Academic literature on the topic 'Computer network design'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network design.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network design"

1

Refaee, Eshrag A., and Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors." Complexity 2021 (April 26, 2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Full text
Abstract:
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
APA, Harvard, Vancouver, ISO, and other styles
2

Cohen, Fred. "A secure computer network design." Computers & Security 4, no. 3 (September 1985): 189–205. http://dx.doi.org/10.1016/0167-4048(85)90028-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Bestoun S., Amin S. Mohammad, and Hemin T. Essa. "Assessing Combinatorial Design for Analyzing System Performance of a Computer Network." Journal of Zankoy Sulaimani - Part A 16, no. 4 (October 16, 2014): 83–91. http://dx.doi.org/10.17656/jzs.10349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Olenev, V. L., I. Ya Lavrovskaya, L. I. Kurbanov, I. L. Korobkov, and Yu E. Sheynin. "COMPUTER AIDED DESIGN SYSTEM FOR SPACECRAFT ONBOARD NETWORKS." Issues of radio electronics, no. 8 (August 20, 2018): 145–53. http://dx.doi.org/10.21778/2218-5453-2018-8-145-153.

Full text
Abstract:
Modern spacecraft onboard networks consist of a large number of nodes which interact with each other via a communication network. SpaceWire is a new generation technology which is being integrated into new spacecraft systems. In order to check network operation on the early stages of network design it is reasonable to perform its software simulation. The paper provides an analysis of existing simulation tools for the on-board and local area networks. We overview the main abilities of the existing software and then propose the computer-aided design (CAD) system for SpaceWire onboard networks design and simulation - SANDS. This software will solve important tasks, which spacecraft developers face with during implementation of satellites and other space vehicles. SANDS system will support the full on-board network design and simulation flow, which begins from the network topology automated generation and finishes with getting the network structure, configuration and parameters setting, simulation results and statistics.
APA, Harvard, Vancouver, ISO, and other styles
5

Sheehy, Noel. "Interpretation of design scribbles in computer network design." Irish Journal of Psychology 14, no. 3 (January 1993): 532–34. http://dx.doi.org/10.1080/03033910.1993.10557966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Барбарук, Л. В., O. O. Лавриненко, and I. O. Квасов. "Methodological approach to computer network design." ВІСНИК СХІДНОУКРАЇНСЬКОГО НАЦІОНАЛЬНОГО УНІВЕРСИТЕТУ імені Володимира Даля, no. 5(253) (September 5, 2019): 17–20. http://dx.doi.org/10.33216/1998-7927-2019-253-5-17-20.

Full text
Abstract:
This article proposed a methodological approach to modeling computer network for business center. It describes the main problems that can be encountered when designing a network. Developed by meth-od will help to minimize costs, quickly implement the designed net-work to the enterprise and save time. When selecting a program, all criteria were taken into account, and only after that was NetCracker selected.
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jiaomin, and Jianguo Lu. "Design computer network by using powerline." Computers & Industrial Engineering 35, no. 1-2 (October 1998): 263–66. http://dx.doi.org/10.1016/s0360-8352(98)00048-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vainer, V. G., and E. V. Levit. "Computer-Aided Optimal Dynamic Network Design." IFAC Proceedings Volumes 25, no. 24 (September 1992): 171–76. http://dx.doi.org/10.1016/s1474-6670(17)54027-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Full text
Abstract:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
APA, Harvard, Vancouver, ISO, and other styles
10

Esabella, Shinta. "Perancangan Infrastruktur Jaringan Komputer Untuk Mendukung Implementasi Sistem Informasi Pada Universitas Teknologi Sumbawa." Jurnal Matrik 16, no. 1 (July 26, 2017): 44. http://dx.doi.org/10.30812/matrik.v16i1.16.

Full text
Abstract:
The purpose of this writing is to be able to recognize the performance of the design of computer networks of Universitas Teknologi Sumbawa which has been built in simulator OPNET Version 14.5, from which the design of a computer network consists of two designs specifically design of computer networks using Cable Media and Wireless Media (Access Point). The study begins by analyzing the current situation of the computer network and discovers the circumstance of utilization of computer networks had not been optimal as the condition of the computer network infrastructure of Universitas Teknologi Sumbawa rector is only found in the main building itself. The process ofanalysis and design of computer network infrastructure uses the Network Development Life Cycle (NDLC). The comparison outcome of the design with the Cable Media in the Simulator has Page Response Time 82,3% faster than using Wireless Media and delay point of Cable Media is 19,1% lower than Wireless Media. Therefore Cable Media is able to be considered as one of preferences by the Executive Board of Universitas Teknologi Sumbawa to develop Computer Network Infrastructure for integrating entire existing building within the campus area in order to support the implementation of the information system.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer network design"

1

Geha, Abbas. "Computer enhanced network design." Thesis, University of Sussex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

NAVAS, JOSE RICARDO PORTILHO. "TOPICS IN COMPUTER NETWORK DESIGN." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1985. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=14053@1.

Full text
Abstract:
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
TELECOMUNICAÇÕES BRASILEIRAS S/A
O trabalho propõe um método heurístico para a análise de modelos de redes de filas fechadas, denominado algoritmo linearizado de redes simplificado (ALS), o qual é o resultado de uma simplificação no Algoritmo Linearizador original. O ALS mostrou-se interessante na análise de redes de grande porte (redes com mais de 10 classes de usuários) por apresentar um tempo de processamento bastante pequeno, se comparado com o tempo do Algoritmo Linearizador e de outros algoritmos existentes na literatura. É apresentado também a definição de um método aproximado para a integração dos mecanismos de encaminhamento e controle de fluxo em redes de computadores comutados por pacote. Resultados de simulação mostram que com esse esquema é possível utilizar de uma maneira bastante eficiente os recursos da rede.
This work presents a heuristic method called Simplifield Linearizer Algorithm for analyisis of closed queueing network models. The proposed method from some simplifications introduced in the original Linearizer Algorithm. The Simplified Linearizer Algorithm is quite useful in the analysis of large network (network with more than ten user classes) due to its smaller processing time as compared with the processing time required by the Linearizer Algorithm and others describ in the literature. Also, this work defines an approximate method for the integration of the routing and flow control mechanism in packet switching computer networks. Simulation results shom that this integration scheme improves the efficiency associated with the utilization of the network resources.
APA, Harvard, Vancouver, ISO, and other styles
3

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Wenrui. "Routing and Network Design in Delay Tolerant Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14085.

Full text
Abstract:
Delay tolerant networks (DTNs) are a class of emerging networks that exhibit significantly different characteristics from today's Internet, such as intermittent connectivity, large delay, and high loss rates. DTNs have important applications in disaster relief, military, rural Internet access, environmental sensing and surveillance, interplanetary communication, underwater sensing, and vehicular communication. While not the common case for networking, DTNs represent some of the most critical cases, where the ability to communicate can make a huge difference for human lives. Supporting effective communication in DTNs, however, is challenging. First, with intermittent connectivity, DTNs are often extremely limited in capacity. Second, given resource limitations and uncertainty in DTNs, it is critical to deliver data efficiently and robustly. The situation is especially acute for multicast which sends data to multiple destinations. This thesis seeks to address these two issues. To enhance network capacity in DTNs, we propose a message ferrying scheme that exploits the use of special mobile nodes (called message ferries) and controlled device mobility to deliver data. Message ferries are utilized to transport data via mobility between sources and destinations. We develop a foundation for the control of the mobility of message ferries, and nodes if possible, to cooperatively deliver data under a variety of conditions. We also study another approach which deploys new nodes called throwboxes to enhance capacity. Throwboxes are small and inexpensive wireless devices. By relaying data between mobile nodes, throwboxes are able to create data transfer opportunities that otherwise would not exist. We systematically investigate the issues of deployment and routing, and develop algorithms for various deployment and routing approaches. Based on extensive evaluation, we obtain several findings to guide the design and operation of throwbox-augmented DTNs. To address the issue of efficient and robust data delivery, we focus on DTN multicasting. Given the unique characteristics of DTNs, traditional solutions such as IP multicast can not be simply ported to DTNs. We identify the limitations of IP multicast semantics in DTNs and define new semantic models for DTN multicast. Based on these semantic models, we develop and evaluate several multicast routing algorithms with different routing strategies.
APA, Harvard, Vancouver, ISO, and other styles
5

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Full text
Abstract:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagrams to a group of interested receivers in one transmission.Core-based trees major concerns are core selection and core as single point of failure.The problem of core selection is to choose the best core or cores in the network toimprove the network performance.In this dissertation we propose 1) a multiple core selection approach for core-based tree multicasting, senders can select different cores to have an efficient loadbalanced multicore multicasting. It will overcome any core failure as well. 2) Novel andefficient schemes for load shared multicore multicasting are presented. Multiple coresare selected statically, that is, independent of any existing multicast groups and also theselection process is independent of any underlying unicast protocol. Some of theselected cores can be used for fault- tolerant purpose also to guard against any possible core failures. 3) We have presented two novel and efficient schemes forgroup-based load shared multicore multicasting in which members of a multicast groupuse the same core tree for their multicasting. 4) We also presented two schemes aim atachieving low latency multicasting along with load sharing for delay sensitive multicastapplications. Besides, we have presented a unique approach for core migration, whichuses two very important parameters, namely, depth of a core tree and pseudo diameterof a core. One noteworthy point from the viewpoint of fault tolerance is that the degreeof fault-tolerance can be enhanced from covering single point-failure to any number ofcore failures.
APA, Harvard, Vancouver, ISO, and other styles
6

Zang, Joanna Q. "Design of a redundancy protocol /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morley, George David. "Analysis and design of ring-based transport networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60329.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Crowley, Patrick. "Design and analysis of architectures for programmable network processing systems /." Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/6991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Mousa, Yamin Samir. "MAC/routing design for under water sensor networks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer network design"

1

Netware 4 network design and implementation. Indianapolis: New Riders, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cady, Dorothy L. NetWare 4 network design and implementation. Indianapolis, IN: New Riders Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spohn, Darren L. Data network design. New York: McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tina, Brown, and Grau Scott, eds. Data network design. 3rd ed. New York: McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Data network design. 2nd ed. New York: McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Thomas M. OSPF network design solutions. 2nd ed. Indianapolis, IN: Cisco Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Don, Slice, and White Russ, eds. Advanced IP network design. Indianapolis, IN: Cisco Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

B, Demuth Howard, and Beale Mark H, eds. Neural network design. Boston: PWS Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Margaret, Robbins, ed. Network design essentials. Boston: AP Professional, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

OSPF network design solutions. [S.l.]: Cisco Systems, Cisco Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer network design"

1

Barksdale, William J. "Network Design Techniques." In Practical Computer Data Communications, 245–317. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Avarikioti, Georgia, Kenan Besic, Yuyi Wang, and Roger Wattenhofer. "Online Payment Network Design." In Lecture Notes in Computer Science, 307–20. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31500-9_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luntovskyy, Andriy, Dietbert Gütter, and Igor Melnyk. "CANDY – Computer Aided Network Design Utility." In Planung und Optimierung von Rechnernetzen, 335–94. Wiesbaden: Vieweg+Teubner Verlag, 2012. http://dx.doi.org/10.1007/978-3-8348-8242-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pavlidou, Niovi-Fotini, and Byron Papathanassiu. "Design of Interfactory Computer Network Interconnection." In Modern Production Concepts, 723–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-76401-1_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Avarikioti, Georgia, Gerrit Janssen, Yuyi Wang, and Roger Wattenhofer. "Payment Network Design with Fees." In Lecture Notes in Computer Science, 76–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00305-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Kang-Soo, and Sang Hun Lee. "Network Based Engineering Design Education." In Lecture Notes in Computer Science, 48–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552413_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Borne, Sylvie, Virginie Gabrel, Ridha Mahjoub, and Raouia Taktak. "Multilayer Survivable Optical Network Design." In Lecture Notes in Computer Science, 170–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21527-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cardwell, R. "Survivable fiber network design." In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 61–78. Providence, Rhode Island: American Mathematical Society, 1991. http://dx.doi.org/10.1090/dimacs/005/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chlamtac, I., M. Ciesielski, A. Fumagalli, C. Ruszczyk, and G. Wedzinga. "Intelligent Simulation for Computer Aided Design of Optical Networks." In Optical Network Design and Modelling, 73–86. New York, NY: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35361-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schacht, Johanna, and Margeret Hall. "Network Propagation – Chance or Design?" In Communications in Computer and Information Science, 392–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39476-8_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network design"

1

Kriz, Pavel. "Computer-aided OSPF Network Design Tool." In 34th International Conference on INFORMATION TECHNOLOGY INTERFACES. Zagreb: University Computing Centre - SRCE, 2012. http://dx.doi.org/10.2498/iti.2012.0371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cheung, Samson. "Parallel CFD design on network-based computer." In 10th Computing in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1995. http://dx.doi.org/10.2514/6.1995-984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Georgiou, Christos J. "Network design for fiber-optic computer communications." In Optical Fiber Communication Conference. Washington, D.C.: OSA, 1991. http://dx.doi.org/10.1364/ofc.1991.wd2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ti, Adi. "Network Models and Design Modelling the Design of Computer Networks for Effective Management." In Second International Conference on Advances In Computing, Control And Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-073-6-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seshadri, P., and Larry C. Witte. "Computer Aided Optimal Design of Heat Exchanger Networks." In ASME 1991 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1991. http://dx.doi.org/10.1115/cie1991-0076.

Full text
Abstract:
Abstract A method for finding the best (optimal) operating layout of heat exchangers in complicated thermal networks is developed in this paper. Computer algorithms are developed that take advantage of pinch technology and economic considerations, and exergetic constraints as well as conventional heat and mass balances. Our goals were to achieve minimum loss of exergy between hot and cold streams subject to practical system constraints. Furthermore, resulting networks should be limited to no more units than the theoretical minimum. The ultimate goal was to minimize investment and operating costs for a set of fixed overall system constaints. These goals were realized by developing a computer-based nonlinear multiple objective optimization algorithm that included the elements discussed above. The final solution is a synthesis of the best system using the above-described mathematical formulation. Results for a 4-stream heat exchanger network are presented in terms of the minimum temperature difference at the pinch point. The influence of the minimum temperature difference on capital cost, heat transfer area, exergetic losses and second law efficiency of various heat exchangers in the network is presented.
APA, Harvard, Vancouver, ISO, and other styles
6

Jinghui Shi and Fuan Wen. "Design patterns applied to computer network virtual lab system design." In 2011 IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2011. http://dx.doi.org/10.1109/icsess.2011.5982270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Zhang, Zhao Jian, Zheng Li-Nan, and Li Nan. "The Application of Human-Computer Interaction Idea in Computer Aided Industrial Design." In 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA). IEEE, 2017. http://dx.doi.org/10.1109/iccnea.2017.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, J.-H., C.-H. Cho, J.-D. Lee, D.-Y. Park, and Y.-J. Kim. "Design of Network Based On-Board Computer System." In Automotive and Transportation Technology Congress and Exposition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2001. http://dx.doi.org/10.4271/2001-01-3258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Postek, Pawel, and Wojciech Pachelski. "Design of Geodetic Network Using Controlled Computer Simulation." In 2017 Baltic Geodetic Congress (BGC Geomatics). IEEE, 2017. http://dx.doi.org/10.1109/bgc.geomatics.2017.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, He, Li Shuchen, and Gao Yougang. "EMC design in lightning protection of computer network." In The 2006 4th Asia-Pacific Conference on Environmental Electromagnetics. IEEE, 2006. http://dx.doi.org/10.1109/ceem.2006.258007.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer network design"

1

Bernstein, Arthur J. The Design and Implementation of a Network Computer. Fort Belvoir, VA: Defense Technical Information Center, May 1986. http://dx.doi.org/10.21236/ada174600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
3

Emelyanov, I. I., and N. N. Ziyatdinov. Interface of computer-aided design of heat exchange networks based on digital models «HEN-Design». OFERNIO, December 2020. http://dx.doi.org/10.12731/ofernio.2020.24737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Farhi, Edward, and Hartmut Neven. Classification with Quantum Neural Networks on Near Term Processors. Web of Open Science, December 2020. http://dx.doi.org/10.37686/qrl.v1i2.80.

Full text
Abstract:
We introduce a quantum neural network, QNN, that can represent labeled data, classical or quantum, and be trained by supervised learning. The quantum circuit consists of a sequence of parameter dependent unitary transformations which acts on an input quantum state. For binary classification a single Pauli operator is measured on a designated readout qubit. The measured output is the quantum neural network’s predictor of the binary label of the input state. We show through classical simulation that parameters can be found that allow the QNN to learn to correctly distinguish the two data sets. We then discuss presenting the data as quantum superpositions of computational basis states corresponding to different label values. Here we show through simulation that learning is possible. We consider using our QNN to learn the label of a general quantum state. By example we show that this can be done. Our work is exploratory and relies on the classical simulation of small quantum systems. The QNN proposed here was designed with near-term quantum processors in mind. Therefore it will be possible to run this QNN on a near term gate model quantum computer where its power can be explored beyond what can be explored with simulation.
APA, Harvard, Vancouver, ISO, and other styles
5

Taiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, December 2020. http://dx.doi.org/10.4271/epr2020026.

Full text
Abstract:
Quantum computing is considered the “next big thing” when it comes to solving computational problems impossible to tackle using conventional computers. However, a major concern is that quantum computers could be used to crack current cryptographic schemes designed to withstand traditional cyberattacks. This threat also impacts future automated vehicles as they become embedded in a vehicle-to-everything (V2X) ecosystem. In this scenario, encrypted data is transmitted between a complex network of cloud-based data servers, vehicle-based data servers, and vehicle sensors and controllers. While the vehicle hardware ages, the software enabling V2X interactions will be updated multiple times. It is essential to make the V2X ecosystem quantum-safe through use of “post-quantum cryptography” as well other applicable quantum technologies. This SAE EDGE™ Research Report considers the following three areas to be unsettled questions in the V2X ecosystem: How soon will quantum computing pose a threat to connected and automated vehicle technologies? What steps and measures are needed to make a V2X ecosystem “quantum-safe?” What standardization is needed to ensure that quantum technologies do not pose an unacceptable risk from an automotive cybersecurity perspective?
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography