Gotowa bibliografia na temat „Internet (computer network)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Internet (computer network)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Internet (computer network)"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Pełny tekst źródła
Streszczenie:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Style APA, Harvard, Vancouver, ISO itp.
2

Sakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro". Jurnal Pendidikan Madrasah 7, nr 2 (22.11.2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.

Pełny tekst źródła
Streszczenie:
The use of information and communication technology in the world of education is unavoidable. The use of networks to access computers remotely and connect them to the internet is increasingly needed by teachers and students to obtain learning information. The network system used must be well managed, especially in managing internet bandwidth so that the connection of each computer has access to the internet evenly and maximally as needed. SMA Negeri 2 Bojonegoro in its teaching and learning activities has utilized information and communication technology, especially has utilized computer networks and the internet as a medium for data and information communication. However, the computer and internet network systems at SMA Negeri 2 Bojonegoro have not been managed properly. The solution to improve the effectiveness of using and managing internet bandwidth at SMA Negeri 2 Bojonegoro is to design and implement network management with Mikrotik Router to make it easier for administrators to manage the network. This research uses the Network Development Life Cycle (NDLC) method as a method of developing computer network management at SMA Negeri 2 Bojonegoro. The results showed that the use of a network system using a Mikrotik router in managing internet bandwidth efficiently facilitates and facilitates various activities related to internet use.
Style APA, Harvard, Vancouver, ISO itp.
3

Nemkova, N. V. "What is the Internet?" Kazan medical journal 78, nr 3 (15.06.1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.

Pełny tekst źródła
Streszczenie:
In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.
Style APA, Harvard, Vancouver, ISO itp.
4

Aisyah, Siti. "Computer Networking Company in Business Area". International Research Journal of Management, IT & Social Sciences 2, nr 7 (1.07.2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Pełny tekst źródła
Streszczenie:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
Style APA, Harvard, Vancouver, ISO itp.
5

M.J, Dr Kurian, i Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks". International Journal of Innovative Technology and Exploring Engineering 12, nr 3 (28.02.2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.

Pełny tekst źródła
Streszczenie:
The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 million Indians accessed the internet via any device. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. The slogans used to address data privacy are: “Data privacy belongs to you.” Lock it down, protect it, and block hackers. This paper reveals the issues related to categories & impact of cyber crime, basic cyber laws, security threats and protection which are a warning alarm to internet users.
Style APA, Harvard, Vancouver, ISO itp.
6

Dasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra i Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark". DoubleClick: Journal of Computer and Information Technology 5, nr 2 (27.02.2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.

Pełny tekst źródła
Streszczenie:
<p>Mikrotik, a technology that provides Internet services by turning computers into network routers. The computer network of SMA Negeri 16 Palembang uses a traditional cable network with star type. In this research, the process of designing a network using Mikrotik and managing and distributing bandwidth as needed at SMA Negeri 16 Palembang is carried out using the Network Development Life Cycle (NDLC) model. The result of this research is that Mikrotik can manage all computer networks. In the distribution of bandwidth regularly on the proxy can provide efficiency over the use of the internet. Mikrotik can maximize network usage if the overall bandwidth has been set.</p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: </em><em>Mikrotik, Computer Network, Router and Type Network</em><em></em></p>
Style APA, Harvard, Vancouver, ISO itp.
7

Andhika, Maulana Hafidz, Arip Solehudin, Didi Juardi i Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP". Elkom : Jurnal Elektronika dan Komputer 15, nr 1 (30.06.2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.

Pełny tekst źródła
Streszczenie:
The internet is currently very much needed because of the increasing use of many people depending on the internet because this information technology is very fast.In this case, it has a very big impact, the need for a very efficient internet service provider is needed. One of the technologies that is becoming a trend in computer networks is wireless computer networks (wireless local area network/WLAN) This technology is the development of local computer network technology (local area network) which allows efficiency in the implementation and development of computer networks that can increase user mobility with computer network technology using cable media. Bandwidth management is a way to manage the internet network for even distribution of bandwidth usage even though many network users use it. Hierarchical token bucket (HTB) one method to do a bandwidth management in this HTB
Style APA, Harvard, Vancouver, ISO itp.
8

Goffe, William L. "Computer Network Resources for Economists". Journal of Economic Perspectives 8, nr 3 (1.08.1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Pełny tekst źródła
Streszczenie:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
Style APA, Harvard, Vancouver, ISO itp.
9

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin i Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols". Vestnik MEI, nr 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Pełny tekst źródła
Streszczenie:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The article presents several models for organizing bridges: a centralized network bridge on the side of a router and client computer, a distributed bridging system, and a dedicated bridge. Based on the accomplished analysis, it is recommended to use a centralized model for a network that has to comply with more stringent reliability requirements. If there is a need to have simultaneous access to several automation devices and high data exchange rates, a distributed model should be used. A dedicated bridge is used only in special cases, for example, when a high compactness is required in implementing a monitoring system.
Style APA, Harvard, Vancouver, ISO itp.
10

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks". Mathematics Teacher 89, nr 1 (styczeń 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Pełny tekst źródła
Streszczenie:
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Internet (computer network)"

1

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wells, Daniel David. "Network management for community networks". Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Pełny tekst źródła
Streszczenie:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access Point (CAP) is located at each site within the community network. This provides the hosts and servers at that site with access to services on the community network and the Internet, it is the site's router. The CAP provides a web based interface (CAPgui) which allows configuration of the device and viewing of simple monitoring statistics. The Access Concentrator (AC) is the default router for the CAPs and the gateway to the Internet. It provides authenticated and encrypted communication between the network sites. The AC performs several monitoring functions, both for the individual sites and for the upstream Internet connection. The AC provides a means for centrally managing and effectively allocating Internet bandwidth by using the web based interface (ACgui). Bandwidth use can be allocated per user, per host and per site. The system is maintainable, extendable and customisable for different network architectures. The system was deployed successfully to two community networks. The Centre of Excellence (CoE) testbed network is a peri-urban network deployment whereas the Siyakhula Living Lab (SLL) network is a rural deployment. The results gathered conclude that the project was successful as the deployed system is more robust and more manageable than the previous systems.
Style APA, Harvard, Vancouver, ISO itp.
3

Pezaros, D. "Network traffic measurement for the next generation Internet". Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.

Pełny tekst źródła
Streszczenie:
Measurement-based performance evaluation of network traffic is a fundamental prerequisite for the provisioning of managed and controlled services in short timescales, as well as for enabling the accountability of network resources. The steady introduction and deployment of the Internet Protocol Next Generation (IPNG-IPv6) promises a network address space that can accommodate any device capable of generating a digital heart-beat. Under such a ubiquitous communication environment, Internet traffic measurement becomes of particular importance, especially for the assured provisioning of differentiated levels of service quality to the different application flows. The non-identical response of flows to the different types of network-imposed performance degradation and the foreseeable expansion of networked devices raise the need for ubiquitous measurement mechanisms that can be equally applicable to different applications and transports. This thesis introduces a new measurement technique that exploits native features of IPv6 to become an integral part of the Internet's operation, and to provide intrinsic support for performance measurements at the universally-present network layer. IPv6 Extension Headers have been used to carry both the triggers that invoke the measurement activity and the instantaneous measurement indicators in-line with the payload data itself, providing a high level of confidence that the behaviour of the real user traffic flows is observed. The in-line measurements mechanism has been critically compared and contrasted to existing measurement techniques, and its design and a software-based prototype implementation have been documented. The developed system has been used to provisionally evaluate numerous performance properties of a diverse set of application flows, over different-capacity IPv6 experimental configurations. Through experimentation and theoretical argumentation, it has been shown that IPv6-based, in-line measurements can form the basis for accurate and low-overhead performance assessment of network traffic flows in short time-scales, by being dynamically deployed where and when required in a multi-service Internet environment.
Style APA, Harvard, Vancouver, ISO itp.
4

Yang, Yang. "Network congestion control". Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator". Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Pełny tekst źródła
Streszczenie:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater for the majority of their simulation's requirements. In this work, a system is proposed for the creation of a scalable, dynamic-resolution network simulation framework that provides scalable scope for researchers, using modern technologies and languages. This framework should allow researchers to rapidly develop a broad range of semantically-rich simulations, without the necessity of superor grid-computers or clusters. Design and implementation are discussed and alternative network simulations are compared to the proposed framework. A series of simulations, focusing on malware, is run on an implementation of this framework, and the results are compared to expectations for the outcomes of those simulations. In conclusion, a critical review of the simulator is made, considering any extensions or shortcomings that need to be addressed.
Style APA, Harvard, Vancouver, ISO itp.
6

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhang, Zaichen, i 張在琛. "Network-supported internet multicast congestion and error control". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity". Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.
Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Style APA, Harvard, Vancouver, ISO itp.
9

Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET". Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Internet (computer network)"

1

Halabi, Bassam. Internet routing architectures. Indianapolis, IN: Cisco Press, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Danny, McPherson, i Cisco Systems Inc, red. Internet routing architectures. Wyd. 2. Indianapolis, Ind: Cisco, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hare, Chris. Internet firewallsand network security. Wyd. 2. Indianapolis, Ind: New Riders Publishing, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Routing in the Internet. Englewood Cliffs, N.J: Prentice Hall PTR, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Network and Internet security. Boston: AP Professional, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Internet routing architectures. Indianapolis, IN: New Riders, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

"Internet yong hu ci dian" bian yi zu., red. Internet yung hu ci dian =: Internet user's dictionary. Guangzhou: Ji nan da xue chu ban she, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

William, Stallings. Computer networking with Internet protocols and technology. Upper Saddle River, N.J: Pearson/Prentice Hall, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Miller, Mark A. Internet Technologies Handbook. New York: John Wiley & Sons, Ltd., 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Hare, Chris. Internet firewalls and network security. Wyd. 2. Indianapolis, Ind: New Riders Pub., 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Internet (computer network)"

1

Howser, Gerry. "The Network Layer". W Computer Networks and the Internet, 55–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Howser, Gerry. "The Laboratory Network". W Computer Networks and the Internet, 151–68. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wei, Zhao, Yanli Lv, Chunhe Xia, Yang Luo i Qing Wei. "A Computer Network Defense Policy Refinement Method". W Frontiers in Internet Technologies, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53959-6_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Ahmad, Muhammad Aminu, i Steve Woodhead. "Containment of Fast Scanning Computer Network Worms". W Internet and Distributed Computing Systems, 235–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23237-9_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Howser, Gerry. "Shortest Path Through the Network". W Computer Networks and the Internet, 205–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Goertzel, Ben. "The Network is the Computer is the Mind (is the World)". W Creating Internet Intelligence, 97–113. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0561-7_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kizza, Joseph Migga. "Internet of Things (IoT): Growth, Challenges, and Security". W Guide to Computer Network Security, 517–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Warren, Christopher, Eman El-Sheikh i Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar". W Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Maillé, Patrick, Peter Reichl i Bruno Tuffin. "Internet Governance and Economics of Network Neutrality". W Lecture Notes in Computer Science, 108–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30382-1_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Paramonov, Alexander, Evgeny Tonkikh, Andrey Koucheryavy i Tatiana M. Tatarnikova. "High Density Internet of Things Network Analysis". W Lecture Notes in Computer Science, 307–16. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65726-0_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Internet (computer network)"

1

Das, Divyajyoti, i Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares". W 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Garsva, Eimantas, Nerijus Paulauskas, Gediminas Grazulevicius i Lech Gulbinovic. "Academic computer network traffic statistical analysis". W 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217987.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zhou, Yun-xia, Yue-long Zhao i Xi Yang. "The Computer Network with Intelligent Disks". W 2010 International Conference on Internet Technology and Applications (iTAP). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566576.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhang, Zehao, Lin Peng, He Wang, Jin Sun, Tao Chang i Ling Zhuo. "A wearable computer wireless sensor network". W 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2017. http://dx.doi.org/10.1109/ei2.2017.8245389.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bulira, Damian, i Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays". W 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kotenko, Igor, i Alexander Ulanov. "Antagonistic Agents in the Internet: Computer Network Warfare Simulation". W 2006 9th International Conference on Information Fusion. IEEE, 2006. http://dx.doi.org/10.1109/icif.2006.301705.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Xianglong, Liu, Lou Yihua, Liang Yuan i Shan Baosong. "Predicting Internet Network Distance Using ISOMAP". W 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.245.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Matray, Peter, Peter Haga, Sandor Laki, Istvan Csabai i Gabor Vattay. "On the network geography of the Internet". W IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5934909.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Liu, Qiming, i Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet". W ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Tody Ariefianto, W., Yudha Purwanto i Hendra Wiratama. "Storage Area Network based-on Internet Small Computer Standard Interface optimization using Internet Protocol Multipathing". W 2013 International Conference of Information and Communication Technology (ICoICT). IEEE, 2013. http://dx.doi.org/10.1109/icoict.2013.6574590.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Internet (computer network)"

1

Vasilenko, L. A., i A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo i in. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, czerwiec 2021. http://dx.doi.org/10.18235/0003313.

Pełny tekst źródła
Streszczenie:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
Style APA, Harvard, Vancouver, ISO itp.
3

Nechaev, V., Володимир Миколайович Соловйов i A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Pełny tekst źródła
Streszczenie:
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Mercedes-Benz and some others companies have not been engaged in their traditional business for a long time. Their partner networks performs this function instead of them. The companies themselves perform the function of system integrators. The Tapscott’s idea finds its confirmation within the framework of a new powerful direction of the development of the modern interdisciplinary science – the theory of the complex networks (CN) [2]. CN-s are multifractal objects, the loss of multifractality being the indicator of the system transition from more complex state into more simple state. We tested the multifractal properties of the data using the wavelet transform modulus maxima approach in order to analyze scaling properties of our company. Comparative analysis of the singularity spectrumf(®), namely, the difference between maximum and minimum values of ® (∆ = ®max ¡ ®min) shows that IBM company is considerably more fractal in comparison with Apple Computer. Really, for it the value of ∆ is equal to 0.3, while for the vertically integrated company Apple it only makes 0.06 – 5 times less. The comparison of other companies shows that this dependence is of general character. Taking into consideration the fact that network organization of business has become dominant in the last 5-10 years, we carried out research for the selected companies in the earliest possible period of time which was determined by the availability of data in the Internet, or by historically later beginning of stock trade of computer companies. A singularity spectrum of the first group of companies turned out to be considerably narrower, or shifted toward the smaller values of ® in the pre-network period. The latter means that dynamic series were antipersistant. That is, these companies‘ management was rigidly controlled while the impact of market mechanisms was minimized. In the second group of companies if even the situation did changed it did not change for the better. In addition, we discuss applications to the construction of portfolios of stock that have a stable ratio of risk to return.
Style APA, Harvard, Vancouver, ISO itp.
4

Bragdon, Sophia, Vuong Truong i Jay Clausen. Environmentally informed buried object recognition. Engineer Research and Development Center (U.S.), listopad 2022. http://dx.doi.org/10.21079/11681/45902.

Pełny tekst źródła
Streszczenie:
The ability to detect and classify buried objects using thermal infrared imaging is affected by the environmental conditions at the time of imaging, which leads to an inconsistent probability of detection. For example, periods of dense overcast or recent precipitation events result in the suppression of the soil temperature difference between the buried object and soil, thus preventing detection. This work introduces an environmentally informed framework to reduce the false alarm rate in the classification of regions of interest (ROIs) in thermal IR images containing buried objects. Using a dataset that consists of thermal images containing buried objects paired with the corresponding environmental and meteorological conditions, we employ a machine learning approach to determine which environmental conditions are the most impactful on the visibility of the buried objects. We find the key environmental conditions include incoming shortwave solar radiation, soil volumetric water content, and average air temperature. For each image, ROIs are computed using a computer vision approach and these ROIs are coupled with the most important environmental conditions to form the input for the classification algorithm. The environmentally informed classification algorithm produces a decision on whether the ROI contains a buried object by simultaneously learning on the ROIs with a classification neural network and on the environmental data using a tabular neural network. On a given set of ROIs, we have shown that the environmentally informed classification approach improves the detection of buried objects within the ROIs.
Style APA, Harvard, Vancouver, ISO itp.
5

Modlo, Yevhenii O., Serhiy O. Semerikov, Ruslan P. Shajda, Stanislav T. Tolmachev i Oksana M. Markova. Methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], lipiec 2020. http://dx.doi.org/10.31812/123456789/3878.

Pełny tekst źródła
Streszczenie:
The article describes the components of methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects: using various methods of representing models; solving professional problems using ICT; competence in electric machines and critical thinking. On the content of learning academic disciplines “Higher mathematics”, “Automatic control theory”, “Modeling of electromechanical systems”, “Electrical machines” features of use are disclosed for Scilab, SageCell, Google Sheets, Xcos on Cloud in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects. It is concluded that it is advisable to use the following software for mobile Internet devices: a cloud-based spreadsheets as modeling tools (including neural networks), a visual modeling systems as a means of structural modeling of technical objects; a mobile computer mathematical system used at all stages of modeling; a mobile communication tools for organizing joint modeling activities.
Style APA, Harvard, Vancouver, ISO itp.
6

Patel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), czerwiec 2021. http://dx.doi.org/10.21079/11681/41042.

Pełny tekst źródła
Streszczenie:
Bio-structures owe their remarkable mechanical properties to their hierarchical geometrical arrangement as well as heterogeneous material properties. This dissertation presents an integrated, interdisciplinary approach that employs computational mechanics combined with flow network analysis to gain fundamental insights into the failure mechanisms of high performance, light-weight, structured composites by examining the stress flow patterns formed in the nascent stages of loading for the rostrum of the paddlefish. The data required for the flow network analysis was generated from the finite element analysis of the rostrum. The flow network was weighted based on the parameter of interest, which is stress in the current study. The changing kinematics of the structural system was provided as input to the algorithm that computes the minimum-cut of the flow network. The proposed approach was verified using two classical problems three- and four-point bending of a simply-supported concrete beam. The current study also addresses the methodology used to prepare data in an appropriate format for a seamless transition from finite element binary database files to the abstract mathematical domain needed for the network flow analysis. A robust, platform-independent procedure was developed that efficiently handles the large datasets produced by the finite element simulations. Results from computational mechanics using Abaqus and complex network analysis are presented.
Style APA, Harvard, Vancouver, ISO itp.
7

Varina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko i Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], czerwiec 2021. http://dx.doi.org/10.31812/123456789/4453.

Pełny tekst źródła
Streszczenie:
Technologies based on cloud computing is one of the demanded and actively developing areas of the modern information world. Cloud computing refers to an innovative technology that allows you to combine IT resources of various hardware platforms into a single whole and provide the user with access to them via a local network or the global Internet. Cloud services from various providers offer users access to their resources via the Internet via free or shareware cloud applications, the hardware and software requirements of which do not imply that the user has high-performance and resource-consuming computers. Cloud technologies represent a new way of organizing the educational process and offers an alternative to traditional methods of organizing the educational process, creates an opportunity for personal learning, collective teaching, interactive classes, and the organization of psychological support. The scientific article is devoted to the problem of integrating cloud technologies not only in the process of training highly qualified specialists, but also in the formation of professionally important personality traits. The article describes the experience of introducing cloud technologies into the process of forming the adaptive potential of students in conditions of social constraints caused by the COVID-19 pandemic.
Style APA, Harvard, Vancouver, ISO itp.
8

Goncharenko, Tatiana, Nataliia Yermakova-Cherchenko i Yelyzaveta Anedchenko. Experience in the Use of Mobile Technologies as a Physics Learning Method. [б. в.], listopad 2020. http://dx.doi.org/10.31812/123456789/4468.

Pełny tekst źródła
Streszczenie:
Swift changes in society, related to sciences technicians’ development, technologies, by the increase of general volume of information, pull out new requirements for maintenance, structure, and quality of education. It requires teachers to diversify a tool in the direction of the increase in possibilities of the use of mobile technologies and computer systems. Lately in the world, more attention spared to the use of mobile learning, which in obedience to «Recommendations of UNESCO on the questions of a policy in the area of mobile learning» foresees the use of mobile technology, both separate and together with other by informational computer technologies. [1]. Mobile learning allows using the open informational systems, global educational networks, unique digital resources which belong to different educational establishments and co-operate with each other. The use of existent educational resources and creation of own, based on the academic resources from informative space, allows to promote the interest of students to the study of physics, to take into account the individual features, and also features of region and framework of society of the country. During the last years in Ukraine competency-based approach to the organization of studies certainly one of basic. The new Education Act addresses the key competencies that every modern person needs for a successful life, including mathematical competence; competence in natural sciences, engineering, and technology; innovation; information and communication competence [2]. This further emphasizes the importance of providing students with quality physical education and the problems associated with it. Using mobile technology in professional teaching work, the teacher has the opportunity to implement the basic principles of the competence approach in teaching physics. An analysis of the data provided in the official reports of the Ukrainian Center for Educational Quality Assessment showed that the number of students making an external independent assessment in physics and choosing a future profession related to physics has decreased significantly. This is due to the loss of students' interest in physics and the complexity of the content of the subject, as well as the increase in the amount of information that students need to absorb. In this article, we explore the possibilities of mobile technology as a means of teaching physics students and give our own experience of using mobile technology in the process of teaching physics (for example, the optics section in primary school).
Style APA, Harvard, Vancouver, ISO itp.
9

Galili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs i Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, październik 1994. http://dx.doi.org/10.32747/1994.7570549.bard.

Pełny tekst źródła
Streszczenie:
The objectives of this project were to develop nondestructive methods for detection of internal properties and firmness of fruits and vegetables. One method was based on a soft piezoelectric film transducer developed in the Technion, for analysis of fruit response to low-energy excitation. The second method was a dot-matrix piezoelectric transducer of North Carolina State University, developed for contact-pressure analysis of fruit during impact. Two research teams, one in Israel and the other in North Carolina, coordinated their research effort according to the specific objectives of the project, to develop and apply the two complementary methods for quality control of agricultural commodities. In Israel: An improved firmness testing system was developed and tested with tropical fruits. The new system included an instrumented fruit-bed of three flexible piezoelectric sensors and miniature electromagnetic hammers, which served as fruit support and low-energy excitation device, respectively. Resonant frequencies were detected for determination of firmness index. Two new acoustic parameters were developed for evaluation of fruit firmness and maturity: a dumping-ratio and a centeroid of the frequency response. Experiments were performed with avocado and mango fruits. The internal damping ratio, which may indicate fruit ripeness, increased monotonically with time, while resonant frequencies and firmness indices decreased with time. Fruit samples were tested daily by destructive penetration test. A fairy high correlation was found in tropical fruits between the penetration force and the new acoustic parameters; a lower correlation was found between this parameter and the conventional firmness index. Improved table-top firmness testing units, Firmalon, with data-logging system and on-line data analysis capacity have been built. The new device was used for the full-scale experiments in the next two years, ahead of the original program and BARD timetable. Close cooperation was initiated with local industry for development of both off-line and on-line sorting and quality control of more agricultural commodities. Firmalon units were produced and operated in major packaging houses in Israel, Belgium and Washington State, on mango and avocado, apples, pears, tomatoes, melons and some other fruits, to gain field experience with the new method. The accumulated experimental data from all these activities is still analyzed, to improve firmness sorting criteria and shelf-life predicting curves for the different fruits. The test program in commercial CA storage facilities in Washington State included seven apple varieties: Fuji, Braeburn, Gala, Granny Smith, Jonagold, Red Delicious, Golden Delicious, and D'Anjou pear variety. FI master-curves could be developed for the Braeburn, Gala, Granny Smith and Jonagold apples. These fruits showed a steady ripening process during the test period. Yet, more work should be conducted to reduce scattering of the data and to determine the confidence limits of the method. Nearly constant FI in Red Delicious and the fluctuations of FI in the Fuji apples should be re-examined. Three sets of experiment were performed with Flandria tomatoes. Despite the complex structure of the tomatoes, the acoustic method could be used for firmness evaluation and to follow the ripening evolution with time. Close agreement was achieved between the auction expert evaluation and that of the nondestructive acoustic test, where firmness index of 4.0 and more indicated grade-A tomatoes. More work is performed to refine the sorting algorithm and to develop a general ripening scale for automatic grading of tomatoes for the fresh fruit market. Galia melons were tested in Israel, in simulated export conditions. It was concluded that the Firmalon is capable of detecting the ripening of melons nondestructively, and sorted out the defective fruits from the export shipment. The cooperation with local industry resulted in development of automatic on-line prototype of the acoustic sensor, that may be incorporated with the export quality control system for melons. More interesting is the development of the remote firmness sensing method for sealed CA cool-rooms, where most of the full-year fruit yield in stored for off-season consumption. Hundreds of ripening monitor systems have been installed in major fruit storage facilities, and being evaluated now by the consumers. If successful, the new method may cause a major change in long-term fruit storage technology. More uses of the acoustic test method have been considered, for monitoring fruit maturity and harvest time, testing fruit samples or each individual fruit when entering the storage facilities, packaging house and auction, and in the supermarket. This approach may result in a full line of equipment for nondestructive quality control of fruits and vegetables, from the orchard or the greenhouse, through the entire sorting, grading and storage process, up to the consumer table. The developed technology offers a tool to determine the maturity of the fruits nondestructively by monitoring their acoustic response to mechanical impulse on the tree. A special device was built and preliminary tested in mango fruit. More development is needed to develop a portable, hand operated sensing method for this purpose. In North Carolina: Analysis method based on an Auto-Regressive (AR) model was developed for detecting the first resonance of fruit from their response to mechanical impulse. The algorithm included a routine that detects the first resonant frequency from as many sensors as possible. Experiments on Red Delicious apples were performed and their firmness was determined. The AR method allowed the detection of the first resonance. The method could be fast enough to be utilized in a real time sorting machine. Yet, further study is needed to look for improvement of the search algorithm of the methods. An impact contact-pressure measurement system and Neural Network (NN) identification method were developed to investigate the relationships between surface pressure distributions on selected fruits and their respective internal textural qualities. A piezoelectric dot-matrix pressure transducer was developed for the purpose of acquiring time-sampled pressure profiles during impact. The acquired data was transferred into a personal computer and accurate visualization of animated data were presented. Preliminary test with 10 apples has been performed. Measurement were made by the contact-pressure transducer in two different positions. Complementary measurements were made on the same apples by using the Firmalon and Magness Taylor (MT) testers. Three-layer neural network was designed. 2/3 of the contact-pressure data were used as training input data and corresponding MT data as training target data. The remaining data were used as NN checking data. Six samples randomly chosen from the ten measured samples and their corresponding Firmalon values were used as the NN training and target data, respectively. The remaining four samples' data were input to the NN. The NN results consistent with the Firmness Tester values. So, if more training data would be obtained, the output should be more accurate. In addition, the Firmness Tester values do not consistent with MT firmness tester values. The NN method developed in this study appears to be a useful tool to emulate the MT Firmness test results without destroying the apple samples. To get more accurate estimation of MT firmness a much larger training data set is required. When the larger sensitive area of the pressure sensor being developed in this project becomes available, the entire contact 'shape' will provide additional information and the neural network results would be more accurate. It has been shown that the impact information can be utilized in the determination of internal quality factors of fruit. Until now,
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii