To see the other types of publications on this topic, follow the link: Computer networks.

Journal articles on the topic 'Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sireesha, Manchoori, and Gobi N. "Computer Networks." International Journal of Research Publication and Reviews 5, no. 3 (2024): 1020–24. http://dx.doi.org/10.55248/gengpi.5.0324.0640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer ne
APA, Harvard, Vancouver, ISO, and other styles
3

Hyman, William A. "Medical Devices, Computers, and Computer Networks." Biomedical Safety & Standards 39, no. 1 (2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gumen, O., I. Selina, and D. Міz. "NEURAL NETWORKS. COMPUTER VISUAL RECOGNITION." Modern problems of modeling, no. 26 (June 13, 2024): 95–99. https://doi.org/10.33842/2313125x-2024-26-95-99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

GOTO, Eiji. "Using Computers and Computer Networks in U.S.A." Journal of Agricultural Meteorology 50, no. 2 (1994): 135–39. http://dx.doi.org/10.2480/agrmet.50.135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bogucki, Peter. "Computer Networks." Anthropology News 27, no. 6 (1986): 2. http://dx.doi.org/10.1111/an.1986.27.6.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brinn, L. W. "Computer Networks." ACM SIGCSE Bulletin 17, no. 1 (1985): 135–39. http://dx.doi.org/10.1145/323275.323305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jensen, Pamela S. "Computer Networks." Investigative Radiology 20, no. 6 (1985): 648. http://dx.doi.org/10.1097/00004424-198509000-00026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mathew, Jincy C. "Review on Architecture of Computer Networks." International Journal of Psychosocial Rehabilitation 24, no. 4 (2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wellman, B. "Computer Networks As Social Networks." Science 293, no. 5537 (2001): 2031–34. http://dx.doi.org/10.1126/science.1065547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Patel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.

Full text
Abstract:
Abstract: Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, e
APA, Harvard, Vancouver, ISO, and other styles
12

Zizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.

Full text
Abstract:
The information age has arrived, and the Internet has become an important part of life. Computers have become an important tool in daily work, study, entertainment, etc., changing our lives. However, in the process of widespread use of computers and networks, security issues have also become an important obstacle to their development. Problems such as computer viruses, confidential information leaks, and hacker intrusions have caused economic and property damage to computer users. This article mainly explains the basic contents of computer network security and virtual network technology, as we
APA, Harvard, Vancouver, ISO, and other styles
13

Sathyamurthy, N. "Let There be Computers and Virtual Computer Networks!" Resonance 25, no. 10 (2020): 1463–66. http://dx.doi.org/10.1007/s12045-020-1063-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yanova, Olga Yu, Osman M. Minaev, and Hava S. Khalieva. "THE USE OF VIRTUAL NETWORK TECHNOLOGY IN ENSURING THE SECURITY OF COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 11/12, no. 152 (2024): 194–200. https://doi.org/10.36871/ek.up.p.r.2024.11.12.020.

Full text
Abstract:
With the actual development of computer network security, virtual network tech-nology, as a public network security technology, can effectively overcome the limitations of phys-ical location and use a simulated network environment for users to perform data access or down-load operations. This application method can better protect information, data, and files from download links. The use of virtual network technology in ensuring the security of computer net-works can not only improve the efficiency of computers, but also significantly guarantee the security of computer networks and have certain
APA, Harvard, Vancouver, ISO, and other styles
15

Smith, E. "Review: Computer Networks." Computer Bulletin 46, no. 1 (2004): 30. http://dx.doi.org/10.1093/combul/46.1.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Đokić, Ratomir Đ., and Milorad S. Markagić. "Computer networks forensics." Vojnotehnicki glasnik 61, no. 1 (2013): 136–45. http://dx.doi.org/10.5937/vojtehg61-1493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Smythe, C. "Computer Communication Networks." Electronics & Communications Engineering Journal 4, no. 1 (1992): 31. http://dx.doi.org/10.1049/ecej:19920007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Max, G. "Modelling computer networks." Journal of Physics: Conference Series 268 (January 1, 2011): 012018. http://dx.doi.org/10.1088/1742-6596/268/1/012018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gorodetskii, V. I., I. V. Kotenko, and R. M. Yusupov. "Computer networks safety." Herald of the Russian Academy of Sciences 76, no. 4 (2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Quarterman, John S., and Josiah C. Hoskins. "Notable computer networks." Communications of the ACM 29, no. 10 (1986): 932–71. http://dx.doi.org/10.1145/6617.6618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fluck, Andrew. "Using Computer Networks." British Journal of Special Education 16, no. 1 (2007): 14. http://dx.doi.org/10.1111/j.1467-8578.1989.tb01352.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Madaeva, Madina S., Salidat M. Yunaeva, and Irina V. Grigorieva. "THE ROLE OF COMPUTER INFORMATION NETWORKS IN ECONOMIC ACTIVITY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 17–22. https://doi.org/10.36871/ek.up.p.r.2024.09.10.003.

Full text
Abstract:
The development of computer and network technologies has led human society to enter the information age. In the society of the future, computers will make a number of changes to the structure of the economy, the direction of employment, international economic forms and trade. Based on the relationship between computer networks and the economy, this article analyzes the impact of computer networks on the economy and how computer networks can be used to promote greater economic development.
APA, Harvard, Vancouver, ISO, and other styles
23

Murdalova, Iman E., Aiset U. Baydarova, and Deni M. Temirsultanov. "THE ROLE OF COMPUTER NETWORKS IN ECONOMIC DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/11, no. 153 (2024): 236–40. https://doi.org/10.36871/ek.up.p.r.2024.12.11.028.

Full text
Abstract:
The development of computer and network technologies has brought human society into the information age. In the society of the future, computers will cause a number of changes in the economic structure, the direction of employment, the international economic form and the form of trade. This article begins with the relationship between computer networks and the economy, analyzes the impact of computer networks on the economy and ways to use com-puter networks to promote economic development.
APA, Harvard, Vancouver, ISO, and other styles
24

Alviyanto, Fendi, Thomas Budiman, and Anton Zulkarnain Sianipar. "LAN Network Optimization to Support Practicum Activities Using Action Research Method at STMIK Jayakarta." Jurnal Indonesia Sosial Teknologi 5, no. 7 (2024): 3050–58. http://dx.doi.org/10.59141/jist.v5i7.1104.

Full text
Abstract:
The importance of using computer networks in campus laboratories to improve the quality of education and research is also increasing. However, there are problems found in the use of computer networks in campus laboratories, namely low data transmission speeds, network insecurity and inaccessible resources. Therefore, this research was conducted to determine the factors that influence the performance of computer networks in campus laboratories, including data transmission speed. Computer networks evolved from point-to-point communication to computers connecting to each other and exchanging info
APA, Harvard, Vancouver, ISO, and other styles
25

Wu, Binbin, Jingyu Xu, Yifan Zhang, Bo Liu, Yulu Gong, and Jiaxin Huang. "Integration of computer networks and artificial neural networks for an AI-based network operator." Applied and Computational Engineering 64, no. 1 (2024): 122–27. http://dx.doi.org/10.54254/2755-2721/64/20241370.

Full text
Abstract:
This paper proposes an integrated approach combining computer networks and artificial neural networks to construct an intelligent network operator, functioning as an AI model. State information from computer networks is transformed into embedded vectors, enabling the operator to efficiently recognize different pieces of information and accurately output appropriate operations for the computer network at each step. The operator has undergone comprehensive testing, achieving a 100% accuracy rate, thus eliminating operational risks. Additionally, a simple computer network simulator is created and
APA, Harvard, Vancouver, ISO, and other styles
26

Giniyatova, Dinara Halilovna, and Vasilii Aleksandrovich Lapinskii. "Nodules detection on computer tomograms using neural networks." Program Systems: Theory and Applications 13, no. 3 (2022): 81–98. http://dx.doi.org/10.25209/2079-3316-2022-13-3-81-98.

Full text
Abstract:
Results of neural networks (NN) application to the problem of detecting neoplasms on computer tomograms of the lungs with limited amount of data are presented. Much attention is paid to the analysis and preprocessing of images as a factor improving the NN quality. The problem of NN overfitting and ways to solve it are considered. Results of the presented experiments allow drawing a conclusion about the efficiency of applying individual NN architectures in combination with data preprocessing methods to detection problems even in cases of a limited training set and a small size of detected objec
APA, Harvard, Vancouver, ISO, and other styles
27

Brar, Gurbinder Singh, and Rahul Malhotra. "Wireless Computer Networks and Associated Energy Efficient Protocols." SIJ Transactions on Computer Networks & Communication Engineering 01, no. 05 (2013): 06–09. http://dx.doi.org/10.9756/sijcnce/v1i5/0105370201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Madaeva, Madina S., Salidat M. Yunaeva, and Svetlana G. Nikolaeva. "THE IMPACT OF INFORMATION COMPUTER NETWORKS ON SOCIAL DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 86–92. https://doi.org/10.36871/ek.up.p.r.2024.09.10.012.

Full text
Abstract:
currently, human society has entered the era of the Internet. Computers and the Internet are already closely linked to the daily work, education, and lives of ordinary people. Human society is currently going through a period of historical leaps. It is moving from the era of high industrialization to the previous era of computer networks. With the rapid development of computer technology and network communication technologies, computers and networks are penetrating all corners of human society at an alarming rate. So, what approaches and methods will we use in the future to counter the materia
APA, Harvard, Vancouver, ISO, and other styles
29

Mijwel, Maad M., Adam Esen, and Aysar Shamil. "Overview of Neural Networks." Babylonian Journal of Machine Learning 2023 (August 11, 2023): 42–45. http://dx.doi.org/10.58496/bjml/2023/008.

Full text
Abstract:
Since it was confirmed and verified that the human nervous system consists of individual cells, which were later called neurons, and it was discovered that these cells connect with each other to form an extensive communication network, a large number of possibilities have been opened for application in multiple disciplines in areas of knowledge. Neural Networks are created to perform tasks such as pattern recognition, classification, regression, and many other functions that serve humans and are an essential component in the field of machine learning and artificial intelligence. In computer sc
APA, Harvard, Vancouver, ISO, and other styles
30

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Full text
Abstract:
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
APA, Harvard, Vancouver, ISO, and other styles
31

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
32

Adamek, Milan, Miroslav Matysek, and Michaela Barinova. "Computer networks in education." MATEC Web of Conferences 125 (2017): 02058. http://dx.doi.org/10.1051/matecconf/201712502058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Marshall, E. "Worm Invades Computer Networks." Science 242, no. 4880 (1988): 855–56. http://dx.doi.org/10.1126/science.242.4880.855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Moore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Anderson, P. C. "Evaluating the computer networks." Academic Medicine 62, no. 4 (1987): 356. http://dx.doi.org/10.1097/00001888-198704000-00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jevtovic, Milojko. "Protection of computer networks." Vojnotehnicki glasnik, no. 5 (2005): 430–41. http://dx.doi.org/10.5937/vojtehg0505430j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shenker, S., D. Clark, D. Estrin, and S. Herzog. "Pricing in computer networks." ACM SIGCOMM Computer Communication Review 26, no. 2 (1996): 19–43. http://dx.doi.org/10.1145/231699.231703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mckendrick, David, Andrew Farmer, JonathanD S. Kay, Paul Hodgkinson, and Norman Westwood. "COMPUTER NETWORKS IN MEDICINE." Lancet 334, no. 8677 (1989): 1456. http://dx.doi.org/10.1016/s0140-6736(89)92065-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Shamim, A. A. "Local Area Computer Networks." IETE Technical Review 3, no. 10 (1986): 533–43. http://dx.doi.org/10.1080/02564602.1986.11438019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Jenkins, Sarah. "Computer Networks: Publisher's Note." Computer Networks 160 (September 2019): iii. http://dx.doi.org/10.1016/s1389-1286(19)30902-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Wood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zufarov, Zair Makhmudovich. "TOPOLOGY OF COMPUTER NETWORKS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 1, no. 1 (2021): 886–91. https://doi.org/10.5281/zenodo.4742124.

Full text
Abstract:
<em>The article provides information on computer network topologies. The topology of computer networks provides information on their application, as well as the types of network topologies and their use, as well as their advantages and disadvantages.</em>
APA, Harvard, Vancouver, ISO, and other styles
43

Ren, Xiaohui, Iftikhar Ahmed, and Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (August 1, 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Full text
Abstract:
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we ai
APA, Harvard, Vancouver, ISO, and other styles
44

Prijs, Jasper, Zhibin Liao, Soheil Ashkani-Esfahani, et al. "Artificial intelligence and computer vision in orthopaedic trauma." Bone & Joint Journal 104-B, no. 8 (2022): 911–14. http://dx.doi.org/10.1302/0301-620x.104b8.bjj-2022-0119.r1.

Full text
Abstract:
Artificial intelligence (AI) is, in essence, the concept of ‘computer thinking’, encompassing methods that train computers to perform and learn from executing certain tasks, called machine learning, and methods to build intricate computer models that both learn and adapt, called complex neural networks. Computer vision is a function of AI by which machine learning and complex neural networks can be applied to enable computers to capture, analyze, and interpret information from clinical images and visual inputs. This annotation summarizes key considerations and future perspectives concerning co
APA, Harvard, Vancouver, ISO, and other styles
45

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
APA, Harvard, Vancouver, ISO, and other styles
46

Rao, Jai R. "Reading up books: Computer communications networks: New technologies revolutionize computers." IEEE Potentials 4, no. 4 (1985): 33–36. http://dx.doi.org/10.1109/mp.1985.6500211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Full text
Abstract:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical ba
APA, Harvard, Vancouver, ISO, and other styles
48

BENGA, Daniel-Mihai ,., and Marian ALEXANDRU. "REAL-EMULATED-SIMULATED INTEGRATED ENVIRONMENT FOR TESTING COMPUTER NETWORKS." Review of the Air Force Academy 16, no. 1 (2018): 39–44. http://dx.doi.org/10.19062/1842-9238.2018.16.1.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Staneva, Elisaveta, and Mariyan Rachev. "Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135–40. http://dx.doi.org/10.11610/isij.4709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Pierre, S., H. Said, and W. G. Probst. "Routing in computer networks using artificial neural networks." Artificial Intelligence in Engineering 14, no. 4 (2000): 295–305. http://dx.doi.org/10.1016/s0954-1810(00)00014-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!