Journal articles on the topic 'Terrorism – Computer network resources'

To see the other types of publications on this topic, follow the link: Terrorism – Computer network resources.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Terrorism – Computer network resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.

Full text
Abstract:
Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.
APA, Harvard, Vancouver, ISO, and other styles
2

Chernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.

Full text
Abstract:
Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of security incidents are the most important and difficult tasks. It is required to detect security incidents as soon as possible, to analyze and respond to them correctly, so as not to complicate the work of the enterprise computer network. The difficulty is that different event sources offer different data formats or can duplicate events. In addition, some events do not indicate any problems on their own, but their sequence may indicate the presence of a security incident. All collection processes of security events must be performed in real-time, which means streaming data processing.
APA, Harvard, Vancouver, ISO, and other styles
3

Andrusyshyn, Julia, and Valeria Barannik. "INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 6–15. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-1.

Full text
Abstract:
The article discusses the content and characteristics of information terrorism as a threat to national and international security in contemporary circumstances. The relevance of the topic stems from the fact that information is currently considered a strategic resource, and deliberate manipulation of public opinion and the commission of terrorist acts to that end has become one of the most dangerous manifestations of hybrid confrontation in the contemporary international arena. Due to the impossibility of clear distinction with ordinary computer crimes and domestic manipulation in mass media, the concepts of «information terrorism» and «cyberterrorism» do not have a clear interpretation. Therefore, information terrorism is viewed in a broad sense (manipulation of public consciousness to create tension, instability, chaos aimed at achieving political or economic objectives in the interests of terrorists) and in narrow terms (cyberattacks on critical government infrastructure information systems to disable them, which can lead to economic, environmental and other disasters). The general characteristics of information terrorism (organized form of violence, psychological influence, drawing attention to a particular problem, demonstrative nature) are defined and specific characteristics inherent only in terrorist acts in the information sphere: (secrecy, size, synchrony, remoteness, internationality and publicity) are singled out. The methods of information terrorism are described, which are aimed at influencing people’s consciousness on a large scale and at imposing their will on society and State institutions through the use of disinformation, propaganda, diversification of public opinion, psychological pressure, rumours, manipulation, intimidation. The forms of information terrorism are described: in particular: information-psychological (media-terrorism) and information-technical (cyberterrorism). It is noted that media terrorism / media killer activity involves the organization of special media campaigns to create an atmosphere of civil disobedience, public distrust of the actions and intentions of the government and its law enforcement agencies by using a number of models of communicative influence (nationalist, religious, inciting model). Cyberterrorism is presented as a socially dangerous activity with the use of computers and telecommunication networks to harm or commit actions / threats that threaten society and lead to other serious consequences, through the use of the following methods: APT-attacks, malware, DoS / DDoS-attacks, unauthorized access, ransomware. It is summarized and concluded that today virtual space and mass media are widely used by various terrorist-oriented groups for their own purposes, because accessibility, the absence of censorship, the large potential audience of users, the speed with which information is disseminated and the complexity with which it is presented and received are all contributing to the spread of information terrorism in today’s world. The threat of terrorism through the use of media and cyberspace is a complex challenge of our time. The danger of such terrorism lies in the absence of geographical and national borders, since terrorist acts can be carried out from anywhere in the world, as well as in the difficulty of identifying the identity of the terrorist in the information space and establishing his whereabouts, because cyber and media attacks are carried out by hackers indirectly through the use of computer technology. Therefore, in view of the further development of technology and mass media, the issue of countering information terrorism will be particularly relevant.
APA, Harvard, Vancouver, ISO, and other styles
4

Surma, Ivan V. "The role of information and psychological operations in the escalation of the Ukrainian crisis." Diplomaticheskaja sluzhba (Diplomatic Service), no. 3 (June 7, 2022): 204–9. http://dx.doi.org/10.33920/vne-01-2203-04.

Full text
Abstract:
The article shows the importance and increasing role of the information and psychological warfare factor as the Ukrainian crisis escalates. The role of the Special Operations Forces of Ukraine in the informational and psychological confrontation is noted. The structure and functionality of the 16th, 72nd, 74th and 83rd centers of information and psychological operations of the Special operations Forces of Ukraine are considered. The main functions of these centers are shown, such as intelligence and subversive activities, identification of internal opponents, disinformation of the population, information terrorism, demoralization of citizens of Donbass, etc. The tools used by the centers of information and psychological operations in their activities are considered, in addition to the official media, several thousand Internet resources, information and news sites, coordinated groups of users of social networks and individual "platforms" in social networks are used. The role of the NATO Coordination Center for Responding to Computer Incidents (NCIRC — NATO Computer Incident Response Capability), the NATO Center of Excellence for Joint Cyber Defense (NATO CCD COE — NATO Cooperative Cyber Defense Center of Excellence — Tallinn) and the cyber operations center in Mons (Belgium) is noted.
APA, Harvard, Vancouver, ISO, and other styles
5

Haynes, Steven R., Thomas George Kannampallil, Lawrence L. Larson, and Nitesh Garg. "Optimizing anti-terrorism resource allocation." Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 299–309. http://dx.doi.org/10.1002/asi.20120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Romanov, Rashit. "The Basic Principles of Information Protection in the Russian Federation in the Transition to a Digital Economy." NBI Technologies, no. 3 (January 2019): 13–18. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.2.

Full text
Abstract:
The modern stage of development of society is characterized by the increasing role of the information sphere. The information sphere is a set of information, information infrastructure, entities engaged in the collection, formation, distribution and use of information, as well as a system of regulation of public relations arising in this process. The expansion of the areas of application of information technologies, as a factor of economic development and improvement of the functioning of public and state institutions, at the same time generates new information threats. The situation is significantly complicated by the confrontation between the Russian Federation and the West, which directly affects the sphere of national interests of the Russian Federation and poses a direct threat to the national security of the country, the key element of which is information security. There is a constant growth of computer attacks on Russian information resources, the number of attacks has increased significantly in recent years. At the same time, the methods, means and tactics of such attacks are being improved, and their intensity directly depends on the current international situation. Terrorist and extremist materials are openly distributed in the global network. The number of crimes committed with the use of information technologies, for example, illegal penetrations into the corporate networks of state and credit and financial institutions, has increased. The article analyzes the requirements for the security of important objects of critical information infrastructure of the Russian Federation. It is shown that they should be performed at all stages of the life cycle during the creation (modernization), operation and decommissioning of a significant object.
APA, Harvard, Vancouver, ISO, and other styles
7

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
8

Bura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Full text
Abstract:
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of particular danger. The Russian military in Syria is constantly confronted with terrorist attacks: the Khmeimim aerospace forces base is regularly attacked with unmanned air vehicles - drones. Terrorist acts with the use of computer and network technologies are no less dangerous. The destructive potential of cyberterrorism is determined by the widespread computerization of state and public life, the implementation of projects to create smart cities, including smart transportation, as well as the intensive development of the Internet of things. The purpose of the article is to analyze new criminal threats to state and public security, as well as to study high-tech ways of committing crimes such as sabotage, terrorist acts, and other crimes of a terrorist nature. The cost of their consequences for society is very high, and criminals do not always need to attack social objects directly - it is enough to spread panic among the population using online media, social networks and websites of authorities of various levels, after obtaining illegal access to them. The article describes some of the techniques already used to commit crimes of sabotage and terrorism. The authors draw attention to the priority of cybersecurity both for engineers of devices with elements of artificial intelligence, and for lawmakers who should pay attention to methods of technical forecasting when developing legal norms aimed at prevention of new ways of committing such crimes. When writing the article, the authors used a wide range of Russian and foreign sources of legal, statistical, sociological and other information. The authors used such research methods as analysis, synthesis, deduction, induction, formal legal method as well as comparative legal method.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Yaojie, Xiaolong Cui, and Peiyong He. "Winning the War on Terror." International Journal of Information Technology and Web Engineering 17, no. 1 (January 2022): 1–15. http://dx.doi.org/10.4018/ijitwe.288038.

Full text
Abstract:
From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a quantitative analysis method of active risk assessment method with terrorists as the research object is proposed. This assessment method introduces deep learning algorithms into social computing problems on the basis of information coding technology. We design a special "Top-k" algorithm to screen the terrorism related features, and optimize the evaluation model through convolution neural network, so as to determine the risk level of terrorist suspects. This study provides important research ideas for counter-terrorism assessment, and verifies the feasibility and accuracy of the proposed scheme through a number of experiments, which greatly improves the efficiency of counter-terrorism early warning.
APA, Harvard, Vancouver, ISO, and other styles
11

Bishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley, and Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction." Journal of Geography 92, no. 3 (May 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Macleod, Roderick A. "Network resources and access tools." New Review of Information Networking 10, no. 1 (May 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

MacLeod, Roderick A. "Network resources and access tools." New Review of Information Networking 9, no. 1 (January 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Євсєєв, С. П., С. С. Погасій, and В. С. Хвостенко. "Development of a protocol for a closed mobile internet channel based on post-quantum algorithms." Системи обробки інформації, no. 3(166) (September 24, 2021): 35–40. http://dx.doi.org/10.30748/soi.2021.166.03.

Full text
Abstract:
The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.
APA, Harvard, Vancouver, ISO, and other styles
15

Niu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Full text
Abstract:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
APA, Harvard, Vancouver, ISO, and other styles
16

Weigeng, Shi. "Reconnectable network with limited resources." Journal of Computer Science and Technology 6, no. 3 (July 1991): 243–49. http://dx.doi.org/10.1007/bf02945511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Lei, Zihao Zhao, Shuai Wu, Suqing Yang, and Minghao Liu. "A Violent Video Detection Method Based on Image Semantic Segmentation." Mobile Information Systems 2022 (June 24, 2022): 1–12. http://dx.doi.org/10.1155/2022/7454397.

Full text
Abstract:
With the rapid growth of the network user base and the number of short videos, a large number of videos related to terrorism and violence have emerged in the Internet, which has brought great challenges to the governance of the network environment. At present, most short-video platforms still adopt manual-review and user-report mechanisms to filter videos related to terrorism and violence, which cannot adapt to the development trend of short-video business in terms of recognition accuracy and timeliness. In the single-mode recognition method of violent video, this paper mainly studies the scene recognition mode. Firstly, the U-Net network is improved with the SE-block module. After pretraining on the Cityscapes dataset, semantic segmentation of video frames is carried out. On this basis, semantic features of scenes are extracted using the VGG16 network loaded with ImageNet pretraining weights. SE-U-Net-VGG16 scene recognition model is constructed. The experimental results show that the prediction accuracy of SE-U-Net model is much higher than that of the FCN model and U-Net model. SE-U-Net model has significant advantages in the modal research of scene recognition.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhu, Rongchen, Xiaofeng Hu, Xin Li, Han Ye, and Nan Jia. "Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method." International Journal of Environmental Research and Public Health 17, no. 6 (March 19, 2020): 2051. http://dx.doi.org/10.3390/ijerph17062051.

Full text
Abstract:
The chemical terrorist attack is an unconventional form of terrorism with vast scope of influence, strong concealment, high technical means and severe consequences. Chemical terrorism risk refers to the uncertainty of the effects of terrorist organisations using toxic industrial chemicals/drugs and classic chemical weapons to attack the population. There are multiple risk factors infecting chemical terrorism risk, such as the threat degree of terrorist organisations, attraction of targets, city emergency response capabilities, and police defense capabilities. We have constructed a Bayesian network of chemical terrorist attacks to conduct risk analysis. The scenario analysis and sensitivity analysis are applied to validate the model and analyse the impact of the vital factor on the risk of chemical terrorist attacks. The results show that the model can be used for simulation and risk analysis of chemical terrorist attacks. In terms of controlling the risk of chemical terrorist attack, patrol and surveillance are less critical than security checks and police investigations. Security check is the most effective approach to decrease the probability of successful attacks. Different terrorist organisations have different degrees of threat, but the impacts of which are limited to the success of the attack. Weapon types and doses are sensitive to casualties, but it is the level of emergency response capabilities that dominates the changes in casualties. Due to the limited number of defensive resources, to get the best consequence, the priority of the deployment of defensive sources should be firstly given to governmental buildings, followed by commercial areas. These findings may provide the theoretical basis and method support for the combat of the public security department and the safety prevention decision of the risk management department.
APA, Harvard, Vancouver, ISO, and other styles
19

Xin Wang and H. Schulzrinne. "Pricing network resources for adaptive applications." IEEE/ACM Transactions on Networking 14, no. 3 (June 2006): 506–19. http://dx.doi.org/10.1109/tnet.2006.872574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Li Jun. "Research on Computer Network Data Transfer Methods." Advanced Materials Research 926-930 (May 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.

Full text
Abstract:
In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and realization of dynamic task assignment algorithm and Performance experiment of the system.
APA, Harvard, Vancouver, ISO, and other styles
21

Giladi, Ran, Ephraim Korach, and Rony Ohayon. "Placement of network resources in communication networks." Computer Networks 43, no. 2 (October 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Soule, Robert, Shrutarshi Basu, Parisa Jalili Marandi, Fernando Pedone, Robert Kleinberg, Emin Gun Sirer, and Nate Foster. "Merlin: A Language for Managing Network Resources." IEEE/ACM Transactions on Networking 26, no. 5 (October 2018): 2188–201. http://dx.doi.org/10.1109/tnet.2018.2867239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Scott, Paul, Dan Gordon, Evan Franklin, Laura Jones, and Sylvie Thiebaux. "Network-Aware Coordination of Residential Distributed Energy Resources." IEEE Transactions on Smart Grid 10, no. 6 (November 2019): 6528–37. http://dx.doi.org/10.1109/tsg.2019.2907128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ефремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (July 10, 2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.

Full text
Abstract:
The article is devoted to development of the USA legislation on the fight against terrorism. The author considered the objectives and tasks of the state in a particular historical period; analyzed the laws passed by the USA Congress aimed at combating home and international terrorism; identifies the main directions of the state policy of the USA in the field of counter-terrorism. The article covers the events after 11 September 2001 to the present. The author gives a brief overview of the events of 11 September 2001, discusses the Patriot Act and other laws, aimed at combating terrorism. The Patriot Act allows the Federal Bureau of Investigation to intercept telephone, verbally and electronic communications relating to terrorism, computer and mail fraud; introduces special measures to combat money-laundering; expands immigration rules, in particular, mandatory requirement of detention of persons suspected of terrorism appeared; reveals the procedure of multilateral cooperation to combat terrorism, strengthening measures to investigate terrorist crimes; established rewards for information on terrorism; introduces the procedure of identification of DNA of persons charged for committing terrorist crimes or any violent crime; introduced the concept of domestic terrorism and Federal crimes of terrorism, the prohibition on harboring terrorists and material support; there is a new crime — terrorist and other acts of violence against public transportation systems. The law abolished for the statute of limitations for crimes of terrorist orientation. In 2002 5 laws wer adopted: “Homeland Security Act of 2002”, “Maritime Transportation Security Act of 2002”, “Aviation and Transportation Security Act“, “Public Health Security and Bioterrorism Preparedness and Response Act of 2002”, “Terrorism Risk Insurance Act of 2002”. The Palestinian Anti-Terrorism Act was adopted in 2006. This law restricted the financial assistance to the Palestinian national authority; Haqqani Network Terrorist Designation Act of 2012 included the Haqqani Network in the list of international terrorist organizations; the political act of refusal of admission to the United States representative to the United Nations, because he was accused of the occupation of the espionage or terrorist activities against the United States and poses a threat to the national security interests of the United States.
APA, Harvard, Vancouver, ISO, and other styles
25

Lu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources." Mobile Information Systems 2022 (September 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.

Full text
Abstract:
The balanced distribution of multimedia wireless network modular teaching resources is improved by optimizing and adjusting the balanced distribution of multimedia wireless network modular teaching resources. Based on block grid balanced scheduling and resource spectrum fusion, a balanced distribution method of multimedia wireless network modular teaching resources is proposed. A blockchain Internet of Things accesses control network architecture system for the balanced allocation of multimedia wireless network modular teaching resources established using the priority business scheduling method. Modular resource allocation of multimedia wireless networks and adaptive forwarding are adjusted to control the data packets. The bandwidth guarantee mechanism is used for the equitable allocation of multimedia wireless network modular teaching resources information flow. Multi-service hierarchical management of multimedia wireless network modular teaching resources spectrum is controlled by block grid balanced scheduling and resource spectrum fusion. The high-energy physical computing system structure is used to allocate the resource spectrum balance of the modular teaching resources of the multimedia wireless networks, ensuring the bandwidth requirements of various services. The classified management and balanced allocation of the multimedia wireless networks’ teaching storage, system, and teaching spectrum resources are made possible. The results of the tests show that this method effectively reduces the delay in the allocation of modular multimedia wireless network teaching resources, improves the utilization rate of modular multimedia wireless network teaching resources, and significantly improves their reading and writing performance.
APA, Harvard, Vancouver, ISO, and other styles
26

Tan, Tin-Wee, and Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences." Biochemical Education 22, no. 1 (January 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hernández-Orallo, Enrique, and Joan Vila-Carbó. "Network Provisioning Using Multimedia Aggregates." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/30893.

Full text
Abstract:
Multimedia traffic makes network provisioning a key issue. Optimal provisioning of network resources is crucial for reducing the service cost of multimedia transmission. Multimedia traffic requires not only provisioning bandwidth and buffer resources in the network but also guaranteeing a given maximum end-to-end delay. In this paper we present methods and tools for the optimal dimensioning of networks based on multimedia aggregates. The proposed method minimises the network resources reservations of traffic aggregates providing a bounded delay. The paper also introduces several methods to generate multimedia traffic aggregation using real video traces. The method is evaluated using a network topology based on the European GÉANT network. The results of these simulations allow us to discover the relationship between a required delay and the necessary bandwidth reservation (or the achievable utilisation limit). An interesting conclusion of these scenarios is that, following several recommendations, the network utilisation can reach values of around80%or higher.
APA, Harvard, Vancouver, ISO, and other styles
28

Voyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)." Computer Music Journal 18, no. 3 (1994): 8. http://dx.doi.org/10.2307/3681174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cao, Jun. "Cloud Computing-Based Online Sharing Method of Mass Resources in Public Libraries." Mobile Information Systems 2022 (September 28, 2022): 1–9. http://dx.doi.org/10.1155/2022/8925897.

Full text
Abstract:
In order to realize the online sharing of massive resources and capitals in public libraries under the circumstances of network environment and cultural construction, it is desirable to invent new sharing policies. In this paper, we put forward a method of online sharing of massive resources in public libraries which is established on cloud computing. Cloud computing technique is implemented to collect the statistical information characteristics of public library’s massive resources under the condition of network environment and culture construction, and an adaptive fusion clustering processing model of public library’s massive resources under the condition of network environment and culture construction is constructed. Moreover, the correlation statistical feature detection approach is used to accomplish fuzzy scheduling and feature mining of public library’s massive resources under the condition of network environment and culture construction. The information storage center management database of public library’s massive resources under the condition of network environment and culture construction is established. The fuzzy C-means clustering approach is implemented in the database to cluster the massive resources of public library under the condition of network environment and culture construction. Combined with cloud computing technology, the sharing and classified management scheduling of massive resources of public library under the condition of network environment and culture construction are comprehended. The simulation outcomes confirm that the adaptive performance of public library’s massive resource sharing management under the condition of network environment and culture construction is better, and the adaptive scheduling performance of resources is better. The data clustering of public library’s massive resources under the condition of network environment and culture construction is stronger, which improves the online sharing level of public library’s massive resources under the condition of network environment and culture construction.
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Qian, Chun Yan Yang, and Chang Qing Cui. "The Research of Distributed Computer Network Technology Based on Web." Applied Mechanics and Materials 631-632 (September 2014): 985–88. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.985.

Full text
Abstract:
With the rapid development of network technology, network scale, the increasing complexity, traditional centralized network data collecting the methods already cannot adapt to this situation, a web-based distributed computing structure because of its many advantages are widely used. This paper proposes a construct Web application framework of distributed application system, combination of Web technology and the SNMP network management technology. Thereby, it can maintain the increasingly huge network system, ensure that all the good operation of the network resources, the management of the convenient and easy to use network resources.
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Liying. "The Application of Computer Management System in Physical Education Teaching." E3S Web of Conferences 275 (2021): 03016. http://dx.doi.org/10.1051/e3sconf/202127503016.

Full text
Abstract:
School physical education(PE) is an indispensable part of school education, which plays an important and irreplaceable role in training builders of socialist cause with all-round development of morality, intelligence and sports. Sports network teaching management greatly improves the efficiency and efficiency of school sports teaching, which is a great change of the traditional mode., it provides a solid foundation for the establishment of Sports Network Teaching in Colleges and universities(CAU). This paper mainly studies the application of computer management system(CMS) in physical education teaching(PET). This paper studies and analyzes the method of university teaching computer management resources integration, studies the architecture of sports teaching CMS from four aspects of computing resources, storage resources, backup resources and network system, and uses ant colony algorithm to design and use sports teaching CMS. This paper also uses charts to analyze students’ attitude towards the use of CMS in PET, and the proportion of CMS in PET. The experimental results show that in the CMS of PET, the computing resources account for 38.33%, the storage resources account for 31.76%, the backup resources account for 14.62%, and the network system account for 15.29%.
APA, Harvard, Vancouver, ISO, and other styles
32

Palkopoulou, Eleni, Dominic Schupke, and Thomas Bauschert. "Shared backup router resources: realizing virtualized network resilience." IEEE Communications Magazine 49, no. 5 (May 2011): 140–46. http://dx.doi.org/10.1109/mcom.2011.5762810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Xiaolong Weng. "Design and Implement of PE Network Education Platform Facing to Network Sports Teaching Resources." International Journal of Advancements in Computing Technology 5, no. 7 (April 15, 2013): 263–71. http://dx.doi.org/10.4156/ijact.vol5.issue7.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Xi Liang, Xi Liang, and Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship." 網際網路技術學刊 23, no. 1 (January 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.

Full text
Abstract:
<p>Aiming at the problems of poor balance of recommended resources in the recommendation of traditional physical education network teaching resources and low trust degree of recommended physical education network teaching resources, this paper proposes a balanced recommendation algorithm for physical education network teaching resources based on trust relationship. By SVM algorithm, the teaching resources of physical education network are classified, and then the invalid data of teaching resources of physical education network are deleted, and the remaining teaching resources of physical education network are taken as the extraction object to complete the extraction of teaching resources of physical education network. Through Kalman filtering method, the data of sports network teaching resources with noise are reduced, and then the data with high similarity are fused to complete the preprocessing of physical education network teaching resources data. By constructing the trust relationship model, the relationship attribute between the recommended physical education network teaching resources data is determined. The experimental results show that the highest degree of resource equilibrium recommended by the proposed method is about 96 and the recommended resource trust is high.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
35

Dongming Tang, Xianliang Lu, and Juguang Li. "Minimizing Network Coding Resources with Improved Genetic Algorithm." International Journal of Digital Content Technology and its Applications 7, no. 3 (February 15, 2013): 464–71. http://dx.doi.org/10.4156/jdcta.vol7.issue3.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Jin-Kuk, and Kang-G. Shin. "NetDraino: Saving Network Resources via Selective Packet Drops." Journal of Computing Science and Engineering 1, no. 1 (September 30, 2007): 31–55. http://dx.doi.org/10.5626/jcse.2007.1.1.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Du, Zhao, Xiaolong Fu, Can Zhao, Ting Liu, and Qifeng Liu. "University campus social network system for knowledge sharing." Computer Science and Information Systems 9, no. 4 (2012): 1721–37. http://dx.doi.org/10.2298/csis120215055d.

Full text
Abstract:
Public online social network services have achieved dazzling success in recent years. As a result, vertical social network services for universities are expected warmly by campus users. As the majority of activities in university campus are knowledge and social interaction intensive, one of the core functions of campus social network system is to facilitate knowledge sharing on campus. In the cyberspace of universities, knowledge is stored in various kinds of digital resources such as documents, photos, videos etc. In this paper, we discuss the design and implementation of our campus social network system, concentrating on knowledge sharing mechanism in the system. The knowledge sharing mechanism has five features including the utilization of users? personal social network to facilitate the dissemination of digital resources, the use of a six-tuple model based tagging to realize the unified labeling for digital resources, the fine-grained access control based on friend lists for safer knowledge sharing, the adoption of a multiscale evaluation method for digital resources and personalized recommendation for digital resource with social graph based collaborative filtering as its core idea. With all these considerations, we expect to improve the efficiency and effectiveness of knowledge while enlarging the dissemination scope of digital resources carrying it in cyberspace of universities.
APA, Harvard, Vancouver, ISO, and other styles
38

Javadpour, Amir. "Improving Resources Management in Network Virtualization by Utilizing a Software-Based Network." Wireless Personal Communications 106, no. 2 (February 18, 2019): 505–19. http://dx.doi.org/10.1007/s11277-019-06176-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Yuan, Siyu, Yong Zhang, Wenbo Qie, Tengteng Ma, and Sisi Li. "Deep reinforcement learning for resource allocation with network slicing in cognitive radio network." Computer Science and Information Systems, no. 00 (2020): 55. http://dx.doi.org/10.2298/csis200710055y.

Full text
Abstract:
With the development of wireless communication technology, the requirement for data rate is growing rapidly. Mobile communication system faces the problem of shortage of spectrum resources. Cognitive radio technology allows secondary users to use the frequencies authorized to the primary user with the permission of the primary user, which can effectively improve the utilization of spectrum resources. In this article, we establish a cognitive network model based on under1 lay model and propose a cognitive network resource allocation algorithm based on DDQN (Double Deep Q Network). The algorithm jointly optimizes the spectrum efficiency of the cognitive network and QoE (Quality of Experience) of cognitive users through channel selection and power control of the cognitive users. Simulation results show that proposed algorithm can effectively improve the spectral efficiency and QoE. Compared with Q-learning and DQN, this algorithm can converge faster and obtain higher spectral efficiency and QoE. The algorithm shows a more stable and efficient performance.
APA, Harvard, Vancouver, ISO, and other styles
40

Rong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network." Scientific Programming 2021 (June 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.

Full text
Abstract:
The main purpose of the integration of network media and middle school ideological and political course is to better realize the moral education function of middle school ideological and political development. The use of resource integration technology to manage distributed teaching resources is conducive to improving the level of information construction in colleges and universities, and so on. This paper puts forward the integration system of ideological and political multimedia network teaching resources based on wireless network. Firstly, it presents an overview of the Radio Resource Management (RRM) problem and projected strategies within wireless network framework, where several Radio Access Technologies (RATs) are collectively controlled and identify the different activities relating to the CRRM issues. Secondly, this paper targets providing a summary of the RRM problem and projected solutions within wireless network. Thirdly, the theoretical elements of the design and the teaching resource management assessment process are clarified by using XML as the data exchange carrier to realize the automatic integration of teaching resources. Fourthly, we have used dSPACE platform, by calling its API function, which then call the subscribe function of dSPACE framework and store the subscription information in the database. Whenever new teaching resources enter the subscribed field, the dSPACE framework will automatically send e-mail to the subscribers. Finally, during the operation of the system, all functions operate normally and have strong security, so as to avoid the illegal theft or leakage of the data about the education system.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Jian Hang, and Hai Bo Wang. "Computer Local Area Network Security and Management." Advanced Materials Research 1079-1080 (December 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.

Full text
Abstract:
Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.
APA, Harvard, Vancouver, ISO, and other styles
42

Xu, ChangBiao, KePing Long, and Shizhong Yang. "Allocating network resources by weight between TCP traffics." Journal of Computer Science and Technology 18, no. 2 (March 2003): 247–51. http://dx.doi.org/10.1007/bf02948892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hu, Zhenbing, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko, and Oksana Herasymenko. "Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach." International Journal of Intelligent Systems and Applications 9, no. 7 (July 8, 2017): 41–51. http://dx.doi.org/10.5815/ijisa.2017.07.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nadezhdin, E. N. "THE TASK OF DISTRIBUTING SOFTWARE RESOURCES OF AN INFORMATION-COMPUTER NETWORK." Современные наукоемкие технологии (Modern High Technologies), no. 12 2019 (2019): 89–94. http://dx.doi.org/10.17513/snt.37839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Feng, Weizhou. "Research on the application of computer network resources in Japanese Teaching." Journal of Physics: Conference Series 1915, no. 3 (May 1, 2021): 032064. http://dx.doi.org/10.1088/1742-6596/1915/3/032064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Ya. "Study on the Application of Computer Network Resources in Japanese Teaching." Journal of Physics: Conference Series 1992, no. 3 (August 1, 2021): 032071. http://dx.doi.org/10.1088/1742-6596/1992/3/032071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bailey, Charles W. "Intelligent Multimedia Computer Systems: Emerging Information Resources in the Network Environment." Library Hi Tech 8, no. 1 (January 1990): 29–41. http://dx.doi.org/10.1108/eb047780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhao, Guotao, and Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm." Scientific Programming 2021 (October 11, 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.

Full text
Abstract:
In order to improve the retrieval ability of multiview attribute coded image network teaching resources, a retrieval algorithm of image network teaching resources based on depth hash algorithm is proposed. The pixel big data detection model of the multiview attribute coding image network teaching resources is constructed, the pixel information collected by the multiview attribute coding image network teaching resources is reconstructed, the fuzzy information feature components of the multiview attribute coding image are extracted, and the edge contour distribution image is combined. The distributed fusion result of the edge contour of the view image of the network teaching resources realizes the construction of the view feature parameter set. The gray moment invariant feature analysis method is used to realize information coding, the depth hash algorithm is used to realize the retrieval of multiview attribute coded image network teaching resources, and the information recombination is realized according to the hash coding result of multiview attribute coded image network teaching resources, thus improving the fusion. The simulation results show that this method has higher precision, better retrieval precision, and higher level of resource fusion for multiview coded image network teaching resource retrieval.
APA, Harvard, Vancouver, ISO, and other styles
49

Quoc, Huu Dang, Loc Nguyen The, Cuong Nguyen Doan, Toan Phan Thanh, and Neal N. Xiong. "Intelligent Differential Evolution Scheme for Network Resources in IoT." Scientific Programming 2020 (July 14, 2020): 1–12. http://dx.doi.org/10.1155/2020/8860384.

Full text
Abstract:
Scheduling is a fundamental factor in managing the network resource of the Internet of things. For IoT systems such as production lines, to operate effectively, it is necessary to find an intelligent management scheme, i.e., schedule, for network resources. In this study, we focus on multiskill resource-constrained project scheduling problem (MS-RCPSP), a combinational optimization problem that has received extensive attention from the research community due to its advantages in network resource management. In recent years, many approaches have been utilized for solving this problem such as genetic algorithm and ant colony optimization. Although these approaches introduce various optimization techniques, premature convergence issue also occurs. Moreover, previous studies have only been verified on simulation data but not on real data of factories. This paper formulated the MS-RCPSP and then proposed a novel algorithm called DEM to solve it. The proposed algorithm was developed based on the differential evolution metaheuristic. Besides, we build the reallocate function to improve the solution quality so that the proposed algorithm converges rapidly to global extremum while also avoiding getting trapped in a local extremum. To evaluate the performance of the proposed algorithm, we conduct the experiment on iMOPSE, the simulated dataset used by previous authors in their research studies. In addition, DEM was verified on real dataset supported by a famous textile industry factory. Experimental results on both simulated data and real data show that the proposed algorithm not only finds a better schedule compared with related works but also can reduce the processing time of the production line currently used at the textile industry factory.
APA, Harvard, Vancouver, ISO, and other styles
50

Kunst, Rafael, Leandro Avila, Edison Pignaton, Sergio Bampi, and Juergen Rochol. "Improving network resources allocation in smart cities video surveillance." Computer Networks 134 (April 2018): 228–44. http://dx.doi.org/10.1016/j.comnet.2018.01.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography