections, namely the infrastructure section, the helpdesk services section, and system maintenance. In conclusion, the information system makes it easier to organize data, speeds up the process of manual systems, can see tracking problems and find solutions, processing data can be more efficient and easy to access.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography