Artículos de revistas sobre el tema "Computer networks"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Computer networks.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Computer networks".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, n.º 9 (30 de septiembre de 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Texto completo
Resumen
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Sireesha, Manchoori y Gobi N. "Computer Networks". International Journal of Research Publication and Reviews 5, n.º 3 (2 de marzo de 2024): 1020–24. http://dx.doi.org/10.55248/gengpi.5.0324.0640.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hyman, William A. "Medical Devices, Computers, and Computer Networks". Biomedical Safety & Standards 39, n.º 1 (enero de 2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ren, Xiaohui, Iftikhar Ahmed y Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs". Journal of Combinatorial Mathematics and Combinatorial Computing 117 (1 de agosto de 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Texto completo
Resumen
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Qin, Peng. "Analysis of a Model for Computer Virus Transmission". Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Texto completo
Resumen
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

GOTO, Eiji. "Using Computers and Computer Networks in U.S.A." Journal of Agricultural Meteorology 50, n.º 2 (1994): 135–39. http://dx.doi.org/10.2480/agrmet.50.135.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bogucki, Peter. "Computer Networks". Anthropology News 27, n.º 6 (septiembre de 1986): 2. http://dx.doi.org/10.1111/an.1986.27.6.2.1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Brinn, L. W. "Computer Networks". ACM SIGCSE Bulletin 17, n.º 1 (marzo de 1985): 135–39. http://dx.doi.org/10.1145/323275.323305.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Jensen, Pamela S. "Computer Networks". Investigative Radiology 20, n.º 6 (septiembre de 1985): 648. http://dx.doi.org/10.1097/00004424-198509000-00026.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael y Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET". UKH Journal of Science and Engineering 3, n.º 1 (22 de mayo de 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Texto completo
Resumen
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Mathew, Jincy C. "Review on Architecture of Computer Networks". International Journal of Psychosocial Rehabilitation 24, n.º 4 (30 de abril de 2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks". Mathematics Teacher 89, n.º 1 (enero de 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Texto completo
Resumen
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Glăvan, Dragoș. "Sniffing attacks on computer networks". Scientific Bulletin of Naval Academy XXIII, n.º 1 (15 de julio de 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.

Texto completo
Resumen
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Bidaybekov, Ye Y., Y. K. Khenner, Sh T. Shekerbekova y Y. Н. Zhabayev. "ON THE ISSUE OF TRAINING FUTURE COMPUTER SCIENCE TEACHERS IN COMPUTER". BULLETIN Series of Physics & Mathematical Sciences 72, n.º 4 (29 de septiembre de 2020): 174–79. http://dx.doi.org/10.51889/2020-4.1728-7901.27.

Texto completo
Resumen
The article discusses of training future computer science teachers in computer networks based on network simulation. Analysis of scientific and pedagogical and educational literature has shown that in the training of computer science teachers, computer networks are studied in the aspect of information simulation of their structures, while simulation the processes of their functioning is not given due attention, despite the possibility of its use in the organization of training. Most educational institutions face organizational, technical and material difficulties when organizing training in computer networks on real equipment. The above-mentioned difficulties in training future computer science teachers in computer networks can be avoided by using network simulation. By network simulation, we mean reproducing a dynamic image of the main network components (network cables, switches, hubs, routers, etc.) and visualization the processes of their configuration and operation on the computer screen.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Lazarov, Andon D. "Mathematical Modelling of Malware Intrusion in Computer Networks". Cybernetics and Information Technologies 22, n.º 3 (1 de septiembre de 2022): 29–47. http://dx.doi.org/10.2478/cait-2022-0026.

Texto completo
Resumen
Abstract Malware attacks cause great harms in the contemporary information systems and that requires analysis of computer networks reaction in case of malware impact. The focus of the present study is on the analysis of the computer network’s states and reactions in case of malware attacks defined by the susceptibility, exposition, infection and recoverability of computer nodes. Two scenarios are considered – equilibrium without secure software and not equilibrium with secure software in the computer network. The behavior of the computer network under a malware attack is described by a system of nonhomogeneous differential equations. The system of the nonhomogeneous differential equations is solved, and analytical expressions are derived to analyze network characteristics in case of susceptibility, exposition, infection and recoverability of computer nodes during malware attack. The analytical expressions derived are illustrated with results of numerical experiments. The conception developed in this work can be applied to control, prevent and protect computer networks from malware intrusions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Mulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN". Jurnal Informatika Komputer, Bisnis dan Manajemen 19, n.º 3 (20 de noviembre de 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.

Texto completo
Resumen
The development of computer networks is so fast along with technological developments. IPv6 is a new type of IP addressing as a successor to the IPv4 type. This study uses the type of network configuration using IPv6.The application of IPv6 in this computer network configuration is to prove that IPv6 can be used to replace IPv4 in building computer networks. The method used in this research is to conduct a trial with one of the computer network simulation software, namely Cisco Packet Tracer from a network topology that has been designed. This research was carried out through 5 stages as follows: making network design, analysis of network device requirements, conceptual analysis of configuration requirements, software network configuration and network connectivity tests. IPv6 can be used to build networks from the simplest to complex networks including LAN networks. The test results of the two network topology experiments made can be configured using IPv6 and it is proven that all computers connected to the network are all connected (100%) after the connectivity test using the ping utility. IPv6 is recommended to be used along with the increasing use of telecommunications equipment that requires an internet connection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Wellman, B. "Computer Networks As Social Networks". Science 293, n.º 5537 (14 de septiembre de 2001): 2031–34. http://dx.doi.org/10.1126/science.1065547.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

S.I., Arubere y Okardi B. "Fundamentals of Communication Technology and Networks". British Journal of Computer, Networking and Information Technology 4, n.º 1 (2 de junio de 2021): 1–12. http://dx.doi.org/10.52589/bjcnit-3vorvhit.

Texto completo
Resumen
This paper work generally examines the computer network, the basic classification and types of networks, network goals and the benefits a computer network offers to researchers, individuals and organizations. It also pinpoints the graphical arrangement of the computer network, as well as basic building blocks and general overview of data transmission. Data were collected from primary sources where personal interviews were conducted and were analyzed and presented for statistical decision. This research shows the importance of networks in our ever-growing environment. This paper tends to present an overview and an introduction of some of the fundamental components enabling efficient and effective data communication and transmission. For better network efficiency, we need the right Network components, the right network design, and also the right IT expertise in the design and implementation of any network system. Multiple numbers of computers forming a network tend to enhance computing power and increase the productivity of the network in general.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Yuri Ariyanto, Atiqah Nurul Asri, Yoppy Yunhasnawa, Faiz Ushbah Mubarok y Mungki Astiningrum. "INSTALASI JARINGAN KOMPUTER SEBAGAI PENUNJANG LAYANAN ADMINISTRASI MASYARAKAT DESA KARANGDUREN KAB. MALANG". Jurnal Pengabdian Kepada Masyarakat 9, n.º 2 (30 de diciembre de 2022): 158–61. http://dx.doi.org/10.33795/jabdimas.v9i2.190.

Texto completo
Resumen
At the village level, administrative services are the main service and are directly related to the needs of the community. Administrative services can be in the form of issuing certificates, cover letters, letters of recommendation, legalization, and other letters. For administrative services in correspondence, the problems faced by the Karangduren village office regarding the installation of computer networks. Currently, computers that store data and applications for mailing repositories are not yet connected to other computers, resulting in queuing and slow document processing. With these problems, PPM (Pengabdian Pada Masyarakat) activities will be carried out in the form of "Implementation of Computer Network Installation to Support Mailing Repository Applications at the Karangduren Village Office, Kec. Pakisaji, Kab. Malang". Through PPM activities in Karangduren village, Kec. Pakisaji, Kab. Malang is done to help solve problems regarding the installation of computer networks. By installing a computer network at the village office, all computers in the village office can be connected. So with the installation of this computer network, it can improve the service and performance of the Karangduren Village Office in serving the community. The results of this PPM activity will produce a computer network installation design and a basic computer network manual.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Sathyamurthy, N. "Let There be Computers and Virtual Computer Networks!" Resonance 25, n.º 10 (octubre de 2020): 1463–66. http://dx.doi.org/10.1007/s12045-020-1063-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Levin, Ilya, Mark Korenblit y Vadim Talis. "STUDY OF SOCIAL NETWORKS’ DYNAMICS BY SIMULATION WITHIN THE NODEXL-EXCEL ENVIRONMENT". Problems of Education in the 21st Century 54, n.º 1 (20 de junio de 2013): 125–37. http://dx.doi.org/10.33225/pec/13.54.125.

Texto completo
Resumen
The present study is an analysis of the learning activity, which constitutes simulation of networks and studying their functioning and dynamics. The study is based on using network-like learning environments. Such environments allow building computer models of the network graphs. According to the suggested approach, the students construct dynamic computer models of the networks' graphs, thus implementing various algorithms of such networks’ dynamics. The suggested tool for building the models is the software environment comprising network analysis software NodeXL and a standard spreadsheet Excel. The proposed approach enables the students to visualize the network's dynamics. The paper presents specific examples of network models and various algorithms of the network's dynamics, which were developed based on the proposed approach. Key words: learning environments, modelling, social networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Smith, E. "Review: Computer Networks". Computer Bulletin 46, n.º 1 (1 de enero de 2004): 30. http://dx.doi.org/10.1093/combul/46.1.30.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Đokić, Ratomir Đ. y Milorad S. Markagić. "Computer networks forensics". Vojnotehnicki glasnik 61, n.º 1 (2013): 136–45. http://dx.doi.org/10.5937/vojtehg61-1493.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Smythe, C. "Computer Communication Networks". Electronics & Communications Engineering Journal 4, n.º 1 (1992): 31. http://dx.doi.org/10.1049/ecej:19920007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Max, G. "Modelling computer networks". Journal of Physics: Conference Series 268 (1 de enero de 2011): 012018. http://dx.doi.org/10.1088/1742-6596/268/1/012018.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Gorodetskii, V. I., I. V. Kotenko y R. M. Yusupov. "Computer networks safety". Herald of the Russian Academy of Sciences 76, n.º 4 (julio de 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Quarterman, John S. y Josiah C. Hoskins. "Notable computer networks". Communications of the ACM 29, n.º 10 (octubre de 1986): 932–71. http://dx.doi.org/10.1145/6617.6618.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Fluck, Andrew. "Using Computer Networks". British Journal of Special Education 16, n.º 1 (8 de junio de 2007): 14. http://dx.doi.org/10.1111/j.1467-8578.1989.tb01352.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Bushur, Jacob y Chao Chen. "Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing". International Journal of Computer Science and Information Technology 14, n.º 03 (30 de junio de 2022): 41–54. http://dx.doi.org/10.5121/ijcsit.2022.14304.

Texto completo
Resumen
Distributed computing networks harness the power of existing computing resources and grant access to significant computing power while averting the costs of a supercomputer. This work aims to configure distributed computing networks using different computer devices and explore the benefits of the computing power of such networks. First, an HTCondor pool consisting of sixteen Raspberry Pi single-board computers and one laptop is created. The second distributed computing network is set up with Windows computers in university campus labs. With the HTCondor setup, researchers inside the university can utilize the lab computers as computing resources. In addition, the HTCondor pool is configured alongside the BOINC installation on both computer clusters, allowing them to contribute to high-throughput scientific computing projects in the research community when the computers would otherwise sit idle. The scalability of these two distributed computing networks is investigated through a matrix multiplication program and the performance of the HTCondor pool is also quantified using its built-in benchmark tool. With such a setup, the limits of the distributed computing network architecture in computationally intensive problems are explored.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Potuzak, Tomas. "Methods for division of road traffic network for distributed simulation performed on heterogeneous clusters". Computer Science and Information Systems 10, n.º 1 (2013): 321–48. http://dx.doi.org/10.2298/csis120601006p.

Texto completo
Resumen
The computer simulation of road traffic is an important tool for control and analysis of road traffic networks. Due to their requirements for computation time (especially for large road traffic networks), many simulators of the road traffic has been adapted for distributed computing environment where combined power of multiple interconnected computers (nodes) is utilized. In this case, the road traffic network is divided into required number of sub-networks, whose simulation is then performed on particular nodes of the distributed computer. The distributed computer can be a homogenous (with nodes of the same computational power) or a heterogeneous cluster (with nodes of various powers). In this paper, we present two methods for road traffic network division for heterogeneous clusters. These methods consider the different computational powers of the particular nodes determined using a benchmark during the road traffic network division.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Koam, Ali N. A., Ali Ahmad y Ashfaq Ahmed Qummer. "On the Study of Reverse Degree-Based Topological Properties for the Third Type of p th Chain Hex-Derived Network". Journal of Mathematics 2021 (3 de noviembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/4540276.

Texto completo
Resumen
Vertices and edges are made from a network, with the degree of a vertex referring to the number of connected edges. The chance of every vertex possessing a given degree is represented by a network’s degree appropriation, which reveals important global network characteristics. Many fields, including sociology, public health, business, medicine, engineering, computer science, and basic sciences, use network theory. Logistical networks, gene regulatory networks, metabolic networks, social networks, and driven networks are some of the most significant networks. In physical, theoretical, and environmental chemistry, a topological index is a numerical value assigned to a molecular structure/network that is used for correlation analysis. Hexagonal networks of dimension t are used to build hex-derived networks, which have a wide range of applications in computer science, medicine, and engineering. For the third type of hex-derived networks, topological indices of reverse degree based are discussed in this study.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Afrizal, Afrizal y Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, n.º 1 (9 de septiembre de 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Texto completo
Resumen
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address conflicts around the world, the IP address allocation and distribution blocks for each Internet service providers worldwide is arranged by RFC (Request for Comments) standards. This journal describes the IPv4 and IPv6 addresses technology implementation on the host connected in a computer network. It is expected that with this journal both IP addresses generation can be applied in a computer network appropriately.Keywords:ip address, ipv4, ipv6
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Shkilniak, S. S. y Yu Yu Yurchenko. "Methods of ensuring the security of computer network". Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Texto completo
Resumen
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Teguh Tamrin, Nur Muhaidi, Anang Fathul Arifin y Ariyanto. "IMPLEMENTASI METODE VLSM (VARIABLE LENGTH SUBNET MASK) PADA PEMETAAN IP ADDRESS LAN (LOCAL AREA NETWORK) DI LAB FAKULTAS SAINT DAN TEKNOLOGI (FST) UNISNU JEPARA". Jurnal Publikasi Teknik Informatika 2, n.º 1 (20 de enero de 2023): 6–11. http://dx.doi.org/10.55606/jupti.v1i1.963.

Texto completo
Resumen
Information technology is increasingly playing a role in supporting the efficiency and effectiveness of communication in modern organizations. Especially after the development of information technology which has an impact on the ease of communication. Computer networks can provide a communication medium for computer-based devices to exchange data and information. One of the computer networks is a Local Area Network (LAN). LAN is a computer network that includes computers that are connected to each other in one room or a building. Computer network settings can be done at the host level, by configuring the host addressing in it. Good host addressing will make it easier for computer network management so that it will optimize the performance of the computer network. One of the rules that can be used for addressing computer networks is the Variable Length Subnet Mask (VLSM). VLSM is a development of subnetting, which further optimizes the use of the subnet itself. Sometimes the subnet division still leaves host addressing, VLSM sees this deficiency and makes the remaining host addresses then set to form a new subnet. So it can be said that VLSM forms a subnet within a subnet. This study performs network addressing by subnetting and using VLSM to better manage the addresses of all hosts on the computer network. The results of the addressing made are expected to be implemented in the Faculty of Industrial Technology. This study does not calculate the bandwidth load obtained after the implementation of VLSM.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Ayu tiara sunja, Sunja y Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya". International Journal Cister 1, n.º 02 (1 de agosto de 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Texto completo
Resumen
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Refaee, Eshrag A. y Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors". Complexity 2021 (26 de abril de 2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Texto completo
Resumen
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Fan, Chengmei, M. Mobeen Munir, Zafar Hussain, Muhammad Athar y Jia-Bao Liu. "Polynomials and General Degree-Based Topological Indices of Generalized Sierpinski Networks". Complexity 2021 (9 de febrero de 2021): 1–10. http://dx.doi.org/10.1155/2021/6657298.

Texto completo
Resumen
Sierpinski networks are networks of fractal nature having several applications in computer science, music, chemistry, and mathematics. These networks are commonly used in chaos, fractals, recursive sequences, and complex systems. In this article, we compute various connectivity polynomials such as M -polynomial, Zagreb polynomials, and forgotten polynomial of generalized Sierpinski networks S k n and recover some well-known degree-based topological indices from these. We also compute the most general Zagreb index known as α , β -Zagreb index and several other general indices of similar nature for this network. Our results are the natural generalizations of already available results for particular classes of such type of networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Irwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono y Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB". Infotech: Journal of Technology Information 8, n.º 2 (30 de noviembre de 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.

Texto completo
Resumen
The form of computer network connection can be via cable or wireless such as fiber optic, microwave, wireless, or satellite. One type of computer network that is often used to connect personal computers and workstations in an office or an organization, company or factory for the use of shared resources is a local area network. The purpose of this research is to analyze, design and create an application that can detect damage to Local Area Network (LAN) networks. The research method used is backward chaining. The results of this study are applications that can detect damage to local area networks using the web-based backward chaining method. With this expert system application, it can speed up and make it easier to detect damage to Local Area Network networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Patel, Dhyan. "A Research Paper on Basic of Computer Network". International Journal for Research in Applied Science and Engineering Technology 12, n.º 2 (29 de febrero de 2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Texto completo
Resumen
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, encompass a variety of entities ranging from personal computers and phones to servers and networking hardware. Computer networks enable various applications to access resources such as the World Wide Web, shared application and storage servers, printers, fax machines, as well as email and instant messaging applications. They play a pivotal role in facilitating information sharing across diverse tasks.Computer networks can be classified into two types: open systems and closed systems. Open systems are easily connected to networks and are primed for communication. Conversely, closed systems require proper authentication and are not as readily connected to other networks..
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Wu, Binbin, Jingyu Xu, Yifan Zhang, Bo Liu, Yulu Gong y Jiaxin Huang. "Integration of computer networks and artificial neural networks for an AI-based network operator". Applied and Computational Engineering 64, n.º 1 (15 de mayo de 2024): 122–27. http://dx.doi.org/10.54254/2755-2721/64/20241370.

Texto completo
Resumen
This paper proposes an integrated approach combining computer networks and artificial neural networks to construct an intelligent network operator, functioning as an AI model. State information from computer networks is transformed into embedded vectors, enabling the operator to efficiently recognize different pieces of information and accurately output appropriate operations for the computer network at each step. The operator has undergone comprehensive testing, achieving a 100% accuracy rate, thus eliminating operational risks. Additionally, a simple computer network simulator is created and encapsulated into training and testing environment components, enabling automation of the data collection, training, and testing processes. This abstract outline the core contributions of the paper while highlighting the innovative methodology employed in the development and validation of the AI-based network operator.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Mijwel, Maad M., Adam Esen y Aysar Shamil. "Overview of Neural Networks". Babylonian Journal of Machine Learning 2023 (11 de agosto de 2023): 42–45. http://dx.doi.org/10.58496/bjml/2023/008.

Texto completo
Resumen
Since it was confirmed and verified that the human nervous system consists of individual cells, which were later called neurons, and it was discovered that these cells connect with each other to form an extensive communication network, a large number of possibilities have been opened for application in multiple disciplines in areas of knowledge. Neural Networks are created to perform tasks such as pattern recognition, classification, regression, and many other functions that serve humans and are an essential component in the field of machine learning and artificial intelligence. In computer science, progress has been made, and computers are supposed to learn how to solve problems like that of the human brain. Through pre-established examples, the computer must be able to provide solutions to issues that are like those presented during training. This article overviews neural networks and their application in developing computer systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Giniyatova, Dinara Halilovna y Vasilii Aleksandrovich Lapinskii. "Nodules detection on computer tomograms using neural networks". Program Systems: Theory and Applications 13, n.º 3 (10 de septiembre de 2022): 81–98. http://dx.doi.org/10.25209/2079-3316-2022-13-3-81-98.

Texto completo
Resumen
Results of neural networks (NN) application to the problem of detecting neoplasms on computer tomograms of the lungs with limited amount of data are presented. Much attention is paid to the analysis and preprocessing of images as a factor improving the NN quality. The problem of NN overfitting and ways to solve it are considered. Results of the presented experiments allow drawing a conclusion about the efficiency of applying individual NN architectures in combination with data preprocessing methods to detection problems even in cases of a limited training set and a small size of detected objects.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Brar, Gurbinder Singh y Rahul Malhotra. "Wireless Computer Networks and Associated Energy Efficient Protocols". SIJ Transactions on Computer Networks & Communication Engineering 01, n.º 05 (20 de diciembre de 2013): 06–09. http://dx.doi.org/10.9756/sijcnce/v1i5/0105370201.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Yeh, Wei-Chang, Edward Lin y Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus". Complexity 2021 (10 de julio de 2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.

Texto completo
Resumen
With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Raza, Ali, Mobeen Munir, Tasawar Abbas, Sayed M. Eldin y Ilyas Khan. "Spectrum of prism graph and relation with network related quantities". AIMS Mathematics 8, n.º 2 (2022): 2634–47. http://dx.doi.org/10.3934/math.2023137.

Texto completo
Resumen
<abstract><p>Spectra of network related graphs have numerous applications in computer sciences, electrical networks and complex networks to explore structural characterization like stability and strength of these different real-world networks. In present article, our consideration is to compute spectrum based results of generalized prism graph which is well-known planar and polyhedral graph family belongs to the generalized Petersen graphs. Then obtained results are applied to compute some network related quantities like global mean-first passage time, average path length, number of spanning trees, graph energies and spectral radius.</p></abstract>
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Ming, Xiaobo, Ying Chen y Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy". MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Texto completo
Resumen
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Jarah, Baker Akram Falah, Mufleh Amin AL Jarrah, Salam Nawaf Almomani, Emran AlJarrah y Maen Al-Rashdan. "The effect of reliable data transfer and efficient computer network features in Jordanian banks accounting information systems performance based on hardware and software, database and number of hosts". International Journal of Data and Network Science 7, n.º 1 (2023): 357–62. http://dx.doi.org/10.5267/j.ijdns.2022.9.012.

Texto completo
Resumen
Reliable data transfer protocols are algorithmic techniques that guarantee the safe and secure transport of data through networks that could experience data loss or corruption. The performance of the systems and some accounting information systems (AIS) will be negatively impacted if the real-time data is not sent. The main factors that affect the performance of computer networks are the number of users, the hardware and software and the bandwidth. The computer network performance will play a role in the performance of the banks as it is an important component of the bank infrastructure. With the advancement of information technology, network technology, and computer technology, computers have been utilized to aid AIS operations, and AIS has become an unavoidable trend of development. Therefore, the purpose of this study was to investigate Data analysis in computer networks to improve AIS performance in Jordanian banks. A questionnaire was used to obtain the information. Jordanian banks account for the bulk of the participants in the survey. A total of 115 people took part in the study. According to the conclusions of this study, communication technology networks have a statistically significant impact on the growth of Jordanian banks' improved AIS performance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus y Markus Happe. "Self-Awareness in Computer Networks". International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Texto completo
Resumen
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Isabelle Pope. "Social Network Dynamic Modeling via Mathematical Applicative Formulae". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 05–08. http://dx.doi.org/10.17762/msea.v70i1.7.

Texto completo
Resumen
For one or more files contained in databases, the computer forms a leading site for storage. In the majority of large firms, the databases tend to be in central systems, rather than on the individual employee computers. It is also worth noting that computer servers are contained in these respective firm central systems, offering services over networks. The implication is that the server hosts database files but, using different firm computers, an operator can access the files. An increase in database complexity translates into the formation of a social network. Therefore, a social network becomes a database collection working together. The role of social networks lies in their capacity to foster data integration from different databases, giving the information new insights. Given that the ultimate goal of business organizations stretches beyond data storage to support decision-making in relation to the resultant data, this paper has established that social networks play a critical role towards the achievement of this goal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Magnaye, Nicko A. "Advancements in computer network technologies: A review". Metaverse 5, n.º 1 (25 de abril de 2024): 2315. http://dx.doi.org/10.54517/m.v5i1.2315.

Texto completo
Resumen
<p>This article presents a comprehensive review of recent advancements in computer network technologies, emphasizing their impact on various sectors. The rapid evolution of computer networks has transformed communication, work, and business. From 5G networks and the Internet of Things (IoT) to network security and quantum networking, this review explores the current state of computer networks and their prospects.<strong></strong></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía