Articoli di riviste sul tema "Christianity – computer network resources"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Christianity – computer network resources.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Christianity – computer network resources".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Goffe, William L. "Computer Network Resources for Economists". Journal of Economic Perspectives 8, n. 3 (1 agosto 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Testo completo
Abstract (sommario):
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Checketts, Levi. "The Cross and the Computer: Actor-Network Theory and Christianity". Theology and Science 15, n. 1 (2 gennaio 2017): 116–27. http://dx.doi.org/10.1080/14746700.2016.1265223.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Bura, Aman, e Yang Dacheng . "GPRS Network Resources Optimization". Information Technology Journal 5, n. 5 (15 agosto 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Humaedi, M. Alie. "KONVERSI KEAGAMAAN PASCA 1965, MENGURAI DAMPAK SOSIAL BUDAYA DAN HUBUNGAN ISLAM KRISTEN DI PEDESAAN JAWA". Harmoni 16, n. 2 (1 gennaio 2018): 218–40. http://dx.doi.org/10.32488/harmoni.v16i2.16.

Testo completo
Abstract (sommario):
The relationship between Islam and Christianity in various regions is often confronted with situations caused by external factors. They no longer debate the theological aspect, but are based on the political economy and social culture aspects. In the Dieng village, the economic resources are mostly dominated by Christians as early Christianized product as the process of Kiai Sadrach's chronicle. Economic mastery was not originally as the main trigger of the conflict. However, as the political map post 1965, in which many Muslims affiliated to the Indonesian Communist Party convert to Christianity, the relationship between Islam and Christianity is heating up. The question of the dominance of political economic resources of Christians is questionable. This research to explore the socio cultural and religious impact of the conversion of PKI to Christian in rural Dieng and Slamet Pekalongan and Banjarnegara. This qualitative research data was extracted by in-depth interviews, observations and supported by data from Dutch archives, National Archives and Christian Synod of Salatiga. Research has found the conversion of the PKI to Christianity has sparked hostility and deepened the social relations of Muslims and Christians in Kasimpar, Petungkriono and Karangkobar. The culprit widened by involving the network of Wonopringgo Islamic Boarding. It is often seen that existing conflicts are no longer latent, but lead to a form of manifest conflict that decomposes in the practice of social life.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Bishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley e Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction". Journal of Geography 92, n. 3 (maggio 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

骆, 又麟. "Application of Network Resources in Computer Teaching". Vocational Education 13, n. 03 (2024): 836–40. http://dx.doi.org/10.12677/ve.2024.133135.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Niu, Yiming, Wenyong Du e Zhenying Tang. "Computer Network Security Defense Model". Journal of Physics: Conference Series 2146, n. 1 (1 gennaio 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Testo completo
Abstract (sommario):
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Macleod, Roderick A. "Network resources and access tools". New Review of Information Networking 10, n. 1 (maggio 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

MacLeod, Roderick A. "Network resources and access tools". New Review of Information Networking 9, n. 1 (gennaio 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Weigeng, Shi. "Reconnectable network with limited resources". Journal of Computer Science and Technology 6, n. 3 (luglio 1991): 243–49. http://dx.doi.org/10.1007/bf02945511.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Samsonowicz, Henryk. "The long 10th century, or the creation of the New Europe". European Review 6, n. 3 (agosto 1998): 277–81. http://dx.doi.org/10.1017/s1062798700003318.

Testo completo
Abstract (sommario):
The tenth century was when the spread of Christianity through Europe commenced the transformation of various state and tribal formations into the form that persisted and that we can recognize today. The political and economic development of Islam created a demand for people from which the new states also derived material resources. Trade and plunder led by the Vikings stimulated the formation of states and strengthened them, this was aided further by the existence of a stable network of roads.
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Xin Wang e H. Schulzrinne. "Pricing network resources for adaptive applications". IEEE/ACM Transactions on Networking 14, n. 3 (giugno 2006): 506–19. http://dx.doi.org/10.1109/tnet.2006.872574.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Liu, Li Jun. "Research on Computer Network Data Transfer Methods". Advanced Materials Research 926-930 (maggio 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.

Testo completo
Abstract (sommario):
In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and realization of dynamic task assignment algorithm and Performance experiment of the system.
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Lu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources". Mobile Information Systems 2022 (14 settembre 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.

Testo completo
Abstract (sommario):
The balanced distribution of multimedia wireless network modular teaching resources is improved by optimizing and adjusting the balanced distribution of multimedia wireless network modular teaching resources. Based on block grid balanced scheduling and resource spectrum fusion, a balanced distribution method of multimedia wireless network modular teaching resources is proposed. A blockchain Internet of Things accesses control network architecture system for the balanced allocation of multimedia wireless network modular teaching resources established using the priority business scheduling method. Modular resource allocation of multimedia wireless networks and adaptive forwarding are adjusted to control the data packets. The bandwidth guarantee mechanism is used for the equitable allocation of multimedia wireless network modular teaching resources information flow. Multi-service hierarchical management of multimedia wireless network modular teaching resources spectrum is controlled by block grid balanced scheduling and resource spectrum fusion. The high-energy physical computing system structure is used to allocate the resource spectrum balance of the modular teaching resources of the multimedia wireless networks, ensuring the bandwidth requirements of various services. The classified management and balanced allocation of the multimedia wireless networks’ teaching storage, system, and teaching spectrum resources are made possible. The results of the tests show that this method effectively reduces the delay in the allocation of modular multimedia wireless network teaching resources, improves the utilization rate of modular multimedia wireless network teaching resources, and significantly improves their reading and writing performance.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Giladi, Ran, Ephraim Korach e Rony Ohayon. "Placement of network resources in communication networks". Computer Networks 43, n. 2 (ottobre 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Cao, Jun. "Cloud Computing-Based Online Sharing Method of Mass Resources in Public Libraries". Mobile Information Systems 2022 (28 settembre 2022): 1–9. http://dx.doi.org/10.1155/2022/8925897.

Testo completo
Abstract (sommario):
In order to realize the online sharing of massive resources and capitals in public libraries under the circumstances of network environment and cultural construction, it is desirable to invent new sharing policies. In this paper, we put forward a method of online sharing of massive resources in public libraries which is established on cloud computing. Cloud computing technique is implemented to collect the statistical information characteristics of public library’s massive resources under the condition of network environment and culture construction, and an adaptive fusion clustering processing model of public library’s massive resources under the condition of network environment and culture construction is constructed. Moreover, the correlation statistical feature detection approach is used to accomplish fuzzy scheduling and feature mining of public library’s massive resources under the condition of network environment and culture construction. The information storage center management database of public library’s massive resources under the condition of network environment and culture construction is established. The fuzzy C-means clustering approach is implemented in the database to cluster the massive resources of public library under the condition of network environment and culture construction. Combined with cloud computing technology, the sharing and classified management scheduling of massive resources of public library under the condition of network environment and culture construction are comprehended. The simulation outcomes confirm that the adaptive performance of public library’s massive resource sharing management under the condition of network environment and culture construction is better, and the adaptive scheduling performance of resources is better. The data clustering of public library’s massive resources under the condition of network environment and culture construction is stronger, which improves the online sharing level of public library’s massive resources under the condition of network environment and culture construction.
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Wang, Qian, Chun Yan Yang e Chang Qing Cui. "The Research of Distributed Computer Network Technology Based on Web". Applied Mechanics and Materials 631-632 (settembre 2014): 985–88. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.985.

Testo completo
Abstract (sommario):
With the rapid development of network technology, network scale, the increasing complexity, traditional centralized network data collecting the methods already cannot adapt to this situation, a web-based distributed computing structure because of its many advantages are widely used. This paper proposes a construct Web application framework of distributed application system, combination of Web technology and the SNMP network management technology. Thereby, it can maintain the increasingly huge network system, ensure that all the good operation of the network resources, the management of the convenient and easy to use network resources.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Chen, Liying. "The Application of Computer Management System in Physical Education Teaching". E3S Web of Conferences 275 (2021): 03016. http://dx.doi.org/10.1051/e3sconf/202127503016.

Testo completo
Abstract (sommario):
School physical education(PE) is an indispensable part of school education, which plays an important and irreplaceable role in training builders of socialist cause with all-round development of morality, intelligence and sports. Sports network teaching management greatly improves the efficiency and efficiency of school sports teaching, which is a great change of the traditional mode., it provides a solid foundation for the establishment of Sports Network Teaching in Colleges and universities(CAU). This paper mainly studies the application of computer management system(CMS) in physical education teaching(PET). This paper studies and analyzes the method of university teaching computer management resources integration, studies the architecture of sports teaching CMS from four aspects of computing resources, storage resources, backup resources and network system, and uses ant colony algorithm to design and use sports teaching CMS. This paper also uses charts to analyze students’ attitude towards the use of CMS in PET, and the proportion of CMS in PET. The experimental results show that in the CMS of PET, the computing resources account for 38.33%, the storage resources account for 31.76%, the backup resources account for 14.62%, and the network system account for 15.29%.
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Soule, Robert, Shrutarshi Basu, Parisa Jalili Marandi, Fernando Pedone, Robert Kleinberg, Emin Gun Sirer e Nate Foster. "Merlin: A Language for Managing Network Resources". IEEE/ACM Transactions on Networking 26, n. 5 (ottobre 2018): 2188–201. http://dx.doi.org/10.1109/tnet.2018.2867239.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Scott, Paul, Dan Gordon, Evan Franklin, Laura Jones e Sylvie Thiebaux. "Network-Aware Coordination of Residential Distributed Energy Resources". IEEE Transactions on Smart Grid 10, n. 6 (novembre 2019): 6528–37. http://dx.doi.org/10.1109/tsg.2019.2907128.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Mshvidobadze, Tinatin. "Computer Network and Computer Grid Joins to E-Learning". Journal of Technical Science and Technologies 4, n. 2 (22 maggio 2016): 35–37. http://dx.doi.org/10.31578/jtst.v4i2.81.

Testo completo
Abstract (sommario):
According to the development of communications and web-based technologies in recent years, e-Learning has became very important for everyone and is seen as one of the most dynamic teaching methods. Grid computing is a pattern for increasing the computing power and storage capacity of a system and is based on hardware and software resources in a network with common purpose. In the present article grid architecture is shown and its different layers are described. This layer is heart of grid learning architecture and, in fact, regardless of this layer, e-Learning based on grid architecture will not be feasible.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Hernández-Orallo, Enrique, e Joan Vila-Carbó. "Network Provisioning Using Multimedia Aggregates". Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/30893.

Testo completo
Abstract (sommario):
Multimedia traffic makes network provisioning a key issue. Optimal provisioning of network resources is crucial for reducing the service cost of multimedia transmission. Multimedia traffic requires not only provisioning bandwidth and buffer resources in the network but also guaranteeing a given maximum end-to-end delay. In this paper we present methods and tools for the optimal dimensioning of networks based on multimedia aggregates. The proposed method minimises the network resources reservations of traffic aggregates providing a bounded delay. The paper also introduces several methods to generate multimedia traffic aggregation using real video traces. The method is evaluated using a network topology based on the European GÉANT network. The results of these simulations allow us to discover the relationship between a required delay and the necessary bandwidth reservation (or the achievable utilisation limit). An interesting conclusion of these scenarios is that, following several recommendations, the network utilisation can reach values of around80%or higher.
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Xi Liang, Xi Liang, e Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship". 網際網路技術學刊 23, n. 1 (gennaio 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.

Testo completo
Abstract (sommario):
<p>Aiming at the problems of poor balance of recommended resources in the recommendation of traditional physical education network teaching resources and low trust degree of recommended physical education network teaching resources, this paper proposes a balanced recommendation algorithm for physical education network teaching resources based on trust relationship. By SVM algorithm, the teaching resources of physical education network are classified, and then the invalid data of teaching resources of physical education network are deleted, and the remaining teaching resources of physical education network are taken as the extraction object to complete the extraction of teaching resources of physical education network. Through Kalman filtering method, the data of sports network teaching resources with noise are reduced, and then the data with high similarity are fused to complete the preprocessing of physical education network teaching resources data. By constructing the trust relationship model, the relationship attribute between the recommended physical education network teaching resources data is determined. The experimental results show that the highest degree of resource equilibrium recommended by the proposed method is about 96 and the recommended resource trust is high.</p> <p>&nbsp;</p>
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Tan, Tin-Wee, e Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences". Biochemical Education 22, n. 1 (gennaio 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev e Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK". Information technology and computer engineering 58, n. 3 (29 dicembre 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Testo completo
Abstract (sommario):
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available information on methods and tools for securing the architecture of software-defined networks. SDN technology provides greater flexibility and speed in implementing security measures, allowing real-time responses to threats. In contemporary conditions, where cyber threats are becoming more complex and pronounced, SDN networks enable the detection of attacks, blocking malicious actions, and applying security policies in real-time. However, the increasing complexity of cyber threats and constant technological changes necessitate further development and enhancement of the information security of SDN network resources for companies. There is a need for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks. The necessity for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks serves as the foundation for this research. As a result, an enhancement in the level of information security for SDN network resources has been achieved by: 1) reducing the intervention time in the network; 2) applying an improved method of traffic processing based on network security of packet flows, allowing desired network applications to efficiently manage forwarding.
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Voyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)". Computer Music Journal 18, n. 3 (1994): 8. http://dx.doi.org/10.2307/3681174.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Zhao, Guotao, e Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm". Scientific Programming 2021 (11 ottobre 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.

Testo completo
Abstract (sommario):
In order to improve the retrieval ability of multiview attribute coded image network teaching resources, a retrieval algorithm of image network teaching resources based on depth hash algorithm is proposed. The pixel big data detection model of the multiview attribute coding image network teaching resources is constructed, the pixel information collected by the multiview attribute coding image network teaching resources is reconstructed, the fuzzy information feature components of the multiview attribute coding image are extracted, and the edge contour distribution image is combined. The distributed fusion result of the edge contour of the view image of the network teaching resources realizes the construction of the view feature parameter set. The gray moment invariant feature analysis method is used to realize information coding, the depth hash algorithm is used to realize the retrieval of multiview attribute coded image network teaching resources, and the information recombination is realized according to the hash coding result of multiview attribute coded image network teaching resources, thus improving the fusion. The simulation results show that this method has higher precision, better retrieval precision, and higher level of resource fusion for multiview coded image network teaching resource retrieval.
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Zatuliveter, Yu S., e E. A. Fishchenko. "Synergy of Digital Universality of the Global Computer Environment". Programmnaya Ingeneria 13, n. 3 (23 marzo 2022): 107–18. http://dx.doi.org/10.17587/prin.13.107-118.

Testo completo
Abstract (sommario):
The global computer environment (GCE) as a whole is considered an object of research. The system-wide as­pects of implementing the digital transformation of the sociotechnosphere through the GCE are analyzed. Factors of the destructive influence of the fundamental system-technical laws of the spontaneous growth of the GCE on the functioning/development of the sociotechnosphere are presented. Special attention is paid to the study of the features of the apperance of a positive synergetic network effect, expressed by Metcalfs law, in the conditions of the initially open intra-system heterogeneity of the network resources of the existing GCE. It is established that with the increase in the size of large distributed systems implemented in the GCE, the factor of heterogeneity of network resources becomes a source of negative (system-destructive) network synergy, which devalues the positive synergy of Metcalfs law. Examples of ecosystems implemented in the GCE through cloud technologies are considered. It is shown that in the conditions of initially open heterogeneity of network resources, the further increase in the size of large distributed systems leads to an insurmountable increase in the complexity of the system-functional integra­tion of network resources and an uncontrolled decrease in the stability of the sociotechnosphere. The principles of conceptual reengineering the GCE are presented to eliminate the causes of systemic heterogeneity and seamless/ cybersecurity distribution of algorithmic universality, closed in intracomputer resources, to any arbitrarily large subset of GCE computers. Such reengineering will allow neutralizing the negative synergy and maximizing the positive synergy of the Metcalf effect in large distributed systems without restrictions on their size.
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Hidayatulloh, Syarif, e Wahyudin Wahyudin. "Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)". Jurnal Teknik Komputer 5, n. 1 (6 febbraio 2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.

Testo completo
Abstract (sommario):
The use of information technology and its use in collecting and processing data into information that is useful in decision making will play a role in determining the success of an organization or company in the future. This happened to PT. Jasa Cendekia Indonesia, the computer network that is owned has not met the needs of its employees. A good computer network is one that can serve sharing resources, data security, resources more efficiently and up-to-date information. Basically if a company can hold a computer network that serves the above for employees, of course it will make it easier for employees to do the work and improve the standards of the company itself. The proposed network built by the author for PT. Indonesian Scholar Services is a computer network built with Virtual Private Network technology. Because companies that have communication between the head office and branches that are good and safe, will be the capital for their companies in facing challenges in the era of globalization. Communication that is connected to a fast and secure computer network will make it easier for a company to supervise the activities of its company.
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Palkopoulou, Eleni, Dominic Schupke e Thomas Bauschert. "Shared backup router resources: realizing virtualized network resilience". IEEE Communications Magazine 49, n. 5 (maggio 2011): 140–46. http://dx.doi.org/10.1109/mcom.2011.5762810.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Xiaolong Weng. "Design and Implement of PE Network Education Platform Facing to Network Sports Teaching Resources". International Journal of Advancements in Computing Technology 5, n. 7 (15 aprile 2013): 263–71. http://dx.doi.org/10.4156/ijact.vol5.issue7.32.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Du, Zhao, Xiaolong Fu, Can Zhao, Ting Liu e Qifeng Liu. "University campus social network system for knowledge sharing". Computer Science and Information Systems 9, n. 4 (2012): 1721–37. http://dx.doi.org/10.2298/csis120215055d.

Testo completo
Abstract (sommario):
Public online social network services have achieved dazzling success in recent years. As a result, vertical social network services for universities are expected warmly by campus users. As the majority of activities in university campus are knowledge and social interaction intensive, one of the core functions of campus social network system is to facilitate knowledge sharing on campus. In the cyberspace of universities, knowledge is stored in various kinds of digital resources such as documents, photos, videos etc. In this paper, we discuss the design and implementation of our campus social network system, concentrating on knowledge sharing mechanism in the system. The knowledge sharing mechanism has five features including the utilization of users? personal social network to facilitate the dissemination of digital resources, the use of a six-tuple model based tagging to realize the unified labeling for digital resources, the fine-grained access control based on friend lists for safer knowledge sharing, the adoption of a multiscale evaluation method for digital resources and personalized recommendation for digital resource with social graph based collaborative filtering as its core idea. With all these considerations, we expect to improve the efficiency and effectiveness of knowledge while enlarging the dissemination scope of digital resources carrying it in cyberspace of universities.
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Yuan, Siyu, Yong Zhang, Wenbo Qie, Tengteng Ma e Sisi Li. "Deep reinforcement learning for resource allocation with network slicing in cognitive radio network". Computer Science and Information Systems, n. 00 (2020): 55. http://dx.doi.org/10.2298/csis200710055y.

Testo completo
Abstract (sommario):
With the development of wireless communication technology, the requirement for data rate is growing rapidly. Mobile communication system faces the problem of shortage of spectrum resources. Cognitive radio technology allows secondary users to use the frequencies authorized to the primary user with the permission of the primary user, which can effectively improve the utilization of spectrum resources. In this article, we establish a cognitive network model based on under1 lay model and propose a cognitive network resource allocation algorithm based on DDQN (Double Deep Q Network). The algorithm jointly optimizes the spectrum efficiency of the cognitive network and QoE (Quality of Experience) of cognitive users through channel selection and power control of the cognitive users. Simulation results show that proposed algorithm can effectively improve the spectral efficiency and QoE. Compared with Q-learning and DQN, this algorithm can converge faster and obtain higher spectral efficiency and QoE. The algorithm shows a more stable and efficient performance.
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Rong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network". Scientific Programming 2021 (10 giugno 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.

Testo completo
Abstract (sommario):
The main purpose of the integration of network media and middle school ideological and political course is to better realize the moral education function of middle school ideological and political development. The use of resource integration technology to manage distributed teaching resources is conducive to improving the level of information construction in colleges and universities, and so on. This paper puts forward the integration system of ideological and political multimedia network teaching resources based on wireless network. Firstly, it presents an overview of the Radio Resource Management (RRM) problem and projected strategies within wireless network framework, where several Radio Access Technologies (RATs) are collectively controlled and identify the different activities relating to the CRRM issues. Secondly, this paper targets providing a summary of the RRM problem and projected solutions within wireless network. Thirdly, the theoretical elements of the design and the teaching resource management assessment process are clarified by using XML as the data exchange carrier to realize the automatic integration of teaching resources. Fourthly, we have used dSPACE platform, by calling its API function, which then call the subscribe function of dSPACE framework and store the subscription information in the database. Whenever new teaching resources enter the subscribed field, the dSPACE framework will automatically send e-mail to the subscribers. Finally, during the operation of the system, all functions operate normally and have strong security, so as to avoid the illegal theft or leakage of the data about the education system.
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Suhaimi, Hamizan, Saiful Izwan Suliman, Afdallyna Fathiyah Harun, Roslina Mohamad, Yuslinda Wati Mohamad Yusof e Murizah Kassim c. "Genetic algorithm for intrusion detection system in computer network". Indonesian Journal of Electrical Engineering and Computer Science 19, n. 3 (1 settembre 2020): 1670. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1670-1676.

Testo completo
Abstract (sommario):
<span>Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands. In Network Intrusion Detection System (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of Genetic Algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems. </span>
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Wang, Jian Hang, e Hai Bo Wang. "Computer Local Area Network Security and Management". Advanced Materials Research 1079-1080 (dicembre 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.

Testo completo
Abstract (sommario):
Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Olha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS". Problems of Modeling and Design Automatization, n. 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.

Testo completo
Abstract (sommario):
In conditions of high business competition, IT organizations need to respond quickly to the needs of their users who need resources to support business applications. This is due to the rapid spread of the cloud computing model, in which resources can be deployed independently and on demand. Cloud computing is a source of tools to automate the deployment of resources, so IT organizations do not have to spend so much time doing this process manually. When deploying new applications, moving virtual servers or commissioning new instances due to dynamic applications, the network must respond quickly and provide the required type of connection. There has been a significant breakthrough in software configured networks (SDN / NFV) over the past few years. SDN / NFV organizations need to increase network adaptability by automating the network on cloud computing platforms.However, the new challenges posed by the combination of cloud computing and SDN / NFV, especially in the area of enterprise network security, are still poorly understood. This article is about solving this important problem. The article examines the impact on the mechanisms of protection against network attacks in the corporate network, which uses both technologies, simulates DDoS-attacks on cloud computing systems. It has been shown that SDN / NFV technology can really help protect against DDoS attacks if the security architecture is designed correctly.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Dongming Tang, Xianliang Lu e Juguang Li. "Minimizing Network Coding Resources with Improved Genetic Algorithm". International Journal of Digital Content Technology and its Applications 7, n. 3 (15 febbraio 2013): 464–71. http://dx.doi.org/10.4156/jdcta.vol7.issue3.59.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Lee, Jin-Kuk, e Kang-G. Shin. "NetDraino: Saving Network Resources via Selective Packet Drops". Journal of Computing Science and Engineering 1, n. 1 (30 settembre 2007): 31–55. http://dx.doi.org/10.5626/jcse.2007.1.1.031.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Li, Ning. "Study of Computer Network Resource Sharing for Advanced Engineering Applications". Applied Mechanics and Materials 484-485 (gennaio 2014): 799–802. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.799.

Testo completo
Abstract (sommario):
Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user. To analyze and further know the advantages of computer network resource sharing, it is necessary to combine with their actual application conditions. This is analyzed in this paper.
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Javadpour, Amir. "Improving Resources Management in Network Virtualization by Utilizing a Software-Based Network". Wireless Personal Communications 106, n. 2 (18 febbraio 2019): 505–19. http://dx.doi.org/10.1007/s11277-019-06176-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Wang, WenXia. "A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm". Security and Communication Networks 2021 (12 novembre 2021): 1–10. http://dx.doi.org/10.1155/2021/2133042.

Testo completo
Abstract (sommario):
In order to improve the accuracy and efficiency of the classification of network ideological and political resources and promote the efficiency of ideological education, a research on the classification of network ideological and political resources based on the improved SVM algorithm is proposed. We analyze the characteristics and current situation of network ideological and political resources and conclude that the method elements are open and technical. The ontology elements are rich and shared, and the behavioral elements are autonomous and interactive. Three types of network ideological and political resources are proposed: the main resource, content resource, and means resource. The particle swarm algorithm is used to improve the SVM algorithm. In the process of constructing the SVM classifier, the fuzzy membership function is introduced, the classification problem of network ideological and political resources is converted into a secondary planning problem, and the accuracy of network ideological and political resources is finally realized. Simulation results show that the use of improved algorithms to classify network ideological and political resources can improve the accuracy and efficiency of network abnormal data classification.
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Apiecionek, Łukasz, e Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection". JUCS - Journal of Universal Computer Science 26, n. 11 (28 novembre 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.

Testo completo
Abstract (sommario):
One of huge problem for recent IT systems are attacks on their resources called Distributed Denial of Service attacks. Many servers which are accessible from public network were a victim of such attacks or could be in the future. Unfortunately, there is still no effective method for protecting network servers against source of the attack, while such attack could block network resources for many hours. Existing solutions for protecting networks and IoT systems are using mainly firewalls and IDS/IPS mechanisms, which is not sufficient. This article presents the method minimizing the DDoS attacks. Proposed method provides possibilities for the network administrators to protect their servers and IoT network resources during the attack. The proposed fuzzy adaptive algorithm is using Ordered Fuzzy Numbers for predicting amount of packets which could be passed over the network boarder gateway. Proposed solution will give the opportunity for ordinary users to finish their work when the attack occurs.
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Hu, Zhenbing, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko e Oksana Herasymenko. "Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach". International Journal of Intelligent Systems and Applications 9, n. 7 (8 luglio 2017): 41–51. http://dx.doi.org/10.5815/ijisa.2017.07.05.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Nadezhdin, E. N. "THE TASK OF DISTRIBUTING SOFTWARE RESOURCES OF AN INFORMATION-COMPUTER NETWORK". Современные наукоемкие технологии (Modern High Technologies), n. 12 2019 (2019): 89–94. http://dx.doi.org/10.17513/snt.37839.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Feng, Weizhou. "Research on the application of computer network resources in Japanese Teaching". Journal of Physics: Conference Series 1915, n. 3 (1 maggio 2021): 032064. http://dx.doi.org/10.1088/1742-6596/1915/3/032064.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Li, Ya. "Study on the Application of Computer Network Resources in Japanese Teaching". Journal of Physics: Conference Series 1992, n. 3 (1 agosto 2021): 032071. http://dx.doi.org/10.1088/1742-6596/1992/3/032071.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Bailey, Charles W. "Intelligent Multimedia Computer Systems: Emerging Information Resources in the Network Environment". Library Hi Tech 8, n. 1 (gennaio 1990): 29–41. http://dx.doi.org/10.1108/eb047780.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Shen, Qianhe. "Detecting Collectable Resources on Computer Game Based on the Neural Network". Highlights in Science, Engineering and Technology 34 (28 febbraio 2023): 226–31. http://dx.doi.org/10.54097/hset.v34i.5476.

Testo completo
Abstract (sommario):
Image recognition and classification were put in used in many places in recent years thanks to the great progress in machine learning and neural networks. However, seldom evidence indicate applications of image recognition in computer games. Since games are gradually becoming part of peoples life, it is the time to put the focus on those who are unable to enjoy this entertainment. Nowadays computer games often include the element of collecting e.g. (materials or treasure). A program that could automatically mark those collectable objects would significantly improve the gaming experience for those who have disability in their eyes. In this work the game Destiny 2 was used for training and testing and training model chose was Yolov5. 1,500 of images were put into the data set and trained with 350 epochs. The model eventually achieved 0.82 in precision, 0.96 in recall and 0.91 in F1. It also gets the average mAP value of 0.93. These results can strongly prove that this model has the potential to be used in real scenarios.
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Xu, ChangBiao, KePing Long e Shizhong Yang. "Allocating network resources by weight between TCP traffics". Journal of Computer Science and Technology 18, n. 2 (marzo 2003): 247–51. http://dx.doi.org/10.1007/bf02948892.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia