Artigos de revistas sobre o tema "Christianity – computer network resources"

Siga este link para ver outros tipos de publicações sobre o tema: Christianity – computer network resources.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Christianity – computer network resources".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Goffe, William L. "Computer Network Resources for Economists". Journal of Economic Perspectives 8, n.º 3 (1 de agosto de 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Texto completo da fonte
Resumo:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Checketts, Levi. "The Cross and the Computer: Actor-Network Theory and Christianity". Theology and Science 15, n.º 1 (2 de janeiro de 2017): 116–27. http://dx.doi.org/10.1080/14746700.2016.1265223.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Bura, Aman, e Yang Dacheng . "GPRS Network Resources Optimization". Information Technology Journal 5, n.º 5 (15 de agosto de 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Humaedi, M. Alie. "KONVERSI KEAGAMAAN PASCA 1965, MENGURAI DAMPAK SOSIAL BUDAYA DAN HUBUNGAN ISLAM KRISTEN DI PEDESAAN JAWA". Harmoni 16, n.º 2 (1 de janeiro de 2018): 218–40. http://dx.doi.org/10.32488/harmoni.v16i2.16.

Texto completo da fonte
Resumo:
The relationship between Islam and Christianity in various regions is often confronted with situations caused by external factors. They no longer debate the theological aspect, but are based on the political economy and social culture aspects. In the Dieng village, the economic resources are mostly dominated by Christians as early Christianized product as the process of Kiai Sadrach's chronicle. Economic mastery was not originally as the main trigger of the conflict. However, as the political map post 1965, in which many Muslims affiliated to the Indonesian Communist Party convert to Christianity, the relationship between Islam and Christianity is heating up. The question of the dominance of political economic resources of Christians is questionable. This research to explore the socio cultural and religious impact of the conversion of PKI to Christian in rural Dieng and Slamet Pekalongan and Banjarnegara. This qualitative research data was extracted by in-depth interviews, observations and supported by data from Dutch archives, National Archives and Christian Synod of Salatiga. Research has found the conversion of the PKI to Christianity has sparked hostility and deepened the social relations of Muslims and Christians in Kasimpar, Petungkriono and Karangkobar. The culprit widened by involving the network of Wonopringgo Islamic Boarding. It is often seen that existing conflicts are no longer latent, but lead to a form of manifest conflict that decomposes in the practice of social life.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Bishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley e Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction". Journal of Geography 92, n.º 3 (maio de 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

骆, 又麟. "Application of Network Resources in Computer Teaching". Vocational Education 13, n.º 03 (2024): 836–40. http://dx.doi.org/10.12677/ve.2024.133135.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Niu, Yiming, Wenyong Du e Zhenying Tang. "Computer Network Security Defense Model". Journal of Physics: Conference Series 2146, n.º 1 (1 de janeiro de 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Texto completo da fonte
Resumo:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Macleod, Roderick A. "Network resources and access tools". New Review of Information Networking 10, n.º 1 (maio de 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

MacLeod, Roderick A. "Network resources and access tools". New Review of Information Networking 9, n.º 1 (janeiro de 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Weigeng, Shi. "Reconnectable network with limited resources". Journal of Computer Science and Technology 6, n.º 3 (julho de 1991): 243–49. http://dx.doi.org/10.1007/bf02945511.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Samsonowicz, Henryk. "The long 10th century, or the creation of the New Europe". European Review 6, n.º 3 (agosto de 1998): 277–81. http://dx.doi.org/10.1017/s1062798700003318.

Texto completo da fonte
Resumo:
The tenth century was when the spread of Christianity through Europe commenced the transformation of various state and tribal formations into the form that persisted and that we can recognize today. The political and economic development of Islam created a demand for people from which the new states also derived material resources. Trade and plunder led by the Vikings stimulated the formation of states and strengthened them, this was aided further by the existence of a stable network of roads.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Xin Wang e H. Schulzrinne. "Pricing network resources for adaptive applications". IEEE/ACM Transactions on Networking 14, n.º 3 (junho de 2006): 506–19. http://dx.doi.org/10.1109/tnet.2006.872574.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Liu, Li Jun. "Research on Computer Network Data Transfer Methods". Advanced Materials Research 926-930 (maio de 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.

Texto completo da fonte
Resumo:
In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and realization of dynamic task assignment algorithm and Performance experiment of the system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Lu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources". Mobile Information Systems 2022 (14 de setembro de 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.

Texto completo da fonte
Resumo:
The balanced distribution of multimedia wireless network modular teaching resources is improved by optimizing and adjusting the balanced distribution of multimedia wireless network modular teaching resources. Based on block grid balanced scheduling and resource spectrum fusion, a balanced distribution method of multimedia wireless network modular teaching resources is proposed. A blockchain Internet of Things accesses control network architecture system for the balanced allocation of multimedia wireless network modular teaching resources established using the priority business scheduling method. Modular resource allocation of multimedia wireless networks and adaptive forwarding are adjusted to control the data packets. The bandwidth guarantee mechanism is used for the equitable allocation of multimedia wireless network modular teaching resources information flow. Multi-service hierarchical management of multimedia wireless network modular teaching resources spectrum is controlled by block grid balanced scheduling and resource spectrum fusion. The high-energy physical computing system structure is used to allocate the resource spectrum balance of the modular teaching resources of the multimedia wireless networks, ensuring the bandwidth requirements of various services. The classified management and balanced allocation of the multimedia wireless networks’ teaching storage, system, and teaching spectrum resources are made possible. The results of the tests show that this method effectively reduces the delay in the allocation of modular multimedia wireless network teaching resources, improves the utilization rate of modular multimedia wireless network teaching resources, and significantly improves their reading and writing performance.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Giladi, Ran, Ephraim Korach e Rony Ohayon. "Placement of network resources in communication networks". Computer Networks 43, n.º 2 (outubro de 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Cao, Jun. "Cloud Computing-Based Online Sharing Method of Mass Resources in Public Libraries". Mobile Information Systems 2022 (28 de setembro de 2022): 1–9. http://dx.doi.org/10.1155/2022/8925897.

Texto completo da fonte
Resumo:
In order to realize the online sharing of massive resources and capitals in public libraries under the circumstances of network environment and cultural construction, it is desirable to invent new sharing policies. In this paper, we put forward a method of online sharing of massive resources in public libraries which is established on cloud computing. Cloud computing technique is implemented to collect the statistical information characteristics of public library’s massive resources under the condition of network environment and culture construction, and an adaptive fusion clustering processing model of public library’s massive resources under the condition of network environment and culture construction is constructed. Moreover, the correlation statistical feature detection approach is used to accomplish fuzzy scheduling and feature mining of public library’s massive resources under the condition of network environment and culture construction. The information storage center management database of public library’s massive resources under the condition of network environment and culture construction is established. The fuzzy C-means clustering approach is implemented in the database to cluster the massive resources of public library under the condition of network environment and culture construction. Combined with cloud computing technology, the sharing and classified management scheduling of massive resources of public library under the condition of network environment and culture construction are comprehended. The simulation outcomes confirm that the adaptive performance of public library’s massive resource sharing management under the condition of network environment and culture construction is better, and the adaptive scheduling performance of resources is better. The data clustering of public library’s massive resources under the condition of network environment and culture construction is stronger, which improves the online sharing level of public library’s massive resources under the condition of network environment and culture construction.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Wang, Qian, Chun Yan Yang e Chang Qing Cui. "The Research of Distributed Computer Network Technology Based on Web". Applied Mechanics and Materials 631-632 (setembro de 2014): 985–88. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.985.

Texto completo da fonte
Resumo:
With the rapid development of network technology, network scale, the increasing complexity, traditional centralized network data collecting the methods already cannot adapt to this situation, a web-based distributed computing structure because of its many advantages are widely used. This paper proposes a construct Web application framework of distributed application system, combination of Web technology and the SNMP network management technology. Thereby, it can maintain the increasingly huge network system, ensure that all the good operation of the network resources, the management of the convenient and easy to use network resources.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Chen, Liying. "The Application of Computer Management System in Physical Education Teaching". E3S Web of Conferences 275 (2021): 03016. http://dx.doi.org/10.1051/e3sconf/202127503016.

Texto completo da fonte
Resumo:
School physical education(PE) is an indispensable part of school education, which plays an important and irreplaceable role in training builders of socialist cause with all-round development of morality, intelligence and sports. Sports network teaching management greatly improves the efficiency and efficiency of school sports teaching, which is a great change of the traditional mode., it provides a solid foundation for the establishment of Sports Network Teaching in Colleges and universities(CAU). This paper mainly studies the application of computer management system(CMS) in physical education teaching(PET). This paper studies and analyzes the method of university teaching computer management resources integration, studies the architecture of sports teaching CMS from four aspects of computing resources, storage resources, backup resources and network system, and uses ant colony algorithm to design and use sports teaching CMS. This paper also uses charts to analyze students’ attitude towards the use of CMS in PET, and the proportion of CMS in PET. The experimental results show that in the CMS of PET, the computing resources account for 38.33%, the storage resources account for 31.76%, the backup resources account for 14.62%, and the network system account for 15.29%.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Soule, Robert, Shrutarshi Basu, Parisa Jalili Marandi, Fernando Pedone, Robert Kleinberg, Emin Gun Sirer e Nate Foster. "Merlin: A Language for Managing Network Resources". IEEE/ACM Transactions on Networking 26, n.º 5 (outubro de 2018): 2188–201. http://dx.doi.org/10.1109/tnet.2018.2867239.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Scott, Paul, Dan Gordon, Evan Franklin, Laura Jones e Sylvie Thiebaux. "Network-Aware Coordination of Residential Distributed Energy Resources". IEEE Transactions on Smart Grid 10, n.º 6 (novembro de 2019): 6528–37. http://dx.doi.org/10.1109/tsg.2019.2907128.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Mshvidobadze, Tinatin. "Computer Network and Computer Grid Joins to E-Learning". Journal of Technical Science and Technologies 4, n.º 2 (22 de maio de 2016): 35–37. http://dx.doi.org/10.31578/jtst.v4i2.81.

Texto completo da fonte
Resumo:
According to the development of communications and web-based technologies in recent years, e-Learning has became very important for everyone and is seen as one of the most dynamic teaching methods. Grid computing is a pattern for increasing the computing power and storage capacity of a system and is based on hardware and software resources in a network with common purpose. In the present article grid architecture is shown and its different layers are described. This layer is heart of grid learning architecture and, in fact, regardless of this layer, e-Learning based on grid architecture will not be feasible.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Hernández-Orallo, Enrique, e Joan Vila-Carbó. "Network Provisioning Using Multimedia Aggregates". Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/30893.

Texto completo da fonte
Resumo:
Multimedia traffic makes network provisioning a key issue. Optimal provisioning of network resources is crucial for reducing the service cost of multimedia transmission. Multimedia traffic requires not only provisioning bandwidth and buffer resources in the network but also guaranteeing a given maximum end-to-end delay. In this paper we present methods and tools for the optimal dimensioning of networks based on multimedia aggregates. The proposed method minimises the network resources reservations of traffic aggregates providing a bounded delay. The paper also introduces several methods to generate multimedia traffic aggregation using real video traces. The method is evaluated using a network topology based on the European GÉANT network. The results of these simulations allow us to discover the relationship between a required delay and the necessary bandwidth reservation (or the achievable utilisation limit). An interesting conclusion of these scenarios is that, following several recommendations, the network utilisation can reach values of around80%or higher.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Xi Liang, Xi Liang, e Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship". 網際網路技術學刊 23, n.º 1 (janeiro de 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.

Texto completo da fonte
Resumo:
<p>Aiming at the problems of poor balance of recommended resources in the recommendation of traditional physical education network teaching resources and low trust degree of recommended physical education network teaching resources, this paper proposes a balanced recommendation algorithm for physical education network teaching resources based on trust relationship. By SVM algorithm, the teaching resources of physical education network are classified, and then the invalid data of teaching resources of physical education network are deleted, and the remaining teaching resources of physical education network are taken as the extraction object to complete the extraction of teaching resources of physical education network. Through Kalman filtering method, the data of sports network teaching resources with noise are reduced, and then the data with high similarity are fused to complete the preprocessing of physical education network teaching resources data. By constructing the trust relationship model, the relationship attribute between the recommended physical education network teaching resources data is determined. The experimental results show that the highest degree of resource equilibrium recommended by the proposed method is about 96 and the recommended resource trust is high.</p> <p>&nbsp;</p>
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Tan, Tin-Wee, e Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences". Biochemical Education 22, n.º 1 (janeiro de 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev e Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK". Information technology and computer engineering 58, n.º 3 (29 de dezembro de 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Texto completo da fonte
Resumo:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available information on methods and tools for securing the architecture of software-defined networks. SDN technology provides greater flexibility and speed in implementing security measures, allowing real-time responses to threats. In contemporary conditions, where cyber threats are becoming more complex and pronounced, SDN networks enable the detection of attacks, blocking malicious actions, and applying security policies in real-time. However, the increasing complexity of cyber threats and constant technological changes necessitate further development and enhancement of the information security of SDN network resources for companies. There is a need for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks. The necessity for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks serves as the foundation for this research. As a result, an enhancement in the level of information security for SDN network resources has been achieved by: 1) reducing the intervention time in the network; 2) applying an improved method of traffic processing based on network security of packet flows, allowing desired network applications to efficiently manage forwarding.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Voyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)". Computer Music Journal 18, n.º 3 (1994): 8. http://dx.doi.org/10.2307/3681174.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Zhao, Guotao, e Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm". Scientific Programming 2021 (11 de outubro de 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.

Texto completo da fonte
Resumo:
In order to improve the retrieval ability of multiview attribute coded image network teaching resources, a retrieval algorithm of image network teaching resources based on depth hash algorithm is proposed. The pixel big data detection model of the multiview attribute coding image network teaching resources is constructed, the pixel information collected by the multiview attribute coding image network teaching resources is reconstructed, the fuzzy information feature components of the multiview attribute coding image are extracted, and the edge contour distribution image is combined. The distributed fusion result of the edge contour of the view image of the network teaching resources realizes the construction of the view feature parameter set. The gray moment invariant feature analysis method is used to realize information coding, the depth hash algorithm is used to realize the retrieval of multiview attribute coded image network teaching resources, and the information recombination is realized according to the hash coding result of multiview attribute coded image network teaching resources, thus improving the fusion. The simulation results show that this method has higher precision, better retrieval precision, and higher level of resource fusion for multiview coded image network teaching resource retrieval.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Zatuliveter, Yu S., e E. A. Fishchenko. "Synergy of Digital Universality of the Global Computer Environment". Programmnaya Ingeneria 13, n.º 3 (23 de março de 2022): 107–18. http://dx.doi.org/10.17587/prin.13.107-118.

Texto completo da fonte
Resumo:
The global computer environment (GCE) as a whole is considered an object of research. The system-wide as­pects of implementing the digital transformation of the sociotechnosphere through the GCE are analyzed. Factors of the destructive influence of the fundamental system-technical laws of the spontaneous growth of the GCE on the functioning/development of the sociotechnosphere are presented. Special attention is paid to the study of the features of the apperance of a positive synergetic network effect, expressed by Metcalfs law, in the conditions of the initially open intra-system heterogeneity of the network resources of the existing GCE. It is established that with the increase in the size of large distributed systems implemented in the GCE, the factor of heterogeneity of network resources becomes a source of negative (system-destructive) network synergy, which devalues the positive synergy of Metcalfs law. Examples of ecosystems implemented in the GCE through cloud technologies are considered. It is shown that in the conditions of initially open heterogeneity of network resources, the further increase in the size of large distributed systems leads to an insurmountable increase in the complexity of the system-functional integra­tion of network resources and an uncontrolled decrease in the stability of the sociotechnosphere. The principles of conceptual reengineering the GCE are presented to eliminate the causes of systemic heterogeneity and seamless/ cybersecurity distribution of algorithmic universality, closed in intracomputer resources, to any arbitrarily large subset of GCE computers. Such reengineering will allow neutralizing the negative synergy and maximizing the positive synergy of the Metcalf effect in large distributed systems without restrictions on their size.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Hidayatulloh, Syarif, e Wahyudin Wahyudin. "Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)". Jurnal Teknik Komputer 5, n.º 1 (6 de fevereiro de 2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.

Texto completo da fonte
Resumo:
The use of information technology and its use in collecting and processing data into information that is useful in decision making will play a role in determining the success of an organization or company in the future. This happened to PT. Jasa Cendekia Indonesia, the computer network that is owned has not met the needs of its employees. A good computer network is one that can serve sharing resources, data security, resources more efficiently and up-to-date information. Basically if a company can hold a computer network that serves the above for employees, of course it will make it easier for employees to do the work and improve the standards of the company itself. The proposed network built by the author for PT. Indonesian Scholar Services is a computer network built with Virtual Private Network technology. Because companies that have communication between the head office and branches that are good and safe, will be the capital for their companies in facing challenges in the era of globalization. Communication that is connected to a fast and secure computer network will make it easier for a company to supervise the activities of its company.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Palkopoulou, Eleni, Dominic Schupke e Thomas Bauschert. "Shared backup router resources: realizing virtualized network resilience". IEEE Communications Magazine 49, n.º 5 (maio de 2011): 140–46. http://dx.doi.org/10.1109/mcom.2011.5762810.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Xiaolong Weng. "Design and Implement of PE Network Education Platform Facing to Network Sports Teaching Resources". International Journal of Advancements in Computing Technology 5, n.º 7 (15 de abril de 2013): 263–71. http://dx.doi.org/10.4156/ijact.vol5.issue7.32.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Du, Zhao, Xiaolong Fu, Can Zhao, Ting Liu e Qifeng Liu. "University campus social network system for knowledge sharing". Computer Science and Information Systems 9, n.º 4 (2012): 1721–37. http://dx.doi.org/10.2298/csis120215055d.

Texto completo da fonte
Resumo:
Public online social network services have achieved dazzling success in recent years. As a result, vertical social network services for universities are expected warmly by campus users. As the majority of activities in university campus are knowledge and social interaction intensive, one of the core functions of campus social network system is to facilitate knowledge sharing on campus. In the cyberspace of universities, knowledge is stored in various kinds of digital resources such as documents, photos, videos etc. In this paper, we discuss the design and implementation of our campus social network system, concentrating on knowledge sharing mechanism in the system. The knowledge sharing mechanism has five features including the utilization of users? personal social network to facilitate the dissemination of digital resources, the use of a six-tuple model based tagging to realize the unified labeling for digital resources, the fine-grained access control based on friend lists for safer knowledge sharing, the adoption of a multiscale evaluation method for digital resources and personalized recommendation for digital resource with social graph based collaborative filtering as its core idea. With all these considerations, we expect to improve the efficiency and effectiveness of knowledge while enlarging the dissemination scope of digital resources carrying it in cyberspace of universities.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Yuan, Siyu, Yong Zhang, Wenbo Qie, Tengteng Ma e Sisi Li. "Deep reinforcement learning for resource allocation with network slicing in cognitive radio network". Computer Science and Information Systems, n.º 00 (2020): 55. http://dx.doi.org/10.2298/csis200710055y.

Texto completo da fonte
Resumo:
With the development of wireless communication technology, the requirement for data rate is growing rapidly. Mobile communication system faces the problem of shortage of spectrum resources. Cognitive radio technology allows secondary users to use the frequencies authorized to the primary user with the permission of the primary user, which can effectively improve the utilization of spectrum resources. In this article, we establish a cognitive network model based on under1 lay model and propose a cognitive network resource allocation algorithm based on DDQN (Double Deep Q Network). The algorithm jointly optimizes the spectrum efficiency of the cognitive network and QoE (Quality of Experience) of cognitive users through channel selection and power control of the cognitive users. Simulation results show that proposed algorithm can effectively improve the spectral efficiency and QoE. Compared with Q-learning and DQN, this algorithm can converge faster and obtain higher spectral efficiency and QoE. The algorithm shows a more stable and efficient performance.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Rong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network". Scientific Programming 2021 (10 de junho de 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.

Texto completo da fonte
Resumo:
The main purpose of the integration of network media and middle school ideological and political course is to better realize the moral education function of middle school ideological and political development. The use of resource integration technology to manage distributed teaching resources is conducive to improving the level of information construction in colleges and universities, and so on. This paper puts forward the integration system of ideological and political multimedia network teaching resources based on wireless network. Firstly, it presents an overview of the Radio Resource Management (RRM) problem and projected strategies within wireless network framework, where several Radio Access Technologies (RATs) are collectively controlled and identify the different activities relating to the CRRM issues. Secondly, this paper targets providing a summary of the RRM problem and projected solutions within wireless network. Thirdly, the theoretical elements of the design and the teaching resource management assessment process are clarified by using XML as the data exchange carrier to realize the automatic integration of teaching resources. Fourthly, we have used dSPACE platform, by calling its API function, which then call the subscribe function of dSPACE framework and store the subscription information in the database. Whenever new teaching resources enter the subscribed field, the dSPACE framework will automatically send e-mail to the subscribers. Finally, during the operation of the system, all functions operate normally and have strong security, so as to avoid the illegal theft or leakage of the data about the education system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Suhaimi, Hamizan, Saiful Izwan Suliman, Afdallyna Fathiyah Harun, Roslina Mohamad, Yuslinda Wati Mohamad Yusof e Murizah Kassim c. "Genetic algorithm for intrusion detection system in computer network". Indonesian Journal of Electrical Engineering and Computer Science 19, n.º 3 (1 de setembro de 2020): 1670. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1670-1676.

Texto completo da fonte
Resumo:
<span>Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands. In Network Intrusion Detection System (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of Genetic Algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems. </span>
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Wang, Jian Hang, e Hai Bo Wang. "Computer Local Area Network Security and Management". Advanced Materials Research 1079-1080 (dezembro de 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.

Texto completo da fonte
Resumo:
Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Olha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS". Problems of Modeling and Design Automatization, n.º 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.

Texto completo da fonte
Resumo:
In conditions of high business competition, IT organizations need to respond quickly to the needs of their users who need resources to support business applications. This is due to the rapid spread of the cloud computing model, in which resources can be deployed independently and on demand. Cloud computing is a source of tools to automate the deployment of resources, so IT organizations do not have to spend so much time doing this process manually. When deploying new applications, moving virtual servers or commissioning new instances due to dynamic applications, the network must respond quickly and provide the required type of connection. There has been a significant breakthrough in software configured networks (SDN / NFV) over the past few years. SDN / NFV organizations need to increase network adaptability by automating the network on cloud computing platforms.However, the new challenges posed by the combination of cloud computing and SDN / NFV, especially in the area of enterprise network security, are still poorly understood. This article is about solving this important problem. The article examines the impact on the mechanisms of protection against network attacks in the corporate network, which uses both technologies, simulates DDoS-attacks on cloud computing systems. It has been shown that SDN / NFV technology can really help protect against DDoS attacks if the security architecture is designed correctly.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Dongming Tang, Xianliang Lu e Juguang Li. "Minimizing Network Coding Resources with Improved Genetic Algorithm". International Journal of Digital Content Technology and its Applications 7, n.º 3 (15 de fevereiro de 2013): 464–71. http://dx.doi.org/10.4156/jdcta.vol7.issue3.59.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Lee, Jin-Kuk, e Kang-G. Shin. "NetDraino: Saving Network Resources via Selective Packet Drops". Journal of Computing Science and Engineering 1, n.º 1 (30 de setembro de 2007): 31–55. http://dx.doi.org/10.5626/jcse.2007.1.1.031.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Li, Ning. "Study of Computer Network Resource Sharing for Advanced Engineering Applications". Applied Mechanics and Materials 484-485 (janeiro de 2014): 799–802. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.799.

Texto completo da fonte
Resumo:
Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user. To analyze and further know the advantages of computer network resource sharing, it is necessary to combine with their actual application conditions. This is analyzed in this paper.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Javadpour, Amir. "Improving Resources Management in Network Virtualization by Utilizing a Software-Based Network". Wireless Personal Communications 106, n.º 2 (18 de fevereiro de 2019): 505–19. http://dx.doi.org/10.1007/s11277-019-06176-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Wang, WenXia. "A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm". Security and Communication Networks 2021 (12 de novembro de 2021): 1–10. http://dx.doi.org/10.1155/2021/2133042.

Texto completo da fonte
Resumo:
In order to improve the accuracy and efficiency of the classification of network ideological and political resources and promote the efficiency of ideological education, a research on the classification of network ideological and political resources based on the improved SVM algorithm is proposed. We analyze the characteristics and current situation of network ideological and political resources and conclude that the method elements are open and technical. The ontology elements are rich and shared, and the behavioral elements are autonomous and interactive. Three types of network ideological and political resources are proposed: the main resource, content resource, and means resource. The particle swarm algorithm is used to improve the SVM algorithm. In the process of constructing the SVM classifier, the fuzzy membership function is introduced, the classification problem of network ideological and political resources is converted into a secondary planning problem, and the accuracy of network ideological and political resources is finally realized. Simulation results show that the use of improved algorithms to classify network ideological and political resources can improve the accuracy and efficiency of network abnormal data classification.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Apiecionek, Łukasz, e Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection". JUCS - Journal of Universal Computer Science 26, n.º 11 (28 de novembro de 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.

Texto completo da fonte
Resumo:
One of huge problem for recent IT systems are attacks on their resources called Distributed Denial of Service attacks. Many servers which are accessible from public network were a victim of such attacks or could be in the future. Unfortunately, there is still no effective method for protecting network servers against source of the attack, while such attack could block network resources for many hours. Existing solutions for protecting networks and IoT systems are using mainly firewalls and IDS/IPS mechanisms, which is not sufficient. This article presents the method minimizing the DDoS attacks. Proposed method provides possibilities for the network administrators to protect their servers and IoT network resources during the attack. The proposed fuzzy adaptive algorithm is using Ordered Fuzzy Numbers for predicting amount of packets which could be passed over the network boarder gateway. Proposed solution will give the opportunity for ordinary users to finish their work when the attack occurs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Hu, Zhenbing, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko e Oksana Herasymenko. "Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach". International Journal of Intelligent Systems and Applications 9, n.º 7 (8 de julho de 2017): 41–51. http://dx.doi.org/10.5815/ijisa.2017.07.05.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Nadezhdin, E. N. "THE TASK OF DISTRIBUTING SOFTWARE RESOURCES OF AN INFORMATION-COMPUTER NETWORK". Современные наукоемкие технологии (Modern High Technologies), n.º 12 2019 (2019): 89–94. http://dx.doi.org/10.17513/snt.37839.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Feng, Weizhou. "Research on the application of computer network resources in Japanese Teaching". Journal of Physics: Conference Series 1915, n.º 3 (1 de maio de 2021): 032064. http://dx.doi.org/10.1088/1742-6596/1915/3/032064.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Li, Ya. "Study on the Application of Computer Network Resources in Japanese Teaching". Journal of Physics: Conference Series 1992, n.º 3 (1 de agosto de 2021): 032071. http://dx.doi.org/10.1088/1742-6596/1992/3/032071.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Bailey, Charles W. "Intelligent Multimedia Computer Systems: Emerging Information Resources in the Network Environment". Library Hi Tech 8, n.º 1 (janeiro de 1990): 29–41. http://dx.doi.org/10.1108/eb047780.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Shen, Qianhe. "Detecting Collectable Resources on Computer Game Based on the Neural Network". Highlights in Science, Engineering and Technology 34 (28 de fevereiro de 2023): 226–31. http://dx.doi.org/10.54097/hset.v34i.5476.

Texto completo da fonte
Resumo:
Image recognition and classification were put in used in many places in recent years thanks to the great progress in machine learning and neural networks. However, seldom evidence indicate applications of image recognition in computer games. Since games are gradually becoming part of peoples life, it is the time to put the focus on those who are unable to enjoy this entertainment. Nowadays computer games often include the element of collecting e.g. (materials or treasure). A program that could automatically mark those collectable objects would significantly improve the gaming experience for those who have disability in their eyes. In this work the game Destiny 2 was used for training and testing and training model chose was Yolov5. 1,500 of images were put into the data set and trained with 350 epochs. The model eventually achieved 0.82 in precision, 0.96 in recall and 0.91 in F1. It also gets the average mAP value of 0.93. These results can strongly prove that this model has the potential to be used in real scenarios.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Xu, ChangBiao, KePing Long e Shizhong Yang. "Allocating network resources by weight between TCP traffics". Journal of Computer Science and Technology 18, n.º 2 (março de 2003): 247–51. http://dx.doi.org/10.1007/bf02948892.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia