Academic literature on the topic 'Management Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Management Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Management Computer networks"

1

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Hong Jin. "Computer Network Management Technology and its Application Glimpse." Advanced Materials Research 1079-1080 (December 2014): 683–85. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.683.

Full text
Abstract:
Computer network is a product of modern computer technology and communications technologies. Computer network management technology refers to the initialization operation and monitor operation of computer networks in the active state. Computer network management technology function is to collect the related information in the network system. This article will mainly focus on computer network management technology and its application to start on.
APA, Harvard, Vancouver, ISO, and other styles
3

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, and Krzysztof Malinowski. "Energy-saving management in computer networks." Australian Journal of Electrical and Electronics Engineering 12, no. 3 (July 3, 2015): 242–52. http://dx.doi.org/10.1080/1448837x.2015.1093002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cherry, Steve. "Computer Networks Improve Student Achievement, School Management." NASSP Bulletin 75, no. 535 (May 1991): 78–83. http://dx.doi.org/10.1177/019263659107553514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saputra, I. Made Arya Budhi, Putu Dicky Indrajaya, Ricky Aurelius Nurtanto Diaz, I. Komang Agus Ady Aryanto, and Ni Luh Putri Srinadi. "ANALYSIS OF QUALITY OF SERVICE BANDWIDTH MANAGEMENT ON COMPUTER NETWORK USING MIKROTIK RB951Ui-2HnD." Jurnal Techno Nusa Mandiri 18, no. 1 (March 15, 2021): 8–16. http://dx.doi.org/10.33480/techno.v18i1.2164.

Full text
Abstract:
Computer networks are now part of every human activity. The use of computer networks is currently experiencing a significant increase due to the Covid-19 pandemic, however, there are still many problems with computer networks, such as what often happens is the slow pace of computer networks in transferring data caused by limited bandwidth or maximum limits. owned by the computer network. For that, we need a computer network bandwidth management method called the QoS (Quality of Service) method. In this method, a tool called the Mikrotik Router-board RB951Ui-2HnD is used to conduct this research. In implementing this system the steps are taken starting from data collection, requirements analysis, system design with flowcharts and system depiction using a star topology, then implementation and unit testing on the user or Client, and testing the computer network system on the Mikrotik Router-board. The results of this study will be explained using statistical tables obtained from testing using the Wireshark application
APA, Harvard, Vancouver, ISO, and other styles
6

Boulis, Athanassios, and Sanjay Jha. "Network management in new realms: wireless sensor networks." International Journal of Network Management 15, no. 4 (2005): 219–21. http://dx.doi.org/10.1002/nem.569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Warrier, U., P. Relan, O. Berry, and J. Bannister. "A network management language for OSI networks." ACM SIGCOMM Computer Communication Review 18, no. 4 (August 1988): 98–105. http://dx.doi.org/10.1145/52325.52335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Robles-Gómez, Antonio, Aurelio Bermúdez, and Rafael Casado. "Efficient network management applied to source routed networks." Parallel Computing 37, no. 3 (March 2011): 137–56. http://dx.doi.org/10.1016/j.parco.2011.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Ahmed. "Communication networks management." Computer Communications 10, no. 6 (December 1987): 313. http://dx.doi.org/10.1016/0140-3664(87)90250-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Glăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.

Full text
Abstract:
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Management Computer networks"

1

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Full text
Abstract:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access Point (CAP) is located at each site within the community network. This provides the hosts and servers at that site with access to services on the community network and the Internet, it is the site's router. The CAP provides a web based interface (CAPgui) which allows configuration of the device and viewing of simple monitoring statistics. The Access Concentrator (AC) is the default router for the CAPs and the gateway to the Internet. It provides authenticated and encrypted communication between the network sites. The AC performs several monitoring functions, both for the individual sites and for the upstream Internet connection. The AC provides a means for centrally managing and effectively allocating Internet bandwidth by using the web based interface (ACgui). Bandwidth use can be allocated per user, per host and per site. The system is maintainable, extendable and customisable for different network architectures. The system was deployed successfully to two community networks. The Centre of Excellence (CoE) testbed network is a peri-urban network deployment whereas the Siyakhula Living Lab (SLL) network is a rural deployment. The results gathered conclude that the project was successful as the deployed system is more robust and more manageable than the previous systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aitken, William Theodore Carleton University Dissertation Engineering Electrical. "Network management standards from the fault management perspective." Ottawa, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hanikat, Marcus. "Centralized log management for complex computer networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254292.

Full text
Abstract:
In modern computer networks log messages produced on different devices throughout the network is collected and analyzed. The data from these log messages gives the network administrators an overview of the networks operation, allows them to detect problems with the network and block security breaches. In this thesis several different centralized log management systems are analyzed and evaluated to see if they match the requirements for security, performance and cost which was established. These requirements are designed to meet the stakeholder’s requirements of log management and allow for scaling along with the growth of their network. To prove that the selected system meets the requirements, a small-scale implementation of the system will be created as a “proof of concept”. The conclusion reached was that the best solution for the centralized log management system was the ELK Stack system which is based upon the three open source software Elasticsearch, Logstash and Kibana. In the small-scale implementation of the ELK Stack system it was shown that it meets all the requirements placed on the system. The goal of this thesis is to help develop a greater understanding of some well-known centralized log management systems and why the usage of them is important for computer networks. This will be done by describing, comparing and evaluating some of the functionalities of the selected centralized log management systems. This thesis will also be able to provide people and entities with guidance and recommendations for the choice and implementation of a centralized log management system.
I moderna datornätverk så produceras loggar på olika enheter i nätverket för att sedan samlas in och analyseras. Den data som finns i dessa loggar hjälper nätverksadministratörerna att få en överblick av hur nätverket fungerar, tillåter dem att upptäcka problem i nätverket samt blockera säkerhetshål. I detta projekt så analyseras flertalet relevanta system för centraliserad loggning utifrån de krav för säkerhet, prestanda och kostnad som är uppsatta. Dessa krav är uppsatta för att möta intressentens krav på loghantering och även tillåta för skalning jämsides med tillväxten av deras nätverk. För att bevisa att det valda systemet även fyller de uppsatta kraven så upprättades även en småskalig implementation av det valda systemet som ett ”proof of concept”. Slutsatsen som drogs var att det bästa centraliserade loggningssystemet utifrån de krav som ställs var ELK Stack som är baserat på tre olika mjukvarusystem med öppen källkod som heter Elasticsearch, Logstash och Kibana. I den småskaliga implementationen av detta system så påvisades även att det valda loggningssystemet uppnår samtliga krav som ställdes på systemet. Målet med detta projekt är att hjälpa till att utveckla kunskapen kring några välkända system för centraliserad loggning och varför användning av dessa är av stor betydelse för datornätverk. Detta kommer att göras genom att beskriva, jämföra och utvärdera de utvalda systemen för centraliserad loggning. Projektet kan även att hjälpa personer och organisationer med vägledning och rekommendationer inför val och implementation av ett centraliserat loggningssystem.
APA, Harvard, Vancouver, ISO, and other styles
5

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

De, Kock Johannes Marthinus. "Optimal management of MPLS networks." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52977.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: Multiprotocol Label Switching (MPLS) is a routing technology which can manage Quality of Service (QoS) in scalable connectionless networks using relatively simple packet forwarding mechanisms. This thesis considers the optimisation of the QoS offered by an MPLS network. The QoS measure used is the expected packet delay which is minimised by switching packets along optimal label switched paths (LSPs). Two mathematical models of MPLS networks are presented together with appropriate algorithms for optimally dividing the network traffic into forwarding equivalence classes (FECs), finding optimal LSPs which minimise the expected packet delay and switching these FECs along the optimal LSPs. These algorithms are applied to compute optimal LSPs for several test networks. The mathematics on which these algorithms are based is also reviewed. This thesis provides the MPLS network operator with efficient packet routing algorithms for optimising the network's QoS.
AFRIKAANSE OPSOMMING: Multiprotocol Label Switching (MPLS) is 'n roeteringsmetode om die diensvlak (QoS) van 'n skaleerbare, verbindinglose netwerk te bestuur deur middel van relatief eenvoudige versendingsmeganismes. Hierdie tesis beskou die optimering van die QoS van 'n MPLS-netwerk. Die QoS-maatstaf is die verwagte vert raging van 'n netwerk-pakkie. Dit word geminimeer deur pakkies langs optimale "label switched paths" (LSPs) te stuur. Twee wiskundige modelle van MPLS-netwerke word ondersoek. Toepaslike algoritmes word verskaf vir die optimale verdeling van die netwerkverkeer in "forwarding equivalence classes" (FECs), die soektog na optimale LSPs (wat die verwagte pakkie-vertraging minimeer) en die stuur van die FECs langs die optimale LSPs. Hierdie algoritmes word ingespan om optimale LSPs vir verskeie toetsnetwerke op te stel. Die wiskundige teorie waarop hierdie algoritmes gegrond is, word ook hersien. Hierdie tesis verskaf doeltreffende roeteringsalgoritmes waarmee 'n MPLS-netwerkbestuurderj-es die netwerk se QoS kan optimeer.
APA, Harvard, Vancouver, ISO, and other styles
7

Ayvat, Birol. "An evaluation of best effort traffic management of server and agent based active network management (SAAM) architecture." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FAyvat.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sullivan, Mark P. "Secure remote network administration and power management." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSullivan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohan, Raj. "XML based adaptive IPsec policy management in a trust management context /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMohan.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science and M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Cynthia E. Irvine, Timothy E. Levin. Includes bibliographical references (p. 71-72). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Kok Seng. "Analysis of network management protocols in optical networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FLim%5FK.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Management Computer networks"

1

Randhawa, Tejinder S. Network Management in Wired and Wireless Networks. Boston, MA: Springer US, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1943-, Hardy Stephen, ed. Network management in wired and wireless networks. Boston: Kluwer Academic Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

B, Kulkarni Amit, ed. Active networks and active network management: A proactive management framework. New York: Kluwer Academic/Plenum, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mark, Burgess. Analytical network and system administration: Managing human-computer networks. Chichester, West Sussex, England: John Wiley & Sons, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karris, Steven T. Networks: Design and management. Fremont, Calif: Orchard Publications, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karris, Steven T. Networks: Design and management. Fremont, Calif: Orchard Publications, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stewart, Kenneth. Designing and supporting computer networks. Indianapolis, Ind., USA: Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fitchett, Trevor. Network management. London: DISC, BSi Standards, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

William, Stallings, ed. Network management. Los Alamitos, Calif: IEEE Computer Society Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

OSS for telecom networks: An introduction to network management. New York: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Management Computer networks"

1

Ren, Jian. "Computer Network Management." In Handbook of Computer Networks, 714–30. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Czerwinski, Dariusz, Slawomir Przylucki, and Przemyslaw Matejczuk. "Resource Management in Grid Systems." In Computer Networks, 101–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yates, Jennifer M., and Zihui Ge. "Network Management: Fault Management, Performance Management, and Planned Maintenance." In Computer Communications and Networks, 397–445. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84882-828-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Misra, Kundan. "Configuration Management." In Computer Communications and Networks, 151–203. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-400-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Misra, Kundan. "Fault Management." In Computer Communications and Networks, 205–49. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-400-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Misra, Kundan. "Traffic Management." In Computer Communications and Networks, 251–65. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-400-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghumman, Waheed Aslam, and Alexander Schill. "SLA Life Cycle Automation and Management for Cloud Services." In Computer Networks, 305–18. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kwiecień, Andrzej, and Karol Opielka. "Management of Industrial Networks Based on the FCAPS Guidelines." In Computer Networks, 280–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Groot, Martin. "Fault Diagnosis in Computer Networks." In Integrated Network Management IV, 707. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kousalya, G., P. Balakrishnan, and C. Pethuru Raj. "Workflow Management Systems." In Computer Communications and Networks, 55–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56982-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Management Computer networks"

1

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola, and Michal Marks. "Network-wide power management in computer networks." In 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haixin Duan and Jianping Wu. "Security management for large computer networks." In Proceedings of APCC/OECC'99 - 5th Asia Pacific Conference on Communications/4th Optoelectronics and Communications Conference. IEEE, 1999. http://dx.doi.org/10.1109/apcc.1999.820481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jing, Wang, Zhuang GuangLei, and Wang ZongChen. "Computer software engineering management measures." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Peiliang, Hong Wang, and Yanru Jiao. "Medical quality control and management based on computer management system." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pinto, Rossano Pablo. "Global Queue Management for the provision of QoS in computer networks." In 2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2016. http://dx.doi.org/10.1109/netwks.2016.7751155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mo Li and K. Sandrasegaran. "Network management challenges for next generation networks." In The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l. IEEE, 2005. http://dx.doi.org/10.1109/lcn.2005.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weijun, Hu. "Study on centralized management of distributed computer network." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grezo, Rudolf, and Martin Nagy. "Network traffic measurement and management in software defined networks." In 2017 3rd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2017. http://dx.doi.org/10.1109/compcomm.2017.8322604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Poulova, Petra, and Ivana Simonova. "Innovations in teaching computer networks subjects." In 2016 IEEE Conference on e-Learning, e-Management and e-Services (IC3e). IEEE, 2016. http://dx.doi.org/10.1109/ic3e.2016.8009035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Jinyu. "Impact of computer technology on human resources information management." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130992.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Management Computer networks"

1

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
APA, Harvard, Vancouver, ISO, and other styles
2

Nechaev, V., Володимир Миколайович Соловйов, and A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Full text
Abstract:
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Mercedes-Benz and some others companies have not been engaged in their traditional business for a long time. Their partner networks performs this function instead of them. The companies themselves perform the function of system integrators. The Tapscott’s idea finds its confirmation within the framework of a new powerful direction of the development of the modern interdisciplinary science – the theory of the complex networks (CN) [2]. CN-s are multifractal objects, the loss of multifractality being the indicator of the system transition from more complex state into more simple state. We tested the multifractal properties of the data using the wavelet transform modulus maxima approach in order to analyze scaling properties of our company. Comparative analysis of the singularity spectrumf(®), namely, the difference between maximum and minimum values of ® (∆ = ®max ¡ ®min) shows that IBM company is considerably more fractal in comparison with Apple Computer. Really, for it the value of ∆ is equal to 0.3, while for the vertically integrated company Apple it only makes 0.06 – 5 times less. The comparison of other companies shows that this dependence is of general character. Taking into consideration the fact that network organization of business has become dominant in the last 5-10 years, we carried out research for the selected companies in the earliest possible period of time which was determined by the availability of data in the Internet, or by historically later beginning of stock trade of computer companies. A singularity spectrum of the first group of companies turned out to be considerably narrower, or shifted toward the smaller values of ® in the pre-network period. The latter means that dynamic series were antipersistant. That is, these companies‘ management was rigidly controlled while the impact of market mechanisms was minimized. In the second group of companies if even the situation did changed it did not change for the better. In addition, we discuss applications to the construction of portfolios of stock that have a stable ratio of risk to return.
APA, Harvard, Vancouver, ISO, and other styles
3

Kryukova, Svetlana, Berna Massingill, and Beverly Sanders. An Algorithm for Distributed Location Management in Networks of Mobile Computers. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada443241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography