To see the other types of publications on this topic, follow the link: Computer network resources.

Journal articles on the topic 'Computer network resources'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
APA, Harvard, Vancouver, ISO, and other styles
2

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources." Mobile Information Systems 2022 (September 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.

Full text
Abstract:
The balanced distribution of multimedia wireless network modular teaching resources is improved by optimizing and adjusting the balanced distribution of multimedia wireless network modular teaching resources. Based on block grid balanced scheduling and resource spectrum fusion, a balanced distribution method of multimedia wireless network modular teaching resources is proposed. A blockchain Internet of Things accesses control network architecture system for the balanced allocation of multimedia wireless network modular teaching resources established using the priority business scheduling metho
APA, Harvard, Vancouver, ISO, and other styles
4

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (December 29, 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Full text
Abstract:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available informat
APA, Harvard, Vancouver, ISO, and other styles
5

Tulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.

Full text
Abstract:
In the modern conditions of developed information systems, the advantages of creating virtual private networks cannot be underestimated. But before mentioning the clearest and most useful ways to create virtual private networks, it is necessary to understand its meaning. Nowadays, the question of how to communicate with the corporate information system is important for users. Here they will need a broadband connection, regardless of whether they use a fixed network or Wi-Fi, as it is not uncommon for users to work on the road. Today, virtual technologies are becoming more popular, they occupy
APA, Harvard, Vancouver, ISO, and other styles
6

Yi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, and Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks." 網際網路技術學刊 23, no. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.

Full text
Abstract:
<p>This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission rate and the channel occupancy rate, the proposed system has “knowledge” of overall transmission behavior and can regulate transmission resources. An Adaptive Connection Assignment (ACA) mechanism is proposed for end devices; it find out target end devices with poor transmission performance, analyzes their alternative Acc
APA, Harvard, Vancouver, ISO, and other styles
7

Bishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley, and Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction." Journal of Geography 92, no. 3 (May 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

骆, 又麟. "Application of Network Resources in Computer Teaching." Vocational Education 13, no. 03 (2024): 836–40. http://dx.doi.org/10.12677/ve.2024.133135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (February 29, 2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Full text
Abstract:
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, e
APA, Harvard, Vancouver, ISO, and other styles
10

Giladi, Ran, Ephraim Korach, and Rony Ohayon. "Placement of network resources in communication networks." Computer Networks 43, no. 2 (October 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Boyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (May 6, 2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.

Full text
Abstract:
In this paper a vulnerability penetration testing for several hosts in WLAN is made. The exploited operating systems were Microsoft Windows 7Enterprise and Microsoft Windows 8. It has been used an exploit named “Java storeImageArray () Invalid Array Index-ing Vulnerability”. Thanks to the open source penetration testing platform - Metasploit Framework the exploit was executed on the target hosts. The most important and critical rea-son the attack being successfully executed is connected with the human factor and interven-tion. Thereby, some security professionals and network administrators can
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Ning. "Study of Computer Network Resource Sharing for Advanced Engineering Applications." Applied Mechanics and Materials 484-485 (January 2014): 799–802. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.799.

Full text
Abstract:
Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user. To analyze and further know the advantages of computer network resource sharing, it is necessar
APA, Harvard, Vancouver, ISO, and other styles
13

Bushur, Jacob, and Chao Chen. "Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 41–54. http://dx.doi.org/10.5121/ijcsit.2022.14304.

Full text
Abstract:
Distributed computing networks harness the power of existing computing resources and grant access to significant computing power while averting the costs of a supercomputer. This work aims to configure distributed computing networks using different computer devices and explore the benefits of the computing power of such networks. First, an HTCondor pool consisting of sixteen Raspberry Pi single-board computers and one laptop is created. The second distributed computing network is set up with Windows computers in university campus labs. With the HTCondor setup, researchers inside the university
APA, Harvard, Vancouver, ISO, and other styles
14

Niu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Full text
Abstract:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain ext
APA, Harvard, Vancouver, ISO, and other styles
15

Bura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Irwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono, and Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB." Infotech: Journal of Technology Information 8, no. 2 (November 30, 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.

Full text
Abstract:
The form of computer network connection can be via cable or wireless such as fiber optic, microwave, wireless, or satellite. One type of computer network that is often used to connect personal computers and workstations in an office or an organization, company or factory for the use of shared resources is a local area network. The purpose of this research is to analyze, design and create an application that can detect damage to Local Area Network (LAN) networks. The research method used is backward chaining. The results of this study are applications that can detect damage to local area networ
APA, Harvard, Vancouver, ISO, and other styles
17

Xu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.

Full text
Abstract:
With the development of computer and multimedia technology, social media platforms are widely used in various fields, so this paper introduces the design of network multimedia platform in the human resources management system, and designs a kind of new human resources management computer system. In order to improve the level of human resource management, it can introduce more talents and rational allocation human resources for enterprises, so we must improve the user generated content quality of social networking platform, eliminating spam behavior, and improving the social network human resou
APA, Harvard, Vancouver, ISO, and other styles
18

Lu, Zhaoming, Tao Lei, Xiangming Wen, Luhan Wang, and Xin Chen. "SDN Based User-Centric Framework for Heterogeneous Wireless Networks." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9874969.

Full text
Abstract:
Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs) have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet). However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS) strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable
APA, Harvard, Vancouver, ISO, and other styles
19

AlQahtani, Salman Ali. "Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities." Future Internet 15, no. 10 (October 19, 2023): 343. http://dx.doi.org/10.3390/fi15100343.

Full text
Abstract:
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is network slicing, which allows the creation of multiple virtual networks to support various use cases on a unified physical network. However, the limited availability of radio resources in the 5G cloud-Radio Access Network (C-RAN) and the ever-increasing data traffic volume necessitate efficient resource allocation algorithms to ensure quality
APA, Harvard, Vancouver, ISO, and other styles
20

Yu, Jie, Yaliu Li, Chenle Pan, and Junwei Wang. "A Classification Method for Academic Resources Based on a Graph Attention Network." Future Internet 13, no. 3 (March 4, 2021): 64. http://dx.doi.org/10.3390/fi13030064.

Full text
Abstract:
Classification of resource can help us effectively reduce the work of filtering massive academic resources, such as selecting relevant papers and focusing on the latest research by scholars in the same field. However, existing graph neural networks do not take into account the associations between academic resources, leading to unsatisfactory classification results. In this paper, we propose an Association Content Graph Attention Network (ACGAT), which is based on the association features and content attributes of academic resources. The semantic relevance and academic relevance are introduced
APA, Harvard, Vancouver, ISO, and other styles
21

Xi Liang, Xi Liang, and Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship." 網際網路技術學刊 23, no. 1 (January 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.

Full text
Abstract:
<p>Aiming at the problems of poor balance of recommended resources in the recommendation of traditional physical education network teaching resources and low trust degree of recommended physical education network teaching resources, this paper proposes a balanced recommendation algorithm for physical education network teaching resources based on trust relationship. By SVM algorithm, the teaching resources of physical education network are classified, and then the invalid data of teaching resources of physical education network are deleted, and the remaining teaching resources of physical
APA, Harvard, Vancouver, ISO, and other styles
22

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of
APA, Harvard, Vancouver, ISO, and other styles
23

Boyanov, Petar. "USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS." Journal Scientific and Applied Research 6, no. 1 (November 11, 2014): 148–54. http://dx.doi.org/10.46687/jsar.v6i1.152.

Full text
Abstract:
In this paper a comprehensive scanning and monitoring the suspicious states in determined computer networks is made. Most of the computer and network problems with many vulnerabilities are connected. Therefore it is advisable to scan the entire computer network in order to detect weaknesses and accordingly be taken precautions Thanks to the many malicious users will not be able to penetrate in the relevant computer network and to gain access to computer resources.
APA, Harvard, Vancouver, ISO, and other styles
24

Perepelkin, D. A., and A. M. Pham. "MATHEMATICAL AND COMPUTER MODELING OF HETEROGENEOUS RESOURCES PLANNING AND ALLOCATION IN INDUSTRIAL NETWORKS." Vestnik of Ryazan State Radio Engineering University 77 (2021): 68–80. http://dx.doi.org/10.21667/1995-4565-2021-77-68-80.

Full text
Abstract:
The aim of the work is to develop mathematical and software tools for modeling planning and allocating processes of heterogeneous resources in industrial networks. Two approaches to the application of functional dependencies of random values of resources to the model of GERT-network are proposed: parallel and sequential, which corresponds to the processes of planning and allocating resources. The approaches proposed in the work allow expanding the capabilities of classical GERT-networks. To generalize the process of implementation and automation of calculations, a computer modeling system has
APA, Harvard, Vancouver, ISO, and other styles
25

Olha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS." Problems of Modeling and Design Automatization, no. 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.

Full text
Abstract:
In conditions of high business competition, IT organizations need to respond quickly to the needs of their users who need resources to support business applications. This is due to the rapid spread of the cloud computing model, in which resources can be deployed independently and on demand. Cloud computing is a source of tools to automate the deployment of resources, so IT organizations do not have to spend so much time doing this process manually. When deploying new applications, moving virtual servers or commissioning new instances due to dynamic applications, the network must respond quickl
APA, Harvard, Vancouver, ISO, and other styles
26

Mathonsi, Topside E., Tshimangadzo Mavin Tshilongamulenzhe, and Bongisizwe Erasmus Buthelezi. "Enhanced Resource Allocation Algorithm for Heterogeneous Wireless Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 24, no. 6 (November 20, 2020): 763–73. http://dx.doi.org/10.20965/jaciii.2020.p0763.

Full text
Abstract:
In heterogeneous wireless networks, service providers typically employ multiple radio access technologies to satisfy the requirements of quality of service (QoS) and improve the system performance. However, many challenges remain when using modern cellular mobile communications radio access technologies (e.g., wireless local area network, long-term evolution, and fifth generation), such as inefficient allocation and management of wireless network resources in heterogeneous wireless networks (HWNs). This problem is caused by the sharing of available resources by several users, random distributi
APA, Harvard, Vancouver, ISO, and other styles
27

Devika SV, Et al. "Radio Resource Management Satellite Communication Network MCDM Method." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 1826–32. http://dx.doi.org/10.17762/ijritcc.v11i10.8759.

Full text
Abstract:
Worldwide deployment of heterogeneous wireless networks is growing as a result of consumer demand for connectivity at all times and in all places. These customers' interest in multimedia apps like video streaming and VoIP, which demand tight Quality of Service (QoS) support, is growing at the same time. With such limitations, provisioning network resources is a difficult undertaking. In fact, it might be challenging for a network operator to identify trustworthy criteria to choose the optimum network that ensures user happiness while maximising network utilisation, given the availability of nu
APA, Harvard, Vancouver, ISO, and other styles
28

Rehm, Sven-Volker, Lakshmi Goel, and Iris Junglas. "Using Information Systems in Innovation Networks: Uncovering Network Resources." Journal of the Association for Information Systems 18, no. 8 (August 2017): 577–604. http://dx.doi.org/10.17705/1jais.00465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sharadqeh, Ahmad. "A novel algorithm for software defined networks model to enhance the quality of services and scalability in wireless network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (April 1, 2022): 1585. http://dx.doi.org/10.11591/ijece.v12i2.pp1585-1592.

Full text
Abstract:
Software defined networks (SDN) have replaced the traditional network architecture by separating the control from forwarding planes. SDN technology utilizes computer resources to provide worldwide effective service than the aggregation of single internet resources usage. Breakdown while resource allocation is a major concern in cloud computing due to the diverse and highly complex architecture of resources. These resources breakdowns cause delays in job completion and have a negative influence on attaining quality of service (QoS). In order to promote error-free task scheduling, this study rep
APA, Harvard, Vancouver, ISO, and other styles
30

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation
APA, Harvard, Vancouver, ISO, and other styles
31

Macleod, Roderick A. "Network resources and access tools." New Review of Information Networking 10, no. 1 (May 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

MacLeod, Roderick A. "Network resources and access tools." New Review of Information Networking 9, no. 1 (January 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Shefer, O. V., G. V. Golovko, Ye A. Chaika, and M. A. Luchko. "DEVELOPMENT OF A COMPUTER NETWORK OF THE REGIONAL OFFICE OF WATER RESOURCES IN POLTAVA REGION WITH AN INTELLIGENT DATABASE MANAGEMENT SYSTEM." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 61 (September 11, 2020): 44–48. http://dx.doi.org/10.26906/sunz.2020.3.044.

Full text
Abstract:
The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the Regional Office of Water Resources in Poltava region. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. Results. All possible types of network applications and components were identified and the most o
APA, Harvard, Vancouver, ISO, and other styles
34

Feng, Xu, Mengyang He, Lei Zhuang, Yanrui Song, and Rumeng Peng. "Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space–Air–Ground Integrated Network." Future Internet 16, no. 1 (January 16, 2024): 27. http://dx.doi.org/10.3390/fi16010027.

Full text
Abstract:
SAGIN is formed by the fusion of ground networks and aircraft networks. It breaks through the limitation of communication, which cannot cover the whole world, bringing new opportunities for network communication in remote areas. However, many heterogeneous devices in SAGIN pose significant challenges in terms of end-to-end resource management, and the limited regional heterogeneous resources also threaten the QoS for users. In this regard, this paper proposes a hierarchical resource management structure for SAGIN, named SAGIN-MEC, based on a SDN, NFV, and MEC, aiming to facilitate the systemat
APA, Harvard, Vancouver, ISO, and other styles
35

Du, Lian Yan. "Design on Structure and Integrity for Foreign Language Network Learning Resource Library." Applied Mechanics and Materials 543-547 (March 2014): 4581–84. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4581.

Full text
Abstract:
Network learning resources is accompanied by computer technology, communication technology and network technology developed new educational resources, for foreign language teaching providing a variety of teaching materials. For difficult problems in foreign language network learning resources construction, the paper based on SQL Server database management system to study resource library structure and integrity design. It based on requirements analysis and systems involved in language classes, resource types, resources, resource files, resource evaluation five entities, the part of structural
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Li Jun. "Research on Computer Network Data Transfer Methods." Advanced Materials Research 926-930 (May 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.

Full text
Abstract:
In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and re
APA, Harvard, Vancouver, ISO, and other styles
37

Pourebrahimi, Behnaz, and Koen Bertels. "Self-Adaptive Economic-Based Resource Allocation in Ad-Hoc Grids." International Journal of Embedded and Real-Time Communication Systems 3, no. 2 (April 2012): 111–30. http://dx.doi.org/10.4018/jertcs.2012040106.

Full text
Abstract:
Resource allocation is the process of discovering and allocating resources to requested tasks in a way that satisfy both user jobs and resource administrators. In ad-hoc Grids, resource allocation is a challenging undertaking as tasks and resources are distributed, heterogeneous in nature, owned by different individuals or organizations and they may arise spontaneously at any time with various requirements and availabilities. In this paper, the authors address an economic-based framework for resource allocation in ad-hoc Grids to deal with the dynamic nature of such networks. Within the econom
APA, Harvard, Vancouver, ISO, and other styles
38

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, invo
APA, Harvard, Vancouver, ISO, and other styles
39

Chaudhary, Sachin, and Anjna Chaudhary. "Biologically inspired networking: A solution over the challenges of ordinary networking." International Journal of Advance Research and Innovation 1, no. 3 (2013): 40–44. http://dx.doi.org/10.51976/ijari.131305.

Full text
Abstract:
The steadily growing speed of technological development, computer networks are becoming increasingly complex. At the same time, they must fulfill ever higher requirements in terms of performance, scale, robustness etc. while minimizing their use of resources and adapting to dynamics. The communication between network embedded systems has become a major research domain in the communication network area. Wireless sensor network (WSN) and sensor/actuator network (SANET) build of huge amounts of interacting nodes build the basis for this research. From very long time, nature and biology have inspi
APA, Harvard, Vancouver, ISO, and other styles
40

Voyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)." Computer Music Journal 18, no. 3 (1994): 8. http://dx.doi.org/10.2307/3681174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gao, Chenchen, and Kai Zhang. "Research on remote education intelligent recommendation system of computer network Ancient Literature Resources Database." MATEC Web of Conferences 365 (2022): 01055. http://dx.doi.org/10.1051/matecconf/202236501055.

Full text
Abstract:
With the development of intelligent education and the development of distance education becoming more and more intelligent and three-dimensional, an intelligent recommendation system is constructed on the basis of learners'individual demands, will achieve learning requirements and recommended content of the precise match. The construction of ancient literature resource database by means of computer network and the timely push of intelligent recommendation system to students will promote the essential change of distance education on the basis of reconstructing the ecology of distance education.
APA, Harvard, Vancouver, ISO, and other styles
42

Martini, Barbara, Valerio Martini, Fabio Baroncelli, Karim Torkman, and Piero Castoldi. "Application-Driven Control of Network Resources in Multiservice Optical Networks." Journal of Optical Communications and Networking 1, no. 2 (July 1, 2009): A270. http://dx.doi.org/10.1364/jocn.1.00a270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, WenXia. "A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm." Security and Communication Networks 2021 (November 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/2133042.

Full text
Abstract:
In order to improve the accuracy and efficiency of the classification of network ideological and political resources and promote the efficiency of ideological education, a research on the classification of network ideological and political resources based on the improved SVM algorithm is proposed. We analyze the characteristics and current situation of network ideological and political resources and conclude that the method elements are open and technical. The ontology elements are rich and shared, and the behavioral elements are autonomous and interactive. Three types of network ideological a
APA, Harvard, Vancouver, ISO, and other styles
44

Zhao, Guotao, and Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm." Scientific Programming 2021 (October 11, 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.

Full text
Abstract:
In order to improve the retrieval ability of multiview attribute coded image network teaching resources, a retrieval algorithm of image network teaching resources based on depth hash algorithm is proposed. The pixel big data detection model of the multiview attribute coding image network teaching resources is constructed, the pixel information collected by the multiview attribute coding image network teaching resources is reconstructed, the fuzzy information feature components of the multiview attribute coding image are extracted, and the edge contour distribution image is combined. The distri
APA, Harvard, Vancouver, ISO, and other styles
45

Hiswara, Indra, Khusnul Khoiriyah, and Dody Febriyanto. "PERANCANGAN JARINGAN LAN SMK AL-KHAIRIYAH 2 DENGAN MENGGUNAKAN METODE OSPF." JEIS : Jurnal Elektro dan Informatika Swadharma 3, no. 1 (January 31, 2023): 58–66. http://dx.doi.org/10.56486/jeis.vol3no1.302.

Full text
Abstract:
The internet network is needed to carry out daily activities. A computer network is a network system where all computers share data and resources. The problem that often occurs in computer networks at SMK Al Khairiyah 2 is the dominance of user limitations by staff activities such as downloading or uploading large files. As well as the difficulty of knowing the number of computer network users who use wireless technology. This causes frequent problems with the computer network at this school, such as data sent being slow and doesn't even reach its destination, communication often experiences t
APA, Harvard, Vancouver, ISO, and other styles
46

Mshvidobadze, Tinatin. "Computer Network and Computer Grid Joins to E-Learning." Journal of Technical Science and Technologies 4, no. 2 (May 22, 2016): 35–37. http://dx.doi.org/10.31578/jtst.v4i2.81.

Full text
Abstract:
According to the development of communications and web-based technologies in recent years, e-Learning has became very important for everyone and is seen as one of the most dynamic teaching methods. Grid computing is a pattern for increasing the computing power and storage capacity of a system and is based on hardware and software resources in a network with common purpose. In the present article grid architecture is shown and its different layers are described. This layer is heart of grid learning architecture and, in fact, regardless of this layer, e-Learning based on grid architecture will n
APA, Harvard, Vancouver, ISO, and other styles
47

Rong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network." Scientific Programming 2021 (June 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.

Full text
Abstract:
The main purpose of the integration of network media and middle school ideological and political course is to better realize the moral education function of middle school ideological and political development. The use of resource integration technology to manage distributed teaching resources is conducive to improving the level of information construction in colleges and universities, and so on. This paper puts forward the integration system of ideological and political multimedia network teaching resources based on wireless network. Firstly, it presents an overview of the Radio Resource Manag
APA, Harvard, Vancouver, ISO, and other styles
48

Xue, Nian, and Li Wei Jia. "Construction and Research of Virtual Network User File System Based on Upnp and FUSE on Linux." Applied Mechanics and Materials 299 (February 2013): 125–29. http://dx.doi.org/10.4028/www.scientific.net/amm.299.125.

Full text
Abstract:
The Development of the computer has been from a single machine to the server, and then server clustering technology, and the emerging "cloud" network, which invariably show the network's role in the computer. Meanwhile, more and more high-end hardware trash or the users may be unbearable of high cost of servers, so the use of existing resources and integration of resources has become increasingly important. This paper will detail a virtual network file system, which based on Upnp (Universal Plug and Play) and FUSE (File system in Usese Space) in Linux operating system. In this study, users can
APA, Harvard, Vancouver, ISO, and other styles
49

Hart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.

Full text
Abstract:
Many colleges and universities in the U. S. are electronically linked to the internet, the worldwide web of computer networks. Advisors can begin to use internet resources by subscribing to the user-friendly academic advising forum called ACADV. Through ACADV, advisors participate in a daily discussion group that connects them with colleagues around the world. After an advisor who is a new internet user becomes comfortable with ACADV, many other network resources can be explored. Abstruse computer terms and abbreviations such as e-mail, Usenet, Telnet, and FTP will become familiar and meaningf
APA, Harvard, Vancouver, ISO, and other styles
50

Tan, Tin-Wee, and Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences." Biochemical Education 22, no. 1 (January 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!